An identity management and authentication scheme based on redactable blockchain for mobile networks

J Xu, K Xue, H Tian, J Hong, DSL Wei… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… published as a transaction, and transactions are packaged into … It is worth noting that miners
who add data are independentNetwork operators authenticate users through SSIs and their …

BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks

C Lin, D He, X Huang, N Kumar… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
verification (eg [18]–[20]) in order to minimize verification cost in VANETs. Note that other
signatures with batch verification … protocol, which is of independent interests. Finally, we give …

A survey on security and authentication in wireless body area networks

B Narwal, AK Mohapatra - Journal of Systems Architecture, 2021 - Elsevier
… discussion on authentication, design, and development of the authentication scheme and its
… research issues, recommendations for future authentication schemes and future trends for …

Blockchain-assisted secure device authentication for cross-domain industrial IoT

M Shen, H Liu, L Zhu, K Xu, H Yu, X Du… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
authentication mechanism for wireless sensor networks. … transactions and writes them into
blocks. This domain-specific information will be acquired by other domains for authentication. …

A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles

Z Xu, W Liang, KC Li, J Xu, H Jin - Journal of Parallel and Distributed …, 2021 - Elsevier
… The blockchain is a distributed peer-to-peer network [22], which can also be regarded as a
shared distributed ledger that records all transaction information from the very first time since …

A lightweight authentication and authorization framework for blockchain-enabled IoT network in health-informatics

M Tahir, M Sardaraz, S Muhammad, M Saud Khan - Sustainability, 2020 - mdpi.com
… novel authentication and authorization framework for Blockchain-enabled IoT networks using
Transaction latency depends on the size of a transaction. Moreover, an increase in the size …

A blockchain-enabled deduplicatable data auditing mechanism for network storage services

Y Xu, C Zhang, G Wang, Z Qin… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
overhead [11], [12], [13]. However, when data auditing is trivially performed in a network
who lack mutual trust will independently generate verification metadata for the duplicate file, …

SCANet: sensor-based continuous authentication with two-stream convolutional neural networks

Y Li, H Hu, Z Zhu, G Zhou - ACM Transactions on Sensor Networks  …, 2020 - dl.acm.org
authentication monitors the security of a system throughout the login session on mobile
devices. In this article, we present SCANet, a two-stream convolutional neural network–based …

Blockchain-based decentralized authentication modeling scheme in edge and IoT environment

M Zhaofeng, M Jialin, W Jihui… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
authentication system deployment includes the independentauthentication of all users on
the platform. After the blockchain network was created, transactions, initiated by users through

Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles

Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… protocols have been proposed to secure in-vehicle networks. A broadcast authentication …
authentication code to protect controller area network (CAN) communications. Moreover, they …