2023
DOI: 10.3390/s23031371
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain

Abstract: Digital transformation has increased its proportion in the last few years and the Internet-on-Things (IoT) domain is not an exception, with more and more devices or sensors being connected to the Internet and transmitting different types of data. Usually, being part of more complex IT systems, it must be ensured that the IoT devices transmitting the data are authenticated components of the system before sending the data to a storage server. However, usually, IoT devices have limited computing power, therefore … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 40 publications
0
1
0
Order By: Relevance
“…Blockchainbased authentication protocols leverage distributed ledgers to verify IoT devices' authenticity, integrity, and interactions. By leveraging the consensus mechanisms and cryptographic principles of blockchain, these protocols ensure the integrity of authentication data and prevent unauthorized access to IoT networks and services [36], [43], [46].…”
Section: Introductionmentioning
confidence: 99%
“…Blockchainbased authentication protocols leverage distributed ledgers to verify IoT devices' authenticity, integrity, and interactions. By leveraging the consensus mechanisms and cryptographic principles of blockchain, these protocols ensure the integrity of authentication data and prevent unauthorized access to IoT networks and services [36], [43], [46].…”
Section: Introductionmentioning
confidence: 99%