Fast and Efficient Security Scheme for Blockchain-Based IoT Networks

نویسندگان

چکیده

Internet of Things (IoT) has become widely used nowadays and tremendous increase in the number users raises its security requirements as well. The constraints on resources such low computational capabilities power demand lightweight cryptosystems. Conventional algorithms are not applicable IoT network communications because mentioned above. In this work, a novel efficient scheme for providing applications is introduced. proposes how can be enhanced distributed application by multilevel protection dynamic key generation data uploading transfer phases. Existing works rely single communication between sensing device attached gateway node. proposed scheme, session updated after each done applying principles cellular automata. system provides using incomparable benefits blockchain, random based same was implemented tested with known protocol verification tool called Automated Validation Security Protocols Applications (AVISPA). Results show that secure against various attacks. been compared related schemes result analysis shows new fast also.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy

BlockChain (BC) has attracted tremendous attention due to its immutable nature and the associated security and privacy benefits. BC has the potential to overcome security and privacy challenges of Internet of Things (IoT). However, BC is computationally expensive, has limited scalability and incurs significant bandwidth overheads and delays which are not suited to the IoT context. We propose a ...

متن کامل

Security Improvement of Dropper Elimination Scheme for IoT Based Wireless Networks

Eliminate the eavesdropper collusion occurredby the two or more devices communicating via optimal relay with centralized router using IOT network. The overall delay is reduced with increase in throughput.This paper studies the important of Received signal strength of wireless communication under eavesdropper collusion where detecting the malicious node. To provide knowledge about the security i...

متن کامل

Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme

In vehicular ad hoc networks, message authentication using proxy vehicles was proposed to reduce the computational overhead of roadside unites. In this type of message authentication schemes, proxy vehicles with verifying multiple messages at the same time improve computational efficiency of roadside unites when there are a large number of vehicles in their coverage areas. In this paper, first ...

متن کامل

An Efficient Security Scheme for Wireless Sensor Networks

In wireless sensor networks, sensor nodes are generally distributed in hostile environments so the security services such as confidentiality, authentication and integrity are very important. The basis of these security services is the key management. The majority of key managements use the random key pre-distribution mechanism based on the probability model. Thus, an adversary can easily get th...

متن کامل

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytim...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2022

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2022.029637