A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

LightCERT4IoTs: Blockchain-based lightweight certificates authentication for IoT applications

A Garba, D Khoury, P Balian, S Haddad, J Sayah… - IEEE …, 2023 - ieeexplore.ieee.org
The proliferation of the internet of things (IoT) within the emergence of five-generation (5G)
networks has received a huge attention in both industrial and academic domains. A 5G …

CTB-PKI: Clustering and trust enabled blockchain based PKI system for efficient communication in P2P network

A Panigrahi, AK Nayak, R Paul, B Sahu, S Kant - IEEE Access, 2022 - ieeexplore.ieee.org
The decentralization feature of public and private blockchain-based applications is achieved
by selecting different nodes as validators or Certificate Authority () for each transaction …

Current trends in blockchain implementations on the paradigm of public key infrastructure: a survey

D Maldonado-Ruiz, J Torres, N El Madhoun… - IEEE …, 2022 - ieeexplore.ieee.org
Since the emergence of the Bitcoin cryptocurrency, the blockchain technology has become
the new Internet tool with which researchers claim to be able to solve any existing online …

A literature review on V2X communications security: Foundation, solutions, status, and future

Z Ying, K Wang, J Xiong, M Ma - IET Communications, 2024 - Wiley Online Library
With the refinement and development of the Vehicle to Everything (V2X) concept, its security
issues have gradually come to the fore, revealing many security risks and increasing …

Performance Evaluation and Analysis of LightCert4IoT using Cooja-Contiki Simulator

D Khoury, S Haddad, P Sondi, G Abou Haidar… - IEEE …, 2024 - ieeexplore.ieee.org
Recently, the focus on the Internet of Things (IoT) has rocketed in parallel with the evolution
of mobile fifth-generation (5G) networks. To fully utilize IoT, which wirelessly connects …

A Semi-decentralized PKI based on Blockchain with a Stake-based Reward-Punishment Mechanism

E Turan, S Sen, T Ergun - IEEE Access, 2024 - ieeexplore.ieee.org
The conventional Public Key Infrastructure (PKI) has long been plagued by security issues
stemming from its centralized and non-transparent design. In recent years, blockchain …

Monitoring Key Pair Usage through Distributed Ledgers and One-Time Signatures

L Mayr, L Palma, G Zambonin, W Silvano, R Custódio - Information, 2023 - mdpi.com
Private key management is a complex obstacle arising from the traditional public key
infrastructure model. However, before any related security breach can be addressed, it must …

Spidverify: A secure and privacy-preserving decentralised identity verification framework

AS Shehu, A Pinto, ME Correia - … International Conference on …, 2023 - ieeexplore.ieee.org
Traditional identity management (IdM) systems rely on third-party identity providers (IdPs)
and are centralised, which can make them vulnerable to data breaches and other security …

A New Identity Authentication and Key Agreement Protocol Based on Multi-Layer Blockchain in Edge Computing

Y Chen, Q Yang, X Zeng, D Yang, X Li - IEEE Access, 2023 - ieeexplore.ieee.org
In today's interconnected world, identity authentication and key agreement are important
links in the secure communication process of IoT terminal devices. In the edge computing …