A hybrid blockchain-based identity authentication scheme for multi-WSN

Z Cui, XUE Fei, S Zhang, X Cai, Y Cao… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) equipment is usually in a harsh environment, and its security has
always been a widely concerned issue. Node identity authentication is an important means …

[HTML][HTML] Hierarchical blockchain structure for node authentication in IoT networks

MT Al Ahmed, F Hashim, SJ Hashim… - Egyptian Informatics …, 2022 - Elsevier
Abstract Internet of Things (IoT) networks are large peer-to-peer networks of small devices
that require a competent security system that is scalable and adaptable to the limited …

An Improved Blockchain‐Based Authentication Protocol for IoT Network Management

M Yavari, M Safkhani, S Kumari… - Security and …, 2020 - Wiley Online Library
Communication security between IoT devices is a major concern in this area, and the
blockchain has raised hopes that this concern will be addressed. In the blockchain concept …

Blockchain meets edge computing: A distributed and trusted authentication system

S Guo, X Hu, S Guo, X Qiu, F Qi - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the great prevalence of various Internet of Things (IoT) terminals, how to solve the
problem of isolated information among different IoT platforms attracts attention from both …

A distributed identity‐based authentication scheme for internet of things devices using permissioned blockchain system

ES Babu, AK Dadi, KK Singh, SR Nayak… - Expert …, 2022 - Wiley Online Library
Abstract The Internet of Things (IoT) has become a significant technology on the internet with
its widespread adoption in almost every place we could think of, like homes, hospitals …

[HTML][HTML] Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems

OA Khashan, NM Khafajah - Journal of King Saud University-Computer and …, 2023 - Elsevier
With the rapid increase in the number of Internet of Things (IoT) devices in recent years,
massive amounts of sensitive IoT data are being generated and transmitted over the …

Authentication and key management in distributed iot using blockchain technology

SS Panda, D Jena, BK Mohanta… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The exponential growth in the number of connected devices as well as the data produced
from these devices call for a secure and efficient access control mechanism that can ensure …

Blockchain-based decentralized authentication modeling scheme in edge and IoT environment

M Zhaofeng, M Jialin, W Jihui… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Authentication is the first entrance to kinds of information systems; however, traditional
centered single-side authentication is weak and fragile, which has security risk of single-side …

An efficient authentication scheme using blockchain technology for wireless sensor networks

A Mubarakali - Wireless Personal Communications, 2022 - Springer
The wireless sensor networks are very vulnerable environments for network attacks, so that
they require appropriate security measures must be implemented. The blockchain …

AEchain: A lightweight blockchain for IoT applications

S Khan, WK Lee, SO Hwang - IEEE Consumer Electronics …, 2021 - ieeexplore.ieee.org
IoT nodes comprise of sensors and embedded resource-constrained systems. On the other
hand, blockchain is regarded as computationally expensive due to the consensus …