References
- M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, "Bubbles of Trust: A decentralized blockchain-based authentication system for IoT," Computers & Security, Vol. 78, Sep. 2018.
- S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," www.bitcoin.org, 2008.
- B. Park, T. Lee, and J. Kwak, "Blockchain-Based IoT Device Authentication Scheme," Journal of The Korea Institute of Information of Information Security & Cryptology, Vol. 27, No. 2, Apr. 2017.
- P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications," International Journal of Distributed Sensor Networks, Vol. 14, 2014.
- A. Moinet, B. Darties, and J. L. Baril, "Blockchain based trust & authentication for decentralized sensor networks," arXiv preprint arXiv:1706.01730, 2017.
- D. Kim, and J. Kwak, "Design of Improved Authentication Protocol for Sensor Networks in IoT Environment," Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 2, Apr. 2015.
- W. Choi, S. Kim, Y. Kim, Y. Park, and K. Ahn, "PUF-based encryption processor for the RFID systems," 2010 IEEE 10th International Conference on Computer and Information Technology, pp. 2323-2328, United Kingdom, Jun.-Jul. 2010.
- J. Park, S. Shin, and N. Kang, "Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things," The Journal of Korean of Communications and Information Sciences, Vol. 38B, No. 09, 2013.
- L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, "Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks," Proceedings of Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, 2006.
- A. A. Omar, M. S. Rahman, A. Basu, and S. Kiyomoto, "MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data," International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Springer, 2018.
- D. Duc, and K. Kim, "Defending RFID authentication protocols and against DoS attacks," Computer Communications, Journal of Computer Communications, 2011.
- W. Choi, S. Kim, Y. Kim, T. Yun, K. Ahn, and K. Han, "Design of PUF-based Encryption Processor and Mutual Authentication Protocol for Low-Cost RFID Authentication," The Journal of Korean Institute of Communications and Information Sciences, Vol. 39B, No. 12, Dec. 2014.
- M. Stamp, Information Security Textbook(Principles and Practice) 1st Ed., NY: John Willey & Sons Inc., 2005.
- P. Gope, J. Lee, and T. Quek, "Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, Vol. 13, No. 11, Nov. 2018.
- J. Lee, "BIDaas: Blockchain Based ID As a Service," IEEE Access, Vol. 6, 2018.
- E. Buchman, "Tendermint: Byzantine fault tolerance in the age of blockchains," M.Sc. Thesis, University of Guelph, Canada, June 2016.
- V. Buterin, "A next-generation smart contract and decentralized application platform," White paper, 2014.
- C. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, 1949.