Blockchain is an innovated and revolutionized technology, which has attracted wide attention from academia and industry. At present, blockchain has been widely used in certificate management and credential delivery in network access authentication. In a large-scale multidomain Internet of Things (IoT) environment, one of the important issues is cross-domain key sharing and secure data exchange between different IoT. In this paper, aiming at the multidomain authentication requirements of the IoT, this paper introduces the blockchain cross-chain technology into the cross-domain authentication process of the IoT and proposes an effective cross-domain authentication scheme of the IoT based on the improved PBFT algorithm. First, an architecture ...
With the development of the Internet of Things and the increase of intelligent vehicles, the Interne...
Communication security between IoT devices is a major concern in this area, and the blockchain has r...
Authentication and access control are critical in addressing IoT security and privacy issues. Howeve...
The Industrial Internet of Things (IIoT) holds significant potential for improving efficiency, quali...
Nowadays, it is still a major challenge to design a secure cross-domain authentication protocol for ...
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary techno...
This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve ...
With the proliferation of intelligent devices in the Internet of Things (IoT), the security of IoT d...
A consortium system can leverage information to improve workflows, accountability, and transparency ...
Internet of Things is a recent potential advancement in an IT arena, consists of multiple smart thin...
The fifth-generation mobile communication technology (5G) provides high-bandwidth and low-latency da...
As technology improves with the development of the internet. Entrepreneurs and innovator are finding...
In a distributed system, cross-domain access control is an important mechanism to realize secure dat...
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed ...
The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and c...
With the development of the Internet of Things and the increase of intelligent vehicles, the Interne...
Communication security between IoT devices is a major concern in this area, and the blockchain has r...
Authentication and access control are critical in addressing IoT security and privacy issues. Howeve...
The Industrial Internet of Things (IIoT) holds significant potential for improving efficiency, quali...
Nowadays, it is still a major challenge to design a secure cross-domain authentication protocol for ...
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary techno...
This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve ...
With the proliferation of intelligent devices in the Internet of Things (IoT), the security of IoT d...
A consortium system can leverage information to improve workflows, accountability, and transparency ...
Internet of Things is a recent potential advancement in an IT arena, consists of multiple smart thin...
The fifth-generation mobile communication technology (5G) provides high-bandwidth and low-latency da...
As technology improves with the development of the internet. Entrepreneurs and innovator are finding...
In a distributed system, cross-domain access control is an important mechanism to realize secure dat...
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed ...
The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and c...
With the development of the Internet of Things and the increase of intelligent vehicles, the Interne...
Communication security between IoT devices is a major concern in this area, and the blockchain has r...
Authentication and access control are critical in addressing IoT security and privacy issues. Howeve...