2019
DOI: 10.14569/ijacsa.2019.0100308
|View full text |Cite
|
Sign up to set email alerts
|

Applying Diffie-Hellman Algorithm to Solve the Key Agreement Problem in Mobile Blockchain-based Sensing Applications

Abstract: Mobile blockchain has achieved huge success with the integration of edge computing services. This concept, when applied in mobile crowd sensing, enables transfer of sensor data from blockchain clients to edge nodes. Edge nodes perform proof-of-work on sensor data from blockchain clients and append validated data to the chain. With this approach, blockchain can be performed pervasively. However, securing sensitive sensor data in a mobile blockchain (client/edge node architecture) becomes imperative. To this end… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 58 publications
0
11
0
Order By: Relevance
“…On the other hand, according to the limitation of monitoring devices the protocol should be lightweight with low complexity of time and computation cost. Therefore, we propose lattice-based authentication and key agreement protocol for medical application by improved the scheme in [8] and overcome the latency disadvantage generated according to the natural work of blockchain by using the proposed protocol in [9] which based on lattice.…”
Section: A Motivation and Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, according to the limitation of monitoring devices the protocol should be lightweight with low complexity of time and computation cost. Therefore, we propose lattice-based authentication and key agreement protocol for medical application by improved the scheme in [8] and overcome the latency disadvantage generated according to the natural work of blockchain by using the proposed protocol in [9] which based on lattice.…”
Section: A Motivation and Contributionmentioning
confidence: 99%
“…Depending on Elliptic curve Diffie-Hellman Nsikak and Manmeet [16] solved the problem of key agreement problem in sensing application based on Blockchain, with standard encryption algorithm. In this system the communication parities are miner node and blockchain clients that participated in generated shared secret key that used to derive the session key which used to protect data between communication parities.…”
Section: B Internet Of Thing and Block Chain Applicationmentioning
confidence: 99%
See 1 more Smart Citation
“…When a single biometric or unimodal biometric identifier is integrated with other factors such as password, token or proximity sensors technologies (NFC, RFID), the outcome leads to a multi-factor-based system. Nevertheless, the factors mentioned are also capable to be merged with contextual factors (time, location, behavior and user ID) to support applications and systems based on the sentient environment [42]. Applications protected and accessible based on contextual information's are important to permit authorized user access during a certain time and limiting full access within the restricted perimeter.…”
Section: Authenticator Idsmentioning
confidence: 99%
“…ECC is implemented in smart card because of its smaller key size and less computational complexity relative to RSA cryptosystem [2] and [3]. This makes it attractive and suitable for such applications [4].…”
Section: Introductionmentioning
confidence: 99%