Article
Computer Science, Information Systems
M. Indushree, Manish Raj, Vipul Kumar Mishra, R. Shashidhara, Ashok Kumar Das, K. Vivekananda Bhat
Summary: Designing a secure and efficient authentication protocol for mobility network is crucial and challenging due to network attacks in seamless roaming of mobile users and broadcast nature of communication. The proposed Mobile-Chain is a secure blockchain-based authentication system that protects user privacy and provides provable security. Its implementation on the ethereum blockchain platform using smart contracts shows robustness against security threats in mobility networks.
COMPUTER COMMUNICATIONS
(2023)
Article
Mathematics
Jan Lansky, Amir Masoud Rahmani, Saqib Ali, Nasour Bagheri, Masoumeh Safkhani, Omed Hassan Ahmed, Mehdi Hosseinzadeh
Summary: The paper introduces a lightweight authentication protocol BCmECC based on Elliptic Curve Cryptography, which relies on a public blockchain to validate users' public keys for security. The protocol is evaluated heuristically and formally, demonstrating a high level of security and comparing favorably with other blockchain-based authentication protocols in terms of security.
Article
Computer Science, Information Systems
Mustafa Kara, Hisham R. J. Merzeh, Muhammed Ali Aydin, Hasan Huseyin Balik
Summary: Confidentiality, availability, integrity, authentication, and non-repudiation are the top priorities for secure communication. Traditional authentication mechanisms have vulnerabilities that lead to insecure communication. This paper proposes a decentralized blockchain-based identity authentication mechanism, VoIPChain, to provide secure and private communication in VoIP networks.
COMPUTER COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Yingyuan Yang, Xueli Huang, Jiangnan Li, Jinyuan Stella Sun
Summary: By leveraging users' behavioral data sampled by various sensors, implicit authentication (IA) eliminates the need for explicit actions such as remembering and entering passwords. However, existing IA schemes face challenges of false positives and false negatives due to users' behavior changes and noise. To address this, we propose BubbleMap (BMap), a framework that enhances the performance of IA systems in terms of security, usability, and reducing the equal error rate (EER). Evaluations show that BMap significantly improves the performance of IA schemes with minimal impact on energy consumption.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Information Systems
Yan Zhang, Dianqi Han, Ang Li, Lili Zhang, Tao Li, Yanchao Zhang
Summary: MagAuth is a dual-factor authentication scheme that utilizes magnetic wrist wearables to enhance the security and usability of password-based authentication on mobile touchscreen devices. Users enroll a self-chosen unlock pattern or touch gesture, performing it with the same hand as the magnetic wrist wearable, to verify their identity.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Information Systems
Sulaiman M. Karim, Adib Habbal, Shehzad Ashraf Chaudhry, Azeem Irshad
Summary: This article examines the benefits of using blockchain in a 5G-based Internet of Vehicles (IoV) environment. It proposes and evaluates a novel blockchain-based secure data exchange scheme, based on the Elliptic Curve Cryptography algorithm, that aims to eliminate potential attacks on the IoV environment. The scheme is validated for security and privacy using the Real-or-Random oracle model, Scyther tool, and MIRACL for assessing computational and communication overheads. BSDCE-IoV demonstrates better performance in terms of security, functionality, and time delay compared to recent work in IoV security.
Article
Computer Science, Information Systems
Abir El Azzaoui, Min Yeong Choi, Chang Hoon Lee, Jong Hyuk Park
Summary: During the global pandemic, cloud videoconferencing applications have emerged as a solution for millions of schools, companies, governments, and individuals by replacing face-to-face meetings with virtual meetings. However, security and privacy concerns arise, which can be addressed by a decentralized blockchain-based authentication mechanism proposed in this paper.
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Azees Maria, Arun Sekar Rajasekaran, Fadi Al-Turjman, Chadi Altrjman, Leonardo Mostarda
Summary: This paper proposes a blockchain-based authentication protocol for intelligent transport systems (VANET), which achieves anonymous authentication, privacy, and integrity preservation while introducing conditional privacy. The scheme is of great significance in improving the efficiency and security of VANET systems.
Article
Computer Science, Artificial Intelligence
Righa Tandon, Ajay Verma, P. K. Gupta
Summary: This paper proposes a dual blockchain-based decentralized architecture for vehicle authentication and secure communication within the network, which improves network efficiency, security, and transmission speed.
EXPERT SYSTEMS WITH APPLICATIONS
(2024)
Article
Computer Science, Information Systems
Myeonghyun Kim, Joonyoung Lee, Kisung Park, Yohan Park, Kil Houm Park, Youngho Park
Summary: Car-sharing systems can solve urban problems by providing shared vehicles and reducing personal vehicle usage. However, security concerns exist due to information being transmitted through a public channel. Designing a secure authentication protocol and a decentralized scheme using blockchain technology is essential for addressing these issues.
Article
Engineering, Multidisciplinary
PeiYun Zhang, MengChu Zhou, QiXi Zhao, Abdullah Abusorrah, Omaimah O. Bamasag
Summary: This research presents a performance-optimized consensus mechanism based on node classification, which enhances the throughput and fault tolerance of the blockchain system by dividing nodes into different categories based on trust values. Experimental results demonstrate that the proposed mechanism outperforms popular methods in terms of throughput, consumption, and fault tolerance, thus advancing the field of consortium blockchains.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2021)
Article
Computer Science, Hardware & Architecture
Jiawen Kang, Zehui Xiong, Dusit Niyato, Shengli Xie, Dong In Kim
Summary: This article discusses the use of permissioned blockchain technology to propose a decentralized data management system in B5G drone networks, aiming to address security challenges in data sharing. By introducing credit as a metric and proposing a credit-based miner selection scheme, the effectiveness of the proposed approach for secure data sharing in drone networks is demonstrated through numerical results.
Article
Computer Science, Information Systems
Anju Devi, Amit Kumar, Geetanjali Rathee, Hemraj Saini
Summary: The Industrial IoT is driving advancements in the industrial era, but data security and privacy pose challenges in IIoT applications. This paper proposes a new hybrid authentication approach using PKI and ECC algorithms, implemented on the Ethereum blockchain and IPFS cloud server. The approach provides privacy, high authentication accuracy, throughput, and reduced latency compared to existing methods.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Review
Multidisciplinary Sciences
Zuriati Ahmad Zukarnain, Amgad Muneer, Mohd Khairulanuar Ab Aziz
Summary: Smartphone devices are crucial for our daily activities and require secure authentication methods to protect transactions. However, existing methods have vulnerabilities, driving the need for the best authentication solution.
Article
Engineering, Electrical & Electronic
Durbadal Chattaraj, Basudeb Bera, Ashok Kumar Das, Sourav Saha, Pascal Lorenz, YoungHo Park
Summary: In the Internet of Vehicles (IoV), the blockchain-assisted certificateless key agreement protocol Block-CLAP provides superior security and lower communication and computational overheads compared to existing competing authentication schemes.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)