2020
DOI: 10.23919/jcc.2020.09.004
|View full text |Cite
|
Sign up to set email alerts
|

A secure mutual authentication scheme of blockchain-based in WBANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…To identify the security flaws where BIoTS is a potential solution, we study a causality and effect correlation between the nature of the security attack in an IoT ecosystem and the Blockchain Hardware’s architectural characteristics implemented in BIoTS [ 3 , 14 , 53 ]. The scale is weighted according to the architecture’s characteristics.…”
Section: Results and Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…To identify the security flaws where BIoTS is a potential solution, we study a causality and effect correlation between the nature of the security attack in an IoT ecosystem and the Blockchain Hardware’s architectural characteristics implemented in BIoTS [ 3 , 14 , 53 ]. The scale is weighted according to the architecture’s characteristics.…”
Section: Results and Evaluationmentioning
confidence: 99%
“…The BIoTS-device architecture description is made from the functional features of two technologies; IoT and blockchain. In the assembly and synchronization of both architectural blocks, it is necessary to identify the security requirements, both for software and hardware [ 53 , 54 ].…”
Section: Biots Architecturementioning
confidence: 99%
“…al. (2020) developed a block chain-based secure mutual authentication system for WBANs [27]. The ROR (Real-or-Random) paradigm was used to demonstrate the developed method's safety.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The framework utilized a consensus mechanism based on Byzantine fault tolerance (BFT) and achieved secure and efficient data transfer in WSNs. In a study by Xu et al [16], a blockchain-based architecture was proposed for WSNs that utilized a consensus mechanism based on delegated proof of stake (DPoS). The proposed architecture achieved efficient and secure data transfer in WSNs while addressing the challenges of energy consumption and security threats.…”
Section: Related Workmentioning
confidence: 99%