2023
DOI: 10.1109/access.2023.3259068
|View full text |Cite
|
Sign up to set email alerts
|

LightCert4IoTs: Blockchain-Based Lightweight Certificates Authentication for IoT Applications

Abstract: These in recent days, the proliferation of the internet of things (IoT) within the emergence of fivegeneration (5G) networks has received a huge attention in both industrial and academic domains. A 5G network is a cornerstone of realizing the full potential of the IoT, which interconnects billions of devices wirelessly. However, wireless communication in IoT devices reveals tremendous security risks in different dimensions and precisely in the distribution of the user certificates. The existing X.509 PKI, or t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 30 publications
0
0
0
Order By: Relevance
“…Garba et al [58] and Kim et al [32] both present lightweight mechanisms with the goal of enabling PKIs for resource-deprived IA components. Garba et al [58] present a lightweight certificate profile, whereas Kim et al [32] contribute an efficient and scalable protocol proposal for the deployment and revocation of certificates.…”
Section: Approaches Presented In Research Papersmentioning
confidence: 99%
See 3 more Smart Citations
“…Garba et al [58] and Kim et al [32] both present lightweight mechanisms with the goal of enabling PKIs for resource-deprived IA components. Garba et al [58] present a lightweight certificate profile, whereas Kim et al [32] contribute an efficient and scalable protocol proposal for the deployment and revocation of certificates.…”
Section: Approaches Presented In Research Papersmentioning
confidence: 99%
“…Garba et al [58] and Kim et al [32] both present lightweight mechanisms with the goal of enabling PKIs for resource-deprived IA components. Garba et al [58] present a lightweight certificate profile, whereas Kim et al [32] contribute an efficient and scalable protocol proposal for the deployment and revocation of certificates. In a similar manner, Duan et al [42], Boudagdigue et al [47,59], and Höglund et al [57] focus on the revocation of certificates given the circumstances of resource-deprived IA components.…”
Section: Approaches Presented In Research Papersmentioning
confidence: 99%
See 2 more Smart Citations
“…Additionally, attackers may exploit users' personal habits and privacy to attack their electricity data, so the security protection of electricity usage data is also crucial. Current technologies for privacy protection in identity authentication mainly include HMAC [1], Zero-Knowledge Proofs [2], the Chinese Remainder Theorem (CRT) [3], Blind Signatures [4], Group Signatures [5], and Certificates [6]. Compared to other technologies, identity authentication schemes based on the CRT are relatively less demanding in terms of computation overhead, transmission consumption, and memory usage, making them more suitable for smart meter identity authentication.…”
Section: Introductionmentioning
confidence: 99%