Blockchain technology application: Authentication system in digital education

MI Sanni, D Apriliasari - Aptisi Transactions on Technopreneurship …, 2021 - att.aptisi.or.id
… use of technology, one of which is security issues, both transactions and data. Given these
issues in this paper, we propose blockchain technology for an authentication … of technology in …

An efficient authentication scheme using blockchain technology for wireless sensor networks

A Mubarakali - Wireless Personal Communications, 2022 - Springer
… for authentication in wireless sensor networks that uses blockchain technology for security.
… The building of a blockchain network will shape a hierarchical blockchain model, including …

A study on secured authentication and authorization in Internet of Things: Potential of blockchain technology

SM Muzammal, RK Murugesan - Advances in Cyber Security: First …, 2020 - Springer
… Most of previous studies discuss IoT security as a whole and give basic understanding of
Blockchain technology. This paper analyzes IoT security attacks and vulnerabilities. In addition, …

Blockchain technology the identity management and authentication service disruptor: a survey

SY Lim, PT Fotsing, A Almasri… - … Technology, 2018 - researchportal.hw.ac.uk
… The blockchain and DLT is undeniably an ingenious invention for nowadays … the technology
is about, the blockchain technology remains one of the most underestimated technologies of …

A security framework for IoT authentication and authorization based on blockchain technology

MA Rashid, HH Pajooh - … conference on trust, security and …, 2019 - ieeexplore.ieee.org
security challenges. This work explores the possible application of blockchain technology to
address the IoT security … -layer security network model for IoT network based on blockchain

Blockchain-based multi-factor authentication: A systematic literature review

MS Almadani, S Alotaibi, H Alsobhi, OK Hussain… - Internet of Things, 2023 - Elsevier
… Despite the fact that this study uses blockchain technology in order to authenticate digital
education transactions, the system was not evaluated and tested. However, it is essential that …

Authentication and key management in distributed iot using blockchain technology

SS Panda, D Jena, BK Mohanta… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
… One-way hash chains are employed for authentication and key … , and secure authentication
scheme for a heterogeneous IoT network, a Blockchain-based distributed authentication, and …

[PDF][PDF] Identity Management Security Authentication Based on Blockchain Technologies.

P Fan, Y Liu, J Zhu, X Fan, L Wen - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
… The experimental analysis showed that the method could meet the security requirements and
security authentication system and simulated and analyzed the block chain and security of …

A blockchain-based authentication and security mechanism for IoT

D Li, W Peng, W Deng, F Gai - 2018 27th International …, 2018 - ieeexplore.ieee.org
… Even worse, the critical data of authenticated devices can be … , we utilize blockchain technology,
which serves as a secure … into the blockchain, so that they can authenticate each other …

An out-of-band authentication scheme for internet of things using blockchain technology

L Wu, X Du, W Wang, B Lin - 2018 International conference on …, 2018 - ieeexplore.ieee.org
security. To this end, we propose an out-of-band two-factor authentication scheme for IoT
devices based on Blockchain … factor authentication scheme based on on Blockchain technology