2020
DOI: 10.3390/s20041062
|View full text |Cite
|
Sign up to set email alerts
|

Location-Aware Wi-Fi Authentication Scheme Using Smart Contract

Abstract: Advanced wireless technology in Internet of Things (IoT) devices is increasing and facing various security threats. The authentication of IoT devices is the first line of defense for the wireless network. Especially in a Wi-Fi network, the existing authentication methods mainly use a password or digital certificate, these methods are inconvenient to manage due to certificate issuance or prone to be attacked because passwords are easily cracked. In this paper, we propose a location-aware authentication scheme u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…Also, an article by [57]demonstrated the integration of blockchain with IoT ecosystems trading platforms and provided practical scenarios and a case study to establish end-to-end trust for trading IoT devices and corresponding data. Trust and authentication also were the core issues tackled in [58]. The authors in [58] designed a secondary authentication scheme for IoT devices to access a Wi-Fi network using three smart contracts.…”
Section: Research Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Also, an article by [57]demonstrated the integration of blockchain with IoT ecosystems trading platforms and provided practical scenarios and a case study to establish end-to-end trust for trading IoT devices and corresponding data. Trust and authentication also were the core issues tackled in [58]. The authors in [58] designed a secondary authentication scheme for IoT devices to access a Wi-Fi network using three smart contracts.…”
Section: Research Surveymentioning
confidence: 99%
“…Trust and authentication also were the core issues tackled in [58]. The authors in [58] designed a secondary authentication scheme for IoT devices to access a Wi-Fi network using three smart contracts. The scheme aimed to identify IoT devices located within a legal range.…”
Section: Research Surveymentioning
confidence: 99%
“…[8--11]. Aiming to provide finer access control, Chen et al [12] proposed a location-aware authentication scheme using smart contracts to ensure that IoT devices can securely perform Wi-Fi network authentication. The scheme adopts the concept of secondary authentication and consists of two phases: the registration phase, which is mainly designed to complete the generation of the public and private keys and to link the device information with its related device information; and the authentication phase, which is mainly designed to determine whether the requesting device is within a legal location range.…”
Section: Related Workmentioning
confidence: 99%
“…Wi-Fi signals are typically password-protected, but it can also be turned on so that all devices in the range are connected. This technology improves the interoperability of wireless network devices based on the IEEE 802.11 standard [3][4][5][6]. In 2014, the number of public Wi-Fi hotspots exceeded 50 million which is an 80% increase over 2013 [7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%