Distributed Authentication in a Multi-Zone Direct Acyclic Graph Blockchain for IoT Environment

نویسندگان

چکیده

This research paper presents an indepth examination of the security aspects Multiple Zone Direct Acyclic Graph Blockchain (MZ-DAG Blockchain) framework. The MZ-DAG features a layer that implements non-clonable physical function-based validation mechanism for authentication multiple certificates within blockchain. To enhance this layer, study proposes integration lightweight intrusion detection system specifically designed Blockchain. work is contribution to ongoing efforts secure and streamline implementation blockchain networks in resourceconstrained environments.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Blockchain: A Graph Primer

Bitcoin and its underlying technology Blockchain have become popular in recent years. Designed to facilitate a secure distributed platform without central authorities, Blockchain is heralded as a paradigm that will be as powerful as Big Data, Cloud Computing and Machine learning. Blockchain incorporates novel ideas from various fields such as public key encryption and distributed systems. As su...

متن کامل

LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy

BlockChain (BC) has attracted tremendous attention due to its immutable nature and the associated security and privacy benefits. BC has the potential to overcome security and privacy challenges of Internet of Things (IoT). However, BC is computationally expensive, has limited scalability and incurs significant bandwidth overheads and delays which are not suited to the IoT context. We propose a ...

متن کامل

Human Authentication Protocol for Distributed Computing Environment

Human authentication and identification is a process of proving human’s identity to a machine. This kind of protocol is useful where electronic devices carried by human like portable devices, smart card cannot be trusted. In this paper, we address the practical use of a human authentication protocol by Hopper and Blum [11] for a distributed computing environment. We argue that, in a distributed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ITM web of conferences

سال: 2023

ISSN: ['2271-2097', '2431-7578']

DOI: https://doi.org/10.1051/itmconf/20235201001