Blockchain for 5G and beyond networks: A state of the art survey

DC Nguyen, PN Pathirana, M Ding… - Journal of Network and …, 2020 - Elsevier
The fifth generation (5G) wireless networks are on the way to be deployed around the world.
The 5G technologies target to support diverse vertical applications by connecting …

[HTML][HTML] Achieving cybersecurity in blockchain-based systems: A survey

M Gimenez-Aguilar, JM De Fuentes… - Future Generation …, 2021 - Elsevier
With the increase in connectivity, the popularization of cloud services, and the rise of the
Internet of Things (IoT), decentralized approaches for trust management are gaining …

A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles

Z Xu, W Liang, KC Li, J Xu, H Jin - Journal of Parallel and Distributed …, 2021 - Elsevier
A fundamental layer of smart cities, the Internet of Vehicles (IoV) can significantly improve
transportation efficiency, reduce energy consumption, and traffic accidents. However …

A privacy-aware PUFs-based multiserver authentication protocol in cloud-edge IoT systems using blockchain

Y Zhang, B Li, B Liu, Y Hu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The combination of the Internet of Things (IoT) and cloud-edge (CE) paradigm promises to
be an efficient system to aggregate and further process huge volumes of data from IoT …

Design of secure decentralized car-sharing system using blockchain

M Kim, J Lee, K Park, Y Park, KH Park, Y Park - IEEE Access, 2021 - ieeexplore.ieee.org
Car-sharing systems can solve various urban problems by providing shared vehicles to
people and reducing the operation of personal vehicles. With the development of the …

Blockchain-based cloud storage system with CP-ABE-based access control and revocation process

P Sharma, R Jindal, MD Borah - the Journal of Supercomputing, 2022 - Springer
Cloud system provides an on-demand and low-cost computing and storing model. Many
organizations and individual end-users are using cloud storage services to back up their …

A blockchain-based authentication and authorization scheme for distributed mobile cloud computing services

L Yu, M He, H Liang, L Xiong, Y Liu - Sensors, 2023 - mdpi.com
Authentication and authorization constitute the essential security component, access control,
for preventing unauthorized access to cloud services in mobile cloud computing (MCC) …

Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey

F Ghaffari, E Bertin, N Crespi, J Hatin - Computer Science Review, 2023 - Elsevier
The accelerated growth of networking technologies highlights the importance of
Authentication and Access Control (AAC) as protection against associated attacks …

Efficient and privacy-preserving authentication scheme for wireless body area networks

M Shuai, B Liu, N Yu, L Xiong, C Wang - Journal of Information Security and …, 2020 - Elsevier
As a significant part of electronic health, wireless body area networks (WBANs) have greatly
improved the quality and efficiency of healthcare. With the help of WBANs, comprehensive …

Identity and access management using distributed ledger technology: A survey

F Ghaffari, K Gilani, E Bertin… - International Journal of …, 2022 - Wiley Online Library
As the basic building block of any information security system, identity and access
management (IAM) solutions play vital role in enterprise's security programmes. Providing …