2022
DOI: 10.1109/tii.2021.3116049
|View full text |Cite
|
Sign up to set email alerts
|

Toward Cross-Domain Dynamic Accumulator Authentication Based on Blockchain in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…However, this paper does not provide a potential solution to incorporate the large number of IIoT devices. To solve the scalability and security problems in cross-domain networks various blockchain-based frameworks are proposed in [20] [21] [22] [23]. In [20] Wang et al proposed a scheme that addresses efficiency and security challenges in cross-domain IIoT by using edge servers to assist smart devices in achieving cross-domain authentication, while the lightweight message authentication algorithm guarantees message security with low computational overhead.…”
Section: A Security Protocols For Secure Data Sharingmentioning
confidence: 99%
See 3 more Smart Citations
“…However, this paper does not provide a potential solution to incorporate the large number of IIoT devices. To solve the scalability and security problems in cross-domain networks various blockchain-based frameworks are proposed in [20] [21] [22] [23]. In [20] Wang et al proposed a scheme that addresses efficiency and security challenges in cross-domain IIoT by using edge servers to assist smart devices in achieving cross-domain authentication, while the lightweight message authentication algorithm guarantees message security with low computational overhead.…”
Section: A Security Protocols For Secure Data Sharingmentioning
confidence: 99%
“…To solve the scalability and security problems in cross-domain networks various blockchain-based frameworks are proposed in [20] [21] [22] [23]. In [20] Wang et al proposed a scheme that addresses efficiency and security challenges in cross-domain IIoT by using edge servers to assist smart devices in achieving cross-domain authentication, while the lightweight message authentication algorithm guarantees message security with low computational overhead. In [24] the author presented a lightweight authentication protocol based on ECC for faulttolerant wireless sensor networks.…”
Section: A Security Protocols For Secure Data Sharingmentioning
confidence: 99%
See 2 more Smart Citations
“…This master-slave hierarchical structure has also been used to construct cross-domain trust access mechanisms [28] for power terminals, and improve the efficiency and data credibility for cross-domain IoT authentication [15]. In addition, Wang et al [29] leveraged undirected graph to build authentication relationships for IIoT devices. The digital signature and accumulator were combined to achieve the signature transitivity among different domains.…”
Section: B Blockchain-based Cross-domain Security Mechanismsmentioning
confidence: 99%