A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value |
Zhang, Shiqiang
(Faculty of Information Technology, Beijing University of Technology)
Cao, Yang (School of Information, Beijing Wuzi University) Ning, Zhenhu (Faculty of Information Technology, Beijing University of Technology) Xue, Fei (School of Information, Beijing Wuzi University) Cao, Dongzhi (Faculty of Information Technology, Beijing University of Technology) Yang, Yongli (Faculty of Information Technology, Beijing University of Technology) |
1 | M. G. Masciotta, A. Barontini, L. I. S. F. Ramos, P. A. Mendes and P. B. L. C. O, "An overview on structural health monitoring: from the current state-of-the-art to new bio-inspired sensing paradigms," International Journal of Bio-Inspired Computation, vol. 14, no. 1, pp. 1-26, 2019. DOI |
2 | S. Kumari, H. Om, "Authentication Protocol for Wireless Sensor Networks Applications like Safety Monitoring in Coal Mines," Computer Networks, vol. 104, pp. 137-154, 2016. DOI |
3 | Y. Jeong, J. H. Park, "IoT and Smart City Technology: Challenges, Opportunities, and Solutions," Journal of Information Processing Systems, vol. 15, no. 2, pp. 233-238, 2019. DOI |
4 | O. Alfandi, A. Bochem, A. Kellner and D. Hogrefe, "Improving energy efficiency of data communication in a hybrid PKI-based approach for WSNs," in Proc. of 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), 2013. |
5 | B. Kadri, M. Feham and A. M Hamed, "Lightweight PKI for WSN PKI," The Journal of Security and Communication Networks, vol. 10, no. 2, pp. 135-141, 2010. |
6 | M. Prasad, R. Manoharan, "A secure certificate based authentication to reduce overhead for heterogeneous wireless network," in Proc. of International Conference on Advanced Computing & Communication Systems, 2017. |
7 | Novo, Oscar, "Blockchain Meets IoT: an Architecture for Scalable Access Management in IoT," IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1184-1195, 2018. DOI |
8 | Q. Nong, "Practical Secure Certificateless Cryptographic Protocol with Batch Verification for Intelligent Robot Authentication," in Proc. of International Conference on Mechatronics and Intelligent Robotics, pp. 483-488, 2018. |
9 | M. A. Khan, K. Salah, "IoT security: Review, blockchain solutions, and open challenges," Future Generation Computer Systems, vol. 82, pp. 395-411, 2018. DOI |
10 | Z. Bao, W. Shi, D. He and K. R. Chood, "Iotchain: A three-tier blockchain-based iot security architecture," arXiv preprint arXiv:1806.02008, 2018. |
11 | P. K. Sharma, S. Singh, Y. Jeong and J. H. Park, "Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks," IEEE Communications Magazine, vol. 55, no. 9, pp. 78-85, 2017. DOI |
12 | M. T. Hammi, B. Hammi, P. Bellot and A. Serhrouchni, "Bubbles of Trust: A decentralized blockchain-based authentication system for IoT," Computers & Security, vol. 78, pp. 126-142, 2018. DOI |
13 | W. Dai, C. Dai, K. R. Choo, C. Cui, D. Zou and H. Jin, "SDTE: A secure blockchain-based data trading ecosystem," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 725-737, 2019. DOI |
14 | R. Almadhoun, M. Kadadha, M. Alhemeiri, M. Alshehhi and K. Salah, "A user authentication scheme of iot devices using blockchain-enabled fog nodes," in Proc. of 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), 2018. |
15 | S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," 2008. |
16 | M. El Ghazouani, M. A. El Kiram and L. Er-Rajy, "Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication," International Journal of Communication Networks and Information Security, vol. 11, no. 1, pp. 175-184, 2019. |
17 | X. Yue, H. Wang, D. Jin, M. Li and W. Jiang, "Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control," Journal of medical systems, vol. 40, no. 10, pp. 218, 2016. DOI |
18 | M. U. Hassan, M. H. Rehmani and J. Chen, "Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions," Future Generation Computer Systems, vol. 97, pp. 512-529, 2019. DOI |
19 | M. Polina, O. Lucy, Y. Yury, O. Alex, B. Alex, P. Pavel, I. Eugene, A. Alexander, R. Konstantin and Z. Alexander, "Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare," Oncotarget, vol. 9, no. 5, pp. 5665-5690, 2018. DOI |
20 | J. Shi, S. Chengchao, H. Lei and X. Mengxi, "Smart grid short-term load estimation model based on BP neural network," International Journal of Computing Science and Mathematics, vol. 11, no. 2, pp. 123-136, 2020. DOI |
21 | X. Cai, P. Wang, L. Du, Z. Cui, W. Zhang and J. Chen, "Multi-Objective Three-Dimensional DV-Hop Localization Algorithm With NSGA-II," IEEE Sensors Journal, vol. 19, no. 21, pp. 10003-100015, 2019. DOI |
22 | M. Tao, J. Zuo, Z. Liu, A. Castiglione and F. Palmieri, "Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes," Future Generation Computer Systems, vol. 78, pp. 1040-1051, 2018. DOI |
23 | T. Mekki, I. Jabri, A. Rachedi and M. B. Jemaa, "Vehicular cloud networking: evolutionary game with reinforcement learning-based access approach," Int. J. Bio-Inspired Computation,13, 45-58, 2019. DOI |
24 | E. P. K. Gilbert, B. Kaliaperumal, E. B. Rajsingh, M. Lydia and A. I. Selvakumar, "Trust aware nature inspired optimized routing in clustered wireless sensor networks," International Journal of Bio-Inspired Computation, vol. 14, no. 2, pp. 103-113, 2019. DOI |
25 | Z. Cui, X. Xu, F. Xue, X. Cai and J. Chen, "Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios," IEEE Transactions on Services Computing, vol. 13, no. 4, pp. 685-695, 2020. DOI |
26 | S. Asghari, N. J. Navimipour, "Cloud service composition using an inverted ant colony optimization algorithm," International Journal of Bio-Inspired Computation, vol. 13, no. 4, pp. 257-268, 2019. DOI |
27 | X. Cai, Y. Niu, S. Geng, J. Zhang, Z. Cui, J. Li and J. Chen, "An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search," Concurrency and Computation: Practice and Experience, vol. 32, no. 5, pp. e5478, 2020. DOI |
28 | P. Wang, J. Huang, Z. Cui, L. Xie and J. Chen, "A Gaussian error correction multi-objective positioning model with NSGA-II," Concurrency and Computation: Practice and Experience, vol. 32, no. 5, pp. e5464, 2020. DOI |
29 | S. Hati, D. De and A. Mukherjee, "Bio-inspired innovative green fault recovery modelling for macro-femtocell mobile network," International Journal of Bio-Inspired Computation, vol. 14, no. 3, pp. 181-189, 2019. DOI |
30 | Z. Shen, Y. Niu, Y. Zuo, Q. Xie and Z. Chen, "Power control of wind energy conversion system under multiple operating regimes with deep residual recurrent neural network: theory and experiment," International Journal of Computing Science and Mathematics, vol. 10, no. 4, pp. 413-428, 2019. DOI |
31 | W. H. Bangyal, J. Ahmed and H. T. Rauf, "A modified bat algorithm with torus walk for solving global optimization problems," International Journal of Bio-Inspired Computation, vol. 15, no. 1, pp. 1-13, 2020. DOI |
32 | K. G. Dhal, S. Das, "Local search-based dynamically adapted bat algorithm in image enhancement domain," International Journal of Computing Science and Mathematics, vol. 11, no. 1, pp. 1-28, 2020. DOI |
33 | S. Sharma, "Respondents view of novel framework for data protection in social networking sites: an analysis," International Journal of Computing Science and Mathematics, vol. 10, no. 1, pp. 22-31, 2019. DOI |
34 | Y. Lu, X. Huang, Y. Dai, S. Maharjan and Y. Zhang, "Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT," IEEE Transactions on Industrial Informatics, vol. 16, no. 6, pp. 4177-4186, 2020. DOI |
35 | Z. Cui, L. Du, P. Wang, X. Cai and W. Zhang, "Malicious code detection based on CNNs and multi-objective algorithm," Journal of Parallel and Distributed Computing, vol. 129, pp. 50-58, 2019. DOI |
36 | Z. Cui, F. Xue, S. Zhang, X. Cai and J. Chen, "A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN," IEEE Transactions on Services Computing, vol. 13, no. 2, pp. 241-251, 2020. DOI |
37 | P. Gope, T. Hwang, "A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-time Application Data Access in Wireless Sensor Networks," IEEE Transactions on Industrial Electronics, vol. 63, no. 11, pp. 7124-7132, 2016. DOI |
38 | J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013. DOI |