Computer Science ›› 2023, Vol. 50 ›› Issue (5): 329-347.doi: 10.11896/jsjkx.220400169
• Information Security • Previous Articles Next Articles
ZHANG Shue, TIAN Chengwei, LI Baogang
CLC Number:
[1]HUSSAIN M,MEHMOOD A,KHAN S,et al.Authentication techniques and methodologies used in wireless body area networks[J].Journal of Systems Architecture,2019,101(5):1-28. [2]NAKAMOTO S.Bitcoin:A peer to peer electronic cash system[EB/OL].https://bitcoin.org/bitcoin.pdf. [3]WENG J,WENG J,ZHANG J,et al.DeepChain:Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive[J].IEEE Transactions on Dependable and Secure Computing,2020,18(5):2438-2455. [4]MAKHDOOM I,ABOLHASAN M,ABBAS H,et al.Block-chain's adoption in IoT:The challenges,and a way forward[J].Journal of Network and Computer Applications,2019,125(2):251-279. [5]LIU Y,HE D,OBAIDAT M S,et al.Blockchain-based identity management systems:A review[J].Journal of Network and Computer Applications,2020,166(15):245-255. [6]LI Q,SHU Z X,YU X,et al.Authentication Mechanism inBlockchain Systems[J].Journal of Command and Control,2019,5(1):1-17. [7]YANG L.The blockchain:State-of-the-art and research challen-ges[J].Journal of Industrial Information Integration,2019,15(4):80-90. [8]LAMPORT L,SHOSTAK R,PEASE M.The Byzantine Gene-rals Problem[J].ACM Transactions on Programming Languages and Systems,1982,4:382-401. [9]DURRANI A.Research and Applied Perspective to Blockchain Technology:A Comprehensive Survey[J].Applied Sciences,2021,11(14):245-258. [10]CHRISTIDIS K,DEVETSIKIOTIS M.Blockchains and SmartContracts for the Internet of Things[J].IEEE Access,2016,4:2292-2303. [11]LAMPORT L.LAMPORT,Password Authentication with Insecure Communication[J].Communications of the ACM,1981,24(11):770-772. [12]SHANKAR T N,RAKESH P,BHARGAWA R T,et al.Providing Security to Land Record with the computation of Iris,Blockchain,and One Time Password[C]//Proceedings of the 2021 International Conference on Computing,Communication,and Intelligent Systems(ICCCIS).Greater Noida,India,2021:226-231. [13]KANG J,RONG Y,HUANG X,et al.Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains[J].IEEE Transactions on Industrial Informatics,2017,15(5):840-852. [14]ZHANG M,WANG L,YANG J.A Blockchain-Based Authentication Method with One-Time Password[C]//Proceedings of the 2019 IEEE 38th International Performance Computing and Communications Conference(IPCCC).London,UK,2019:1-9. [15]BUCCAFURRI F,ANGELIS V D,NARDONE R.SecuringMQTT by Blockchain-Based OTP Authentication[J].Sensors,2020,20(7):261-269. [16]JAYAN A P,BALASUBRAMANI A,KAIKOTTIL A,et al.An enhanced scheme for authentication using OTP and QR code for MQTT protocol[J].International Journal of Recent Technology and Engineering,Blue Eyes Intelligence Engineering and Sciences Publication,2019,7:70-75. [17]ERDEM E,SANDKKAYA M T.OTPaaS-One Time Password as a Service[J].IEEE Transactions on Information Forensics and Security,2019,14(3):743-756. [18]EL-BOOZ S A,ATTIYA G,EL-FISHAWY N.A secure cloud storage system combining time-based one-time password and automatic blocker protocol[J].EURASIP Journal on Information Security,2016,37(1):1-13. [19]LAI C,DING Y.A Secure Blockchain-Based Group MobilityManagement Scheme in VANETs[C]//Proceedings of the 2019 IEEE/CIC International Conference on Communications in China(ICCC).Changchun,China,2019:340-345. [20]ZHANG Z,XIAO Y,MA Z,et al.6G Wireless Networks:Vision,Requirements,Architecture,and Key Technologies[J].IEEE Vehicular Technology Magazine,2019,14(3):28-41. [21]ZHANG R,XUE R,LIU L.Security and privacy on blockchain[J].ACM Computing Surveys,2020,52(3):1-34. [22]LIN I C,LIAO T C.A Survey of Blockchain Security Issues and Challenges[J].International Journal of Network Security,2017,19(5):653-659. [23]WANG C,CHEN S,CHEN S,et al.Trust Management for Reliable Cross-Platform Cooperation Based on Blockchain[C]//2021 IEEE International Conference on Web Services (ICWS).Chicago:IEEE,2021:629-634. [24]LI X,JIANG P,CHEN T,et al.A Survey on the Security of Blockchain Systems[J].Future Generation Computer Systems,2018,16(8):258-268. [25]MOHANTA B K,PAN S S,JENA D.An Overview of Smart Contract and Use Cases in Blockchain Technology[C]//Proceedings of the 2018 9th International Conference on Computing,Communication and Networking Technologies(ICCCNT).Bengaluru,India,2018:1-4. [26]BLACK P,LAYTON R.Be Careful Who You Trust:Issues with the Public Key Infrastructure[C]//Proceedings of the 2014 Fifth Cybercrime and Trustworthy Computing Conference.Auckland,New Zealand,2015:12-21. [27]SHPHEI K,YOSHIAKI S,MASAMI M,et al.Cross-Certification Towards Distributed Authentication Infrastructure:A Case of Hyperledger Fabric[J].IEEE Access,2020,8:135742-135757. [28]YAN J,HANG X,YANG B,et al.Blockchain Based PKI and Certificates Management in Mobile Networks[C]//Proceedings of the 2020 IEEE 19th International Conference on Trust,Security and Privacy in Computing and Communications(Trust-Com).Guangzhou,China,2020:1764-1770. [29]YAKUBOV A,SHBAIR W,WALLBOM A,et al.A Block-chain-Based PKI Management Framework[C]//2018 IEEE/IFIP Network Operations and Management Symposium.Taipei:IEEE,2018:1-6. [30]SHEN H,ZHOU J,CAO Z,et al.Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks[J].IEEE Internet of Things Journal,2020,7(7):6610-6622. [31]BECKWITH E,THAMILARASU G.BA-TLS:Blockchain Authentication for Transport Layer Security in Internet of Things[C]//2020 7th International Conference on Internet of Things:Systems,Management and Security(IOTSMS).2020:268-275. [32]SAHA S,CHATTARAJ D,BERA B,et al.Consortium blockchain-enabled access control mechanism in edge computing based generic Internet of Things environment[J].Transactions on Emerging Telecommunications Technologies,2021,32(6):1-34. [33]WANG Z,LIN J,CAI Q,et al.Blockchain-based CertificateTransparency and Revocation Transparency[J].IEEE Transactions on Dependable and Secure Computing,2020,19(1):681-697. [34]ZHAO G,DI B,HE H.A novel decentralized cross-domain identity authentication protocol based on blockchain[J].Transactions on Emerging Telecommunications Technologies,2022,33(1):4377-4393. [35]BAO S,LEI A,CRUICKSHANK H,et al.A Pseudonym Certi-ficate Management Scheme Based on Blockchain for Internet of Vehicles[C]//2019 IEEE International Conference on Dependable,Autonomic and Secure Computing,International Confe-rence on Pervasive Intelligence and Computing,International Confe-rence on Cloud and Big Data Computing,International Conference on Cyber Science and Technology Congress(DASC/PiCom/CBDCom/CyberSciTech).Fukuoka:IEEE,2019:28-35. [36]SIMPLICIO M A,COMINETTI E L,PATIL H K,et al.ACPC:Efficient revocation of pseudonym certificates using activation codes[J].Ad hoc networks,2019,7(90):1-14. [37]CHO E,PERERA M.Efficient Certificate Management in Block-chain based Internet of Vehicles[C]//2020 20th IEEE/ACM International Symposium on Cluster,Cloud and Internet Computing(CCGRID).Melbourne,VIC,Australia:IEEE,2020:794-797. [38]MATSUMOTO S,REISCHUK R.IKP:Turning a PKI Around with Decentralized Automated Incentives[C]//2017 IEEE Symposium on Security and Privacy(SP).San Jose:IEEE,2017:410-426. [39]LEIDING B,CAP C H,MUNDT T,et al.Authcoin:Validation and Authentication in Decentralized Networks[J].Cryptography and Security,2016,5:121-134. [40]WON J,SINGLA A,BERTINO E,et al.Decentralized PublicKey Infrastructure for Internet-of-Things[C]//2018 IEEE Mi-litary Communications Conference(MILCOM).Los Angeles:IEEE,2018:907-913. [41]SINGLA A,BERTINO E.Blockchain-Based PKI Solutions for IoT[C]//2018 IEEE 4th International Conference on Collaboration and Internet Computing(CIC).Philadelphia:IEEE,2018:9-15. [42]QIN B,HUANG J K,WANG Q,et al.Cecoin:A decentralized PKI mitigating MitM attacks[J].Future Generation Computer Systems,2020,107:805-815. [43]HUANG Y X,WANG Y W,CHEN W X,et al.PKI cross-domain authentication model based on alliance chain[J].Computer Engineering and Design,2021,42(11):3043-3051. [44]CHIU W Y,MENG W,JENSEN C D.Chain PKI-TowardsEthash-based Decentralized PKI with Privacy Enhancement[C]//Proceedings of the 2021 IEEE Conference on Dependable and Secure Computing(DSC).Aizuwakamatsu,Fukushima,Japan,2021:1-8. [45]SARKAR A,SINGH B K.A review on performance,security and various biometric template protection schemes for biometric authentication systems[J].Multimedia Tools and Applications,2020,79(3):27721-27776. [46]TOUTARA F,SPATHOULAS G.A distributed biometric au-thentication scheme based on blockchain[C]//Proceedings of the 2020 IEEE International Conference on Blockchain(Blockchain).Rhodes,Greece,2020:470-475. [47]LEE Y K,JEONG J.Securing biometric authentication systemusing blockchain[J].ICT Express,2021,7(3):322-326. [48]ZHOU Z,LI L X,GUO S,et al.Biometric and password two-factor cross domain authentication scheme based on blockchain technology[J].Journal of Computer Applications,2018,38(6):1620-1627. [49]XU,Y,MENG,Y,ZHU H.An Efficient Double-Offloading Biometric Authentication Scheme Based on Blockchain for Cross Domain Environment[J].Wireless Personal Communications,2022,125:599-618. [50]BAO D,YOU L.Two-factor identity authentication schemebased on blockchain and fuzzy extractor[J].Soft Computing,2021,27:1091-1103. [51]KUMAR M,PRASAD M,RAJU U.BMIAE:Blockchain-basedMulti-instance Iris Authentication using Additive ElGamal Homomorphic Encryption[J].IET Biometrics,2020,9(4):165-177. [52]DORRI A,KANHERE S S,JURDAK R,et al.Blockchain for IoT Security and Privacy:The Case Study of a Smart Home[C]//Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops(PerCom Workshops).Kona,HI,USA,2017:618-623. [53]OUADDAH A,ELKALAM A A,OUAHMAN A A.FairAc-cess:a new Blockchain-based access control framework for the Internet of Things[J].Security and Communication Networks,2016,9(18):5943-5964. [54]SHARMA R,CHAKRABORTY S.BlockAPP:Using Block-chain for Authentication and Privacy Preservation in IoV[C]//Proceedings of the 2018 IEEE Globecom Workshops(GC Wkshps).Abu Dhabi,United Arab Emirates,2018:1-6. [55]LI L,LIU J,CHENG L,et al.Creditcoin:a privacy-preservingblockchain-based incentive announcement network for communications of smart vehicles[J].IEEE Transactions on Intelligent Transportation Systems,2018,19(7):2204-2220. [56]LUO B,LI X,WENG J,et al.Blockchain enabled trust-based location privacy protection scheme in VANET[J].IEEE Transactions on Vehicular Technology,2020,69(2):2034-2048. [57]LIU X,HUANG H,XIAO F,et al.A Blockchain-Based Trust Management With Conditional Privacy-Preserving Announcement Scheme for VANETs[J].IEEE Internet of Things Journal,2020,7(5):4101-4112. [58]LU Z,WANG Q,QU G,et al.A Blockchain-Based Privacy-Preserving Authentication Scheme for VANETs[J].Very Large Scale Integration(VLSI) Systems,2019,27(2):2792-2801. [59]MA Z,ZHANG J,GUO Y,et al.An Efficient Decentralized Key Management Mechanism for VANET with Blockchain[J].Vehicular Technology,2020,69(6):5836-5849. [60]LU Z,LIU W,WANG Q,et al.A Privacy-Preserving TrustModel Based on Blockchain for VANETs[J].IEEE Access,2018,6:45655-45664. [61]CHENG L,LIU J,XU G,et al.SCTSC:A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs[J].IEEE Transactions on Computational Social Systems,2019,6(6):1373-1385. [62]SINGH M,KIM S.Branch Based Blockchain Technology in Intelligent Vehicle[J].Computer Networks,2018,145(9):219-231. [63]YANG Y T,CHOU L D,TSENG C W,et al.Blockchain-based traffic event validation and trust verification for vanets[J].IEEE Access,2019,7:30868-30877. [64]TRIPATHI G,ABDUL A M,SATHIYANARAYANAN M.The Role of Blockchain in Internet of Vehicles(IoV):Issues,Challenges and Opportunities[C]//Proceedings of the 2019 International Conference on contemporary Computing and Informatics(IC3I).Singapore,2019:26-31. [65]LI Y,GUO J W,DU L P,et al.Research on mobile terminalidentity authentication scheme based on combined symmetric key algorithm[J].Network Security Technology & Application,2016,1:94-95. [66]MA X,ZHAO F G.Mobile terminal multi source biometric real-time identity authentication system for mobile Intemet[J].Video Engineering,2017,41(11):162-166. [67]FAN Y,XU J,GAO Y.Research and Implementation of eID-based Identity Authentication System[J].Netinfo Security,2015,3:48-53. [68]CHEN Z,GAO D,WANG D,et al.Quantum Key Based OptimalData Protection Model for Power Business[J].Automation of Electric Power System,2018,42(11):113-121. [69]DONG G,CHEN Y,LI H,et al.Cross-domain AuthenticationCredibility based on Blockchain in Heterogeneous Environment[J].Communications Technology,2019,52(6):1450-1460. [70]MA X,MA W,LIU X.A Cross Domain Authentication Scheme Based on Blockchain Technology[J].Acta Electronica Sinica,2018,46(11):2571-2579. [71]DONG G S,CHEN Y X,LI H W,et al.Cross-domain Authentication Credibility based on Blockchain in Heterogeneous Environment[J].Communications Technology,2019,52(6):1450-1460. [72]GUO Y,MA W,LI X.Cross-domain authentication schemebased on tmst for server entity Systems[J].Engineering and Electronics,2019,41(2):438-443. [73]WANG X,GAO F,ZHANG J,et al.Cross-domain Authentication Mechanism for Power Terminals Based on Blockchain and Credibility Evaluation[C]//Proceedings of the 2020 5th International Conference on Computer and Communication Systems(ICCCS).Shanghai,China,2020:936-940. [74]XIE Y R,MA W P,LUO W.New Cross-domain AuthenticationModel for Information Servers Entity[J].Computer Science,2018,45(9):177-182. [75]HUANG H,CHEN X.Power Mobile Terminal Identity Au-thentication Mechanism Based on Blockchain[C]//Proceedings of the 2020 International Wireless Communications and Mobile Computing(IWCMC).Limassol,Cyprus,2020:195-198. [76]OMAR A,MUSTAFA A,CLUTTERBUCK,et al.The state of play of blockchain technology in the financial services sector:A systematic literature review[J].International Journal of Information Management,2020,54:1-19. [77]ASHARAF S,ADARSH S.Decentralized Computing usingBlockchain Technologies and Smart Contracts[C]//Pennsylvania.USA:IGI Globa,2017. [78]ABEYRATNE S A,MONFARED R.Blockchain Ready Manufac-turing Supply Chain Using Distributed Ledger[J].International Journal of Research in Engineering and Technology,2016,5(9):1-10. [79]TIAN F.An agri-food supply chain traceability system for Chinabased on RFID & blockchain technology[C]//Proceedings of the 2016 13th International Conference on Service Systems and Service Management(ICSSSM).Kunming,China,2016:1-6. [80]LU Q H,XU X W.Adaptable Blockchain-Based Systems:712-72 A Case Study for Product Traceability[J].IEEE Software,2017,34(6):21-27. [81]AL-MEGREN S,ALSALAMAH S,ALTOAIMY,et al.Blockchain Use Cases in Digital Sectors:A Review of the Literature[C]//Proceedings of the 2018 IEEE International Conference on Internet of Things(iThings) and IEEE Green Computing and Communications(GreenCom) and IEEE Cyber,Physical and Social Computing(CPSCom) and IEEE Smart Data(SmartData).Halifax,NS,Canada,2018:1417-1424. [82]MCGHIN T,CHOO K,LIU C Z,et al.Blockchain in healthcare applications:Research challenges and opportunities[J].Journal of Network and Computer Applications,2019,135:62-75. [83]JAVED I T,ALHARBI F,BELLAJ B,et al.Health-ID:ABlockchain-Based Decentralized Identity Management for Remote Healthcare[J].Healthcare,2021,9(6):712-724. [84]WANG W,WANG L,ZHANG P,et al.A privacy protection scheme for telemedicine diagnosis based on double blockchain[J].Journal of Information Security and Applications,2021,61(2):2214-2126. [85]MAMUN Q,RANA M.A robust authentication model usingmulti-channel communication for eHealth systems to enhance privacy and security[C]//Proceedings of the 2017 8th IEEE Annual Information Technology,Electronics and Mobile Communication Conference(IEMCON).Vancouver,BC,Canada,2017:255-260. [86]KUMAR P,KUMARI S,SHARMA V,et al.A Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network[J].Sustainable Computing:Informatics and Systems,2017,18(6):80-89. [87]SHARMA N,BHATT R.Privacy Preservation in WSN forHealthcare Application[J].Procedia Computer Science,2018,132:1243-1252. [88]RAY I,ALANGOT B,NAIR S,et al.Using Attribute-Based Access Control for Remote Healthcare Monitoring[C]//Proceedings of the 2017 Fourth International Conference on Software Defined Systems(SDS).Valencia,Spain,2017:137-142 [89]SHRESTHA N M,ALSADOON A,PRASAD P,et al.En-hanced e-health framework for security and privacy in healthcare system[C]//Proceedings of the 2016 Sixth International Conference on Digital Information Processing and Communications(ICDIPC).Beirut,Lebanon,2016:75-79. |
[1] | HUANG Baohua, PENG Li, ZHAO Weihong, CHEN Ningjiang. Practical Byzantine Consensus Algorithm Based on Verifiable Random Functions [J]. Computer Science, 2023, 50(6A): 220300064-6. |
[2] | LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu. Blockchain-based Identity Authentication and Authorization Mechanism [J]. Computer Science, 2023, 50(6A): 220700158-9. |
[3] | PAN Lu, LUO Tao, NIU Xinzheng. Restart and Recovery Algorithm Based on Distributed Cluster Nodes [J]. Computer Science, 2023, 50(6A): 220300205-6. |
[4] | YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7. |
[5] | TAN Pengliu, WANG Runshu, ZENG Wenhao, WANG Shikun, ZOU Wenshi. Overview of Blockchain Consensus Algorithms [J]. Computer Science, 2023, 50(6A): 220400200-12. |
[6] | XIAO Jian, YANG Min. Multi-factor Blockchain Private Key Protection Scheme Based on Secret Sharing [J]. Computer Science, 2023, 50(6): 307-312. |
[7] | LIU Wei, GUO Lingbei, XIA Yujie, SHE Wei, TIAN Zhao. Raft Consensus Algorithm Based on Credit Evaluation Model [J]. Computer Science, 2023, 50(6): 322-329. |
[8] | LIU Zerun, ZHENG Hong, QIU Junjie. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [J]. Computer Science, 2023, 50(4): 317-322. |
[9] | MA Qican, WU Zehui, WANG Yunchao, WANG Xinlei. Approach of Web Application Access Control Vulnerability Detection Based on State Deviation Analysis [J]. Computer Science, 2023, 50(2): 346-352. |
[10] | LI Bei, WU Hao, HE Xiaowei, WANG Bin, XU Ergang. Survey of Storage Scalability in Blockchain Systems [J]. Computer Science, 2023, 50(1): 318-333. |
[11] | CHEN Yan, LIN Bing, CHEN Xiaona, CHEN Xing. Blockchain-based Trusted Service-oriented Architecture [J]. Computer Science, 2023, 50(1): 342-350. |
[12] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[13] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[14] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[15] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
|