4.6 Article

BBAP-WSN: A New Blockchain-Based Authentication Protocol for Wireless Sensor Networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Chemistry, Analytical

Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks

Saba Awan et al.

Summary: In this paper, an encryption and trust evaluation model based on blockchain is proposed to address the issue of inauthentic nodes in wireless sensor networks. By performing authentication in public and private blockchains, illegal nodes can be identified and malicious nodes can be eliminated by computing trust values. Simulation results demonstrate the effectiveness of the proposed model in terms of high packet delivery ratio.

SENSORS (2022)

Article Telecommunications

An Efficient Authentication Scheme Using Blockchain Technology for Wireless Sensor Networks

Azath Mubarakali

Summary: The paper proposes a novel and efficient approach for authentication in wireless sensor networks using blockchain technology. It establishes a hierarchical blockchain model for secure connection and user authentication. Analysis of protection and results demonstrates robust protection and improved system performance.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things

Rekha Goyat et al.

Summary: This study develops a blockchain-based decentralized framework for secure communication in wireless sensor networks-enabled IoTs. By utilizing authentication and privacy-preserving schemes, as well as registration, certification, and revocation processes, the framework protects networks against illegal information access and utilizes storage efficiently.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Artificial Intelligence

A secure IoT sensors communication in industry 4.0 using blockchain technology

Geetanjali Rathee et al.

Summary: The advancement of Industrial IoT plays a crucial role in tracing and managing organizational activities, although it also raises concerns about privacy and security. The use of smart sensors in industries improves production efficiency but also exposes vulnerabilities to hacking attacks.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Chemistry, Analytical

Hyperledger Fabric Blockchain for Securing the Edge Internet of Things

Houshyar Honar Pajooh et al.

Summary: This paper presents a solution utilizing blockchain technology to secure IoT edge devices and address scalability and performance issues in IoT systems.

SENSORS (2021)

Article Chemistry, Analytical

IoT Registration and Authentication in Smart City Applications with Blockchain

Celio Marcio Soares Ferreira et al.

Summary: The emergence of 5G will lead to a widespread adoption of IoT devices, particularly in Smart Cities. The integration of Blockchain with IoT can provide distributed security information to address challenges in reliability and security.

SENSORS (2021)

Article Computer Science, Hardware & Architecture

Trust aggregation authentication protocol using machine learning for IoT wireless sensor networks

Santhanakrishnan Chinnaswamy et al.

Summary: Security and trust are key concerns in IoT-based Wireless Sensor Networks. The Trust Aggregation Authentication Protocol (TAAPML) utilizes machine learning to calculate total trust values for devices, based on behavior and data trust values from internet gateways. Trust threshold values are adaptively calculated using Support Vector Machine (SVM) technique, ensuring secure and reliable communication.

COMPUTERS & ELECTRICAL ENGINEERING (2021)

Article Computer Science, Artificial Intelligence

An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN

A. Arivarasi et al.

Summary: The text discusses the concept of wireless sensor networks and the security challenges encountered, as well as a novel Adaptive Trust Sector-Based Authenticated System to enhance the security and stability of the network.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Review Multidisciplinary Sciences

A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

Amit Kumar Gautam et al.

Summary: Wireless sensor networks (WSN) are widely used in various critical applications, and research in key management, authentication, and trust management in WSN is an active area. This paper conducts a detailed survey to explore how different security schemes can be applied to specific applications, aiming to find the optimal security solution.

SN APPLIED SCIENCES (2021)

Article Computer Science, Information Systems

P2P networking based internet of things (IoT) sensor node authentication by Blockchain

Sunghyuck Hong

PEER-TO-PEER NETWORKING AND APPLICATIONS (2020)

Article Computer Science, Information Systems

HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes

Chao Lin et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Chemistry, Analytical

Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network

Alma E. Guerrero-Sanchez et al.

SENSORS (2020)

Article Computer Science, Information Systems

A Survey on Access Control in the Age of Internet of Things

Jing Qiu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Telecommunications

A New Lightweight User Authentication and Key Agreement Scheme for WSN

Foroozan Ghosairi Darbandeh et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Blockchain-based authentication and authorization for smart city applications

Christian Esposito et al.

INFORMATION PROCESSING & MANAGEMENT (2020)

Article Computer Science, Information Systems

An Improved Blockchain-Based Authentication Protocol for IoT Network Management

Mostafa Yavari et al.

SECURITY AND COMMUNICATION NETWORKS (2020)

Article Computer Science, Artificial Intelligence

An novel anonymous user WSN authentication for Internet of Things

Xin Zhang et al.

SOFT COMPUTING (2019)

Article Computer Science, Information Systems

Security Services Using Blockchains: A State of the Art Survey

Tara Salman et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Chemistry, Analytical

A Survey of Internet of Things (IoT) Authentication Schemes

Mohammed El-hajj et al.

SENSORS (2019)

Article Computer Science, Information Systems

SUBBASE: An Authentication Scheme for Wireless Sensor Networks Based on User Biometrics

Rabia Riaz et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2019)

Review Computer Science, Information Systems

A Comprehensive Survey of Blockchain: From Theory to IoT Applications and Beyond

Mingli Wu et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

A Lightweight Blockchain Based Framework for Underwater IoT

Md Ashraf Uddin et al.

ELECTRONICS (2019)

Proceedings Paper Computer Science, Cybernetics

Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems

Deepak Puthal et al.

2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE) (2019)

Article Computer Science, Information Systems

Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks

Ayush Sogani et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Bubbles of Trust: A decentralized blockchain-based authentication system for IoT

Mohamed Tahar Hammi et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Theory & Methods

On blockchain and its integration with loT. Challenges and opportunities

Ana Reyna et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Review Computer Science, Theory & Methods

IoT security: Review, blockchain solutions, and open challenges

Minhaj Ahmad Khan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0

Chao Lin et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Engineering, Electrical & Electronic

Do You Need a Blockchain? This chart will tell you if the technology can solve your problem

Morgen E. Peck

IEEE SPECTRUM (2017)

Review Computer Science, Information Systems

Authentication Protocols for Internet of Things: A Comprehensive Survey

Mohamed Amine Ferrag et al.

SECURITY AND COMMUNICATION NETWORKS (2017)

Article Telecommunications

Robust data authentication for unattended wireless sensor networks

Mostafa H. Dahshan

TELECOMMUNICATION SYSTEMS (2017)

Article Computer Science, Hardware & Architecture

WiSeN: A new sensor node for smart applications with wireless sensor networks

Murat Dener

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Computer Science, Hardware & Architecture

Secure user authentication scheme for wireless healthcare sensor networks

Chia-Hui Liu et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Computer Science, Information Systems

LoWaNA: low overhead watermark based node authentication in WSN

Arpan Sen et al.

WIRELESS NETWORKS (2016)

Article Engineering, Electrical & Electronic

Study of Wireless Authentication Center with Mixed Encryption in WSN

Yiqin Lu et al.

JOURNAL OF SENSORS (2016)

Article Computer Science, Information Systems

Secure authentication and integrity techniques for randomized secured routing in WSN

U. Senthil Kumaran et al.

WIRELESS NETWORKS (2015)

Article Engineering, Electrical & Electronic

Design of a WSN Platform for Long-Term Environmental Monitoring for IoT Applications

Mihai T. Lazarescu

IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS (2013)