Development of an Enhanced Blockchain Mechanism for Internet of Things Authentication

被引:0
作者
Mahyar Sadrishojaei
Faeze Kazemian
机构
[1] University of Applied Science and Technology (UAST),Faculty of Industry
[2] University of Applied Science and Technology (UAST),undefined
来源
Wireless Personal Communications | 2023年 / 132卷
关键词
Mutual authentication; Blockchain; Internet of Things; Security;
D O I
暂无
中图分类号
学科分类号
摘要
The rising number of Internet of Things devices across public networks bring speed, accuracy, and responsibility. The complexity of Internet of Things communications and different resource capacities make end-to-end security hard to achieve. Despite The authentication of the identities of individual nodes is a critical component in making the Internet of Things safe to use. A blockchain-based identification strategy has been proposed for heterogeneous IoT nodes. To begin, the primary goal of this blockchain model is to improve the level of compatibility between the blockchain and the Internet of Things ecosystem. After that, the purpose of the method for selecting the proxy node is to construct a connection among the typical IoT node and the blockchain. This bridge is constructed by determining the confidence value among each pair of nodes. In findings, the node authentication technique of the concept and the proxy node selection process build a safe channel for communication between nodes. This is built on the modified blockchain. Considerations like the storage overhead and cost of communication imposed by the provided integrated authentication technique are utilized to determine the total efficacy of the approach.
引用
收藏
页码:2543 / 2561
页数:18
相关论文
共 48 条
[1]  
Sadrishojaei M(2022)An energy-aware clustering method in the IoT using a swarm-based algorithm Wireless Networks 28 125-136
[2]  
Hosseinzadeh M(2022)A hybrid delay aware clustered routing approach using aquila optimizer and firefly algorithm in internet of things Mathematics 10 4331-104
[3]  
Sadrishojaei M(2021)A new clustering-based routing method in the mobile internet of things using a krill herd algorithm Cluster Computing 162 89-17
[4]  
Farooq U(2022)Machine learning and the Internet of Things security: Solutions and open challenges Journal of Parallel and Distributed Computing 127 1-3397
[5]  
Sadrishojaei M(2023)An energy-aware scheme for solving the routing problem in the internet of things based on jaya and flower pollination algorithms Journal of Ambient Intelligence and Humanized Computing 80 3393-228
[6]  
Sadrishojaei M(2022)An energy-aware IoT routing approach based on a swarm optimization algorithm and a clustering technique Wireless Personal Communications 30 211-649
[7]  
Singhai R(2023)An investigation of various security and privacy issues in Internet of Things Materials Today: Proceedings 10 4166-43
[8]  
Sushil R(2023)Future mining based on internet of things (IoT) and sustainability challenges International Journal of Sustainable Development & World Ecology 200 103282-739
[9]  
Pouresmaieli M(2022)Development of a lightweight centralized authentication mechanism for the internet of things driven by fog Mathematics 5 633-5922
[10]  
Ataei M(2022)An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks Journal of Network and Computer Applications 34 e4964-2619