2019
DOI: 10.1007/978-3-030-15035-8_64
|View full text |Cite
|
Sign up to set email alerts
|

Secure Peer-to-Peer Communication Based on Blockchain

Abstract: Nowadays, electronic messaging is the most used network application, and the authentication between users is a vital property. The most commonly employed approaches to ensure this property are PKI and S/MIME email encryption protocols, but indeed they are facing multiples security threats, such as the MITM attack and EFAIL attack. The blockchain is an innovative technology that overcomes these threats and allows to decentralize sensitive operations while preserving a high level of security. It eliminates the n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(5 citation statements)
references
References 11 publications
(5 reference statements)
0
5
0
Order By: Relevance
“…Proactive security measures, such as the Smart Contract-Driven Intrusion Detection, continuously monitor and rectify anomalous behaviors. Alongside, Automated Blockchain Responses tackle emerging threats, and protocols like Secure Peer-to-Peer Communication [30] and the Lightweight Consensus Mechanism [31] enrich the framework, ensuring both security and efficient functionality tailored to IoT's unique demands. Detailed description of each of these core components is presented in following.…”
Section: Methodsmentioning
confidence: 99%
“…Proactive security measures, such as the Smart Contract-Driven Intrusion Detection, continuously monitor and rectify anomalous behaviors. Alongside, Automated Blockchain Responses tackle emerging threats, and protocols like Secure Peer-to-Peer Communication [30] and the Lightweight Consensus Mechanism [31] enrich the framework, ensuring both security and efficient functionality tailored to IoT's unique demands. Detailed description of each of these core components is presented in following.…”
Section: Methodsmentioning
confidence: 99%
“…Robles et al [38] combined the building features of blockchain technology to initiate and utilize a customer-focused data management system in AMI. Since blockchain is a decentralized public digital ledger for recording transactions that cannot be changed without changing all the subsequent blocks and the consensus of the network, access control, integrity, and authentication of the involved data were therefore guaranteed via blockchain [39,40] PUFs get easily denatured/altered in the presence of extreme temperatures [27] 2…”
Section: Privacy and Security Vulnerabilities Of Amimentioning
confidence: 99%
“…In the solution presented by Khacef and Pujolle in [22], blockchain technology is used to ensure secure and authenticated message exchange. The work proposes an authentication solution that uses smart contracts through the Ethereum blockchain, thereby removing the need for a CA.…”
Section: Related Researchmentioning
confidence: 99%