4.3 Article

BUA: a blockchain-based unlinkable authentication scheme for mobile IoT

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

SoK: DAG-based Blockchain Systems

Qin Wang et al.

Summary: Limitations in latency and scalability of classical blockchain systems hinder their adoption and application. Reconstructed blockchain systems using Directed Acyclic Graph (DAG) have been proposed to address these limitations and enable fast confirmation and high scalability. However, there is a need for systematic work that summarizes DAG techniques in this field. This Systematization of Knowledge (SoK) provides a comprehensive analysis of existing and ongoing DAG-based blockchain systems, evaluating them from various perspectives and discussing trade-offs, challenges, and future research directions.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Theory & Methods

Charlotte: Reformulating Blockchains into a Web of Composable Attested Data Structures for Cross-Domain Applications

Isaac Sheff et al.

ACM TRANSACTIONS ON COMPUTER SYSTEMS (2023)

Article Computer Science, Information Systems

A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage

Reyhaneh Rabaninejad et al.

Summary: In this paper, a public shared data auditing mechanism is proposed, which provides identity privacy and collusion resistant user revocation simultaneously by employing a new proxy re-signature scheme. The proposed protocol requires only lightweight computations at the user side for signing data blocks in real-time online phase.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

A distributed dynamic authorisation method for Internet plus medical & healthcare data access based on consortium blockchain

Boyi Xu et al.

Summary: Privacy protection for medical and healthcare data is a bottleneck issue in Internet information fusion, addressed by proposing a distributed dynamic authorisation method based on blockchain technology. This method includes URLs in the authorisation information to indicate data access interface and separates patients' privacy data from the blockchain for improved data processing efficiency. A case study demonstrating the contents of smart contracts validates the usability of the proposed authorisation method for medical data access between different hospitals.

ENTERPRISE INFORMATION SYSTEMS (2022)

Article Computer Science, Information Systems

Blockchain-Enabled Tripartite Anonymous Identification Trusted Service Provisioning in Industrial IoT

Hui Yang et al.

Summary: This article presents a novel private blockchain-enabled trusted anonymous access architecture for Industry IoT (IIoT), aiming to address the issues of terminal device credibility and privacy protection. A blockchain-enabled tripartite anonymous identification trusted service provisioning scheme is proposed to achieve a balanced tradeoff among credibility, confidentiality, and efficiency.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Building trust of Blockchain-based Internet-of-Thing services using public key infrastructure

Wattana Viriyasitavat et al.

Summary: With the advancement of hardware, software, and Internet infrastructure, the number of smart Internet of Things (IoT) devices is increasing. However, this also raises concerns about security due to the evolving IoT scope and mass communications. In order to address the trust issue, this paper presents a generic architecture design that incorporates Public Key Infrastructure (PKI) to establish trust for Blockchain-based IoT (BIoT) services. The experiment shows that this design is scalable and specification languages can be useful in expressing requirements, allowing users to specify the quality of BIoT services without deep knowledge of Blockchain.

ENTERPRISE INFORMATION SYSTEMS (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Achieving Scalability and Load Balance across Blockchain Shards for State Sharding

Canlin Li et al.

Summary: Sharding technique is considered a promising solution for improving blockchain scalability. This paper addresses the challenges of high cross-shard transaction ratio and imbalanced workloads in implementing a sharded blockchain. It proposes a fine-grained account-allocation strategy, a community-aware account partition algorithm, and a sharding protocol named Transformers to tackle these challenges. The evaluation results demonstrate the superiority of the proposed protocol in terms of throughput, latency, cross-shard TX ratio, and transaction pool queue size.

2022 41ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2022) (2022)

Article Computer Science, Information Systems

Collusion-resistant protocols for private processing of aggregated queries in distributed databases

Leanne Rylands et al.

Summary: The article introduces two protocols for protecting privacy while answering aggregated queries in a large distributed database without exposing records in each subdatabase. Experiments show that the AMIP protocol outperforms all other applicable algorithms, especially in terms of communication complexity.

DISTRIBUTED AND PARALLEL DATABASES (2021)

Article Computer Science, Theory & Methods

Privacy-preserving quality prediction for edge-based IoT services

Yiwen Zhang et al.

Summary: The DEQP2 model is a distributed edge QoS prediction model with privacy protection, employing the Laplace vector mechanism and distributed edge differential privacy algorithm. Experiments conducted on the EdgeQoS dataset showed that the DEQP2 model provides measurable privacy preservation without significantly reducing accuracy.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Information Systems

A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing

Yuting Li et al.

Summary: MEC technology drives the need for new security technologies, as existing schemes can no longer meet the real-time and lightweight requirements. The proposed anonymous identity-based scheme provides secure and efficient communication for lightweight devices, while also fully protecting user anonymity.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Information Systems

Machine-Learning-Based Efficient and Secure RSU Placement Mechanism for Software-Defined-IoV

Sudha Anbalagan et al.

Summary: The paradigm shift from vehicular networks to the Internet of Vehicles (IoV) has led to the need for efficient resource management and security enhancement in the dynamic and heterogeneous IoV environment. This work proposes an optimal RSU placement algorithm and a malicious IoV detection algorithm to improve network efficiency and security in an SD-IoV network. Additionally, a distributed ML-based intrusion detection system (IDS) is proposed to prevent disastrous security failures, with simulation results showing significant improvements in transmission delay and malicious IoV detection accuracy compared to traditional ML algorithms.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Interdisciplinary Applications

Exploring the intellectual cores of the blockchain-Internet of Things (BIoT)

Y. P. Tsang et al.

Summary: This study examines the intellectual core of BIoT using a co-citation proximity analysis-based systematic review, identifying nine categories within the core and providing a structural framework for further research in this underexplored area.

JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT (2021)

Article Computer Science, Information Systems

A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing

Xiaoying Jia et al.

IEEE SYSTEMS JOURNAL (2020)

Article Automation & Control Systems

Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure

Jing Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes

Chao Lin et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks

Jing Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Two-Factor Authentication for IoT With Location Information

Muhammad Naveed Aman et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Optimizing Bloom Filter: Challenges, Solutions, and Comparisons

Lailong Luo et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Device-Enhanced MEC: Multi-Access Edge Computing (MEC) Aided by End Device Computation and Caching: A Survey

Mahshid Mehrabi et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

Vikas Hassija et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Bubbles of Trust: A decentralized blockchain-based authentication system for IoT

Mohamed Tahar Hammi et al.

COMPUTERS & SECURITY (2018)

Review Computer Science, Theory & Methods

IoT security: Review, blockchain solutions, and open challenges

Minhaj Ahmad Khan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Survey on Multi-Access Edge Computing for Internet of Things Realization

Pawani Porambage et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Hardware & Architecture

Consolidate IoT Edge Computing with Lightweight Virtualization

Roberto Morabito et al.

IEEE NETWORK (2018)

Article Computer Science, Information Systems

Mobile Edge Computing: A Survey

Nasir Abbas et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Internet of things: Survey on security

Diego Mendez Mena et al.

INFORMATION SECURITY JOURNAL (2018)

Article Engineering, Electrical & Electronic

EdgeIoT: Mobile Edge Computing for the Internet of Things

Xiang Sun et al.

IEEE COMMUNICATIONS MAGAZINE (2016)

Article Computer Science, Information Systems

Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications

Xi-Jun Lin et al.

COMPUTERS & SECURITY (2015)

Article Engineering, Electrical & Electronic

Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions

Daojing He et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2012)

Article Engineering, Electrical & Electronic

A Scalable Robust Authentication Protocol for Secure Vehicular Communications

Lei Zhang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2010)