2020
DOI: 10.1155/2020/8836214
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Blockchain-Based Authentication Protocol for IoT Network Management

Abstract: Communication security between IoT devices is a major concern in this area, and the blockchain has raised hopes that this concern will be addressed. In the blockchain concept, the majority or even all network nodes check the validity and accuracy of exchanged data before accepting and recording them, whether this data is related to financial transactions or measurements of a sensor or an authentication message. In evaluating the validity of an exchanged data, nodes must reach a consensus in order to perform a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(13 citation statements)
references
References 45 publications
0
13
0
Order By: Relevance
“…A distributed, decentralized, irreversible, and immutable network framework is blockchain. e key benefit of the blockchain network is that, with very low computing costs, it can effectively deal with anonymous authentication issues [4][5][6][7][8]21]. In this technology, the interaction of TA is completely avoided to evade the outdated centralized structure.…”
Section: Blockchain Conceptmentioning
confidence: 99%
See 1 more Smart Citation
“…A distributed, decentralized, irreversible, and immutable network framework is blockchain. e key benefit of the blockchain network is that, with very low computing costs, it can effectively deal with anonymous authentication issues [4][5][6][7][8]21]. In this technology, the interaction of TA is completely avoided to evade the outdated centralized structure.…”
Section: Blockchain Conceptmentioning
confidence: 99%
“…Roadside infrastructure typically refers to roadside units (RSUs) that are used to communicate as transfer nodes. e blockchain is used to maintain the vehicle attributes and authentication information of users in the VANET [7,8]. It is noted here that the authentication information is an important reference to the VANET's reliability.…”
Section: Introductionmentioning
confidence: 99%
“…However, if four attack vectors such as secret disclosure, replay, traceability and reuse token address are applied to the Cha et al model, the success probability of the attacks reaches 1. Hence, an improved version of Cha et al, model was proposed in [ 27 ] that provides an improved blockchain-based authentication protocol (IBCbAP) for IoT network management using a hash-based message authentication Code (HMAC) signature mechanism. It is implemented in JavaScript and Ethereum local networks using the Web3 library and Test RPC.…”
Section: Background and Related Workmentioning
confidence: 99%
“…As a result, the blockchain network enables verifiable, immutable, and undeniable data storage in the form of so-called transactions that comprise a blockchain [12]. Hence, several security and privacy solutions for IoT networks have been presented in this framework, e.g., [13][14][15][16][17][18][19][20][21][22]. An interesting study on the fusion of blockchain and the Internet of Things ( BIoT) has been provided in [21], where the authors identified nine categories in the intellectual core of BIoT, including data privacy and security for BIoT systems, system security theories for BIoT, and applied security strategies for using blockchain with the IoT.…”
Section: Introductionmentioning
confidence: 99%