2021
DOI: 10.1155/2021/8621230
|View full text |Cite
|
Sign up to set email alerts
|

Unified Authentication and Access Control for Future Mobile Communication‐Based Lightweight IoT Systems Using Blockchain

Abstract: The Internet of Things (IoT) is a new revolution defined by heterogeneous devices made up of intelligent, omnipresent items that are all hooked up to The internet. These devices are frequently implemented in different areas to offer innovative programs in various industrial applications, including intelligent urban, medicine, and societies. Such Internet of Things (IoT) equipment generates a large volume of private and safety information. Because IoT systems are resource-constrained in terms of operation, memo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 46 publications
(31 citation statements)
references
References 33 publications
0
31
0
Order By: Relevance
“…The proposed method used bilinear Diffie-Hellman assumption and then use hierarchical IBE secure method without random oracles to generate private and public key. Waters [24] proposed fully secure IBE system without using random oracle. This paper used bilinear Diffie-Hellman (BDH) approach to create secure cryptosystem.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…The proposed method used bilinear Diffie-Hellman assumption and then use hierarchical IBE secure method without random oracles to generate private and public key. Waters [24] proposed fully secure IBE system without using random oracle. This paper used bilinear Diffie-Hellman (BDH) approach to create secure cryptosystem.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This paper used bilinear Diffie-Hellman (BDH) approach to create secure cryptosystem. The main limitation of the methods discussed in [22][23][24] is that it is possible to compromise the security keys produced by these approaches. Y. Wang et al [25] proposed IBE and signature-based method for the cyclotomic fields.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In this scenario, an average of 100 mock-up operations is used for every restriction configuration. Energy savings are clearly dependent on the VM service rate, longevity, or work duration in relation to the weight produced by VM resource requirements [27]. ere are huge cost reductions in terms of resources, maintenance, and real estate, as well as the possibility to optimize workloads to make them function more efficiently.…”
Section: Resultsmentioning
confidence: 99%
“…The main challenge is exploring the correlation features of different paths, as a multipath choice must take account of the advantages of path diversity. Specific nodes or ending systems may carry out this function as the final result of the selection procedure [ 25 ]. In order to determine the condition of data packets over the path, like if they were obtained or if they were lost, the majority of the approaches are either focused on different forwarding efforts to enhance throughput or testing SCTP-CMT output in various situations with varying levels of service quality.…”
Section: Preliminary Studiesmentioning
confidence: 99%