Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network

Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Sensors (Basel, Switzerland) Jg. 23; H. 4; S. 2106
Hauptverfasser: Kairaldeen, Ammar Riadh, Abdullah, Nor Fadzilah, Abu-Samah, Asma, Nordin, Rosdiadee
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Switzerland MDPI AG 13.02.2023
MDPI
Schlagworte:
ISSN:1424-8220, 1424-8220
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for the user signature in a peer-to-peer decentralized IoT blockchain network. To achieve this, a user signature-based identity management framework is examined by using various encryption techniques and contrasting various hash functions built on top of the Modified Merkle Hash Tree (MMHT) data structure algorithm. The paper presents the execution of varying dataset sizes based on transactions between nodes to test the scalability of the proposed design for secure blockchain communication. The results show that the MMHT data structure algorithm using SHA3 and AES-128 encryption algorithm gives the lowest execution time, offering a minimum of 36% gain in time optimization compared to other algorithms. This work shows that using the AES-128 encryption algorithm with the MMHT algorithm and SHA3 hash function not only identifies malicious codes but also improves user integrity check performance in a blockchain network, while ensuring network scalability. Therefore, this study presents the performance evaluation of a blockchain network considering its distinct types, properties, components, and algorithms’ taxonomy.
AbstractList Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for the user signature in a peer-to-peer decentralized IoT blockchain network. To achieve this, a user signature-based identity management framework is examined by using various encryption techniques and contrasting various hash functions built on top of the Modified Merkle Hash Tree (MMHT) data structure algorithm. The paper presents the execution of varying dataset sizes based on transactions between nodes to test the scalability of the proposed design for secure blockchain communication. The results show that the MMHT data structure algorithm using SHA3 and AES-128 encryption algorithm gives the lowest execution time, offering a minimum of 36% gain in time optimization compared to other algorithms. This work shows that using the AES-128 encryption algorithm with the MMHT algorithm and SHA3 hash function not only identifies malicious codes but also improves user integrity check performance in a blockchain network, while ensuring network scalability. Therefore, this study presents the performance evaluation of a blockchain network considering its distinct types, properties, components, and algorithms’ taxonomy.
Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for the user signature in a peer-to-peer decentralized IoT blockchain network. To achieve this, a user signature-based identity management framework is examined by using various encryption techniques and contrasting various hash functions built on top of the Modified Merkle Hash Tree (MMHT) data structure algorithm. The paper presents the execution of varying dataset sizes based on transactions between nodes to test the scalability of the proposed design for secure blockchain communication. The results show that the MMHT data structure algorithm using SHA3 and AES-128 encryption algorithm gives the lowest execution time, offering a minimum of 36% gain in time optimization compared to other algorithms. This work shows that using the AES-128 encryption algorithm with the MMHT algorithm and SHA3 hash function not only identifies malicious codes but also improves user integrity check performance in a blockchain network, while ensuring network scalability. Therefore, this study presents the performance evaluation of a blockchain network considering its distinct types, properties, components, and algorithms' taxonomy.Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for the user signature in a peer-to-peer decentralized IoT blockchain network. To achieve this, a user signature-based identity management framework is examined by using various encryption techniques and contrasting various hash functions built on top of the Modified Merkle Hash Tree (MMHT) data structure algorithm. The paper presents the execution of varying dataset sizes based on transactions between nodes to test the scalability of the proposed design for secure blockchain communication. The results show that the MMHT data structure algorithm using SHA3 and AES-128 encryption algorithm gives the lowest execution time, offering a minimum of 36% gain in time optimization compared to other algorithms. This work shows that using the AES-128 encryption algorithm with the MMHT algorithm and SHA3 hash function not only identifies malicious codes but also improves user integrity check performance in a blockchain network, while ensuring network scalability. Therefore, this study presents the performance evaluation of a blockchain network considering its distinct types, properties, components, and algorithms' taxonomy.
Audience Academic
Author Abu-Samah, Asma
Abdullah, Nor Fadzilah
Kairaldeen, Ammar Riadh
Nordin, Rosdiadee
AuthorAffiliation Department of Electrical, Electronic and Systems Engineering, Faculty of Engineering and Built Environment, Universiti Kebangsaan Malaysia, Bangi 43600, Selangor, Malaysia
AuthorAffiliation_xml – name: Department of Electrical, Electronic and Systems Engineering, Faculty of Engineering and Built Environment, Universiti Kebangsaan Malaysia, Bangi 43600, Selangor, Malaysia
Author_xml – sequence: 1
  givenname: Ammar Riadh
  orcidid: 0000-0003-2878-927X
  surname: Kairaldeen
  fullname: Kairaldeen, Ammar Riadh
– sequence: 2
  givenname: Nor Fadzilah
  orcidid: 0000-0002-6593-5603
  surname: Abdullah
  fullname: Abdullah, Nor Fadzilah
– sequence: 3
  givenname: Asma
  orcidid: 0000-0001-8514-1459
  surname: Abu-Samah
  fullname: Abu-Samah, Asma
– sequence: 4
  givenname: Rosdiadee
  orcidid: 0000-0001-9254-2023
  surname: Nordin
  fullname: Nordin, Rosdiadee
BackLink https://www.ncbi.nlm.nih.gov/pubmed/36850701$$D View this record in MEDLINE/PubMed
BookMark eNplkktv1DAQxy1URB9w4AugSFzgkNaxE9u5IJWqwEoVRWLL1XLG4623Sbw4Xqry6fF226otsuTH-Dd_ex77ZGcMIxLytqKHnLf0aGKc1qyi4gXZq2pWl4oxuvNov0v2p2lJKeOcq1dklwvVUEmrPfLzB2IsUyg3a3Ex5WlmcUw-3RS_MHrnwSQfxmLuByzOV8kP_u_W4sdiFubF5z7AFVyafPyO6TrEq9fkpTP9hG_u1gNy8eV0fvKtPDv_Ojs5PiuhoSqV3CiODa06lLwzzjYGGO04F4zXSG1TC6MoY-gabsFiWwMw5RrmsJKWWuAHZLbVtcEs9Sr6wcQbHYzXt4YQF9rE5KFHbdDWBpxsRCdrruoWXOeAt85AzoXqstanrdZq3Q1oIacgmv6J6NOb0V_qRfij21ZUQvEs8OFOIIbfa5ySHvwE2PdmxLCeNJOKSsEV3aDvn6HLsI5jTlWmZCukErLJ1OGWWpgcgB9dyO9CHhYHD7kBnM_24xxOjkCyNju8exzCw9_vi52Boy0AMUxTRKfBp9taZmXf64rqTTvph3bKHh-fedyL_s_-A74EyYE
CitedBy_id crossref_primary_10_3390_s23063155
crossref_primary_10_3390_app14052045
crossref_primary_10_52711_book_anv_icons_2024_010
crossref_primary_10_3390_app15105602
crossref_primary_10_3390_electronics14081665
crossref_primary_10_1007_s11042_023_16970_x
crossref_primary_10_3390_electronics14061185
Cites_doi 10.1016/j.csi.2018.12.002
10.1007/978-3-030-87629-6
10.1002/nem.2180
10.1016/j.future.2019.09.028
10.26599/TST.2021.9010001
10.1109/NILES.2019.8909206
10.1109/ACCESS.2021.3081792
10.1109/ACCESS.2018.2799942
10.2139/ssrn.3392331
10.18178/ijfcc.2019.8.4.554
10.4018/IJSDS.2018010105
10.1016/j.future.2019.05.023
10.1109/ACCESS.2022.3151967
10.1109/BigDataSecurity-HPSC-IDS.2019.00018
10.1016/j.comnet.2012.12.018
10.1109/BICITS51482.2021.9509883
10.3390/electronics10091127
10.3390/s18124215
10.1109/IOTM.0011.2000045
10.3390/s21041323
10.1108/JEIM-07-2018-0148
10.1155/2022/9065768
10.3390/s21227629
10.1109/COMST.2020.3045136
10.1016/j.future.2018.02.034
10.1007/s11042-021-11336-7
10.1109/WiMOB.2019.8923232
10.1016/j.cose.2019.06.010
10.3390/sym11020293
10.1155/2021/4401809
10.1109/ACCESS.2019.2896108
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2023 by the authors. 2023
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2023 by the authors. 2023
DBID AAYXX
CITATION
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
PRINS
7X8
5PM
DOA
DOI 10.3390/s23042106
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
Proquest Health and Medical Complete
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
Health & Medical Collection (Alumni Edition)
PML(ProQuest Medical Library)
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Open Access Full Text
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList
MEDLINE - Academic
CrossRef
PubMed

Publicly Available Content Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_aed4acf756b743849cfbfc39fac3688b
PMC9961683
A743368729
36850701
10_3390_s23042106
Genre Journal Article
GrantInformation_xml – fundername: National University of Malaysia
  grantid: GUP-2021-013
– fundername: Malaysian Ministry of Higher Education and Universiti Kebangsaan Malaysia
  grantid: GUP-2021-023
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
ALIPV
NPM
3V.
7XB
8FK
AZQEC
DWQXO
K9.
PKEHL
PQEST
PQUKI
PRINS
7X8
PUEGO
5PM
ID FETCH-LOGICAL-c508t-3a83e501be73bafd5ac20b336234e0d546a8022ef53dcde94cc28f52fe17d0dc3
IEDL.DBID BENPR
ISICitedReferencesCount 9
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000941451300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1424-8220
IngestDate Fri Oct 03 12:40:25 EDT 2025
Tue Nov 04 02:06:40 EST 2025
Fri Sep 05 12:14:45 EDT 2025
Tue Oct 07 07:38:22 EDT 2025
Tue Nov 04 18:14:17 EST 2025
Mon Jul 21 05:44:24 EDT 2025
Sat Nov 29 07:17:33 EST 2025
Tue Nov 18 22:24:16 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Internet of Things (IoT)
digital integrity
blockchain
privacy protection
smart contract
hash functions
encryption algorithms
user integrity
P2P
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c508t-3a83e501be73bafd5ac20b336234e0d546a8022ef53dcde94cc28f52fe17d0dc3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0001-9254-2023
0000-0001-8514-1459
0000-0003-2878-927X
0000-0002-6593-5603
OpenAccessLink https://www.proquest.com/docview/2779678675?pq-origsite=%requestingapplication%
PMID 36850701
PQID 2779678675
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_aed4acf756b743849cfbfc39fac3688b
pubmedcentral_primary_oai_pubmedcentral_nih_gov_9961683
proquest_miscellaneous_2780763803
proquest_journals_2779678675
gale_infotracacademiconefile_A743368729
pubmed_primary_36850701
crossref_citationtrail_10_3390_s23042106
crossref_primary_10_3390_s23042106
PublicationCentury 2000
PublicationDate 20230213
PublicationDateYYYYMMDD 2023-02-13
PublicationDate_xml – month: 2
  year: 2023
  text: 20230213
  day: 13
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2023
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Carnley (ref_13) 2019; 8
Moin (ref_28) 2019; 100
Wang (ref_5) 2019; 7
ref_14
Sohal (ref_36) 2018; 34
Mohammad (ref_21) 2021; 26
ref_11
ref_32
Hasan (ref_4) 2022; 2022
ref_30
ref_19
ref_18
ref_17
ref_16
ref_38
ref_15
Kumar (ref_23) 2018; 9
Cha (ref_34) 2018; 6
Ghazali (ref_3) 2021; 81
Jayabalasamy (ref_7) 2022; 34
Nikooghadam (ref_33) 2018; 84
Alobaidy (ref_22) 2022; 10
Ghaffari (ref_20) 2021; 32
Wei (ref_25) 2019; 102
Roman (ref_12) 2013; 57
Mohsin (ref_6) 2019; 64
Kairaldeen (ref_35) 2021; 2021
Ali (ref_10) 2019; 86
Haq (ref_31) 2021; 9
Sousa (ref_1) 2020; 35
Hameed (ref_29) 2018; 10
Ren (ref_2) 2020; 23
ref_27
ref_26
ref_9
ref_8
Liao (ref_24) 2021; 4
Churi (ref_37) 2019; 8
References_xml – volume: 64
  start-page: 41
  year: 2019
  ident: ref_6
  article-title: Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions
  publication-title: Comput. Stand. Interfaces
  doi: 10.1016/j.csi.2018.12.002
– ident: ref_32
  doi: 10.1007/978-3-030-87629-6
– volume: 32
  start-page: e2180
  year: 2021
  ident: ref_20
  article-title: Identity and access management using distributed ledger technology: A survey
  publication-title: Int. J. Netw. Manag.
  doi: 10.1002/nem.2180
– volume: 102
  start-page: 902
  year: 2019
  ident: ref_25
  article-title: Blockchain data-based cloud data integrity protection mechanism
  publication-title: Futur. Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.09.028
– volume: 26
  start-page: 906
  year: 2021
  ident: ref_21
  article-title: Access control and authorization in smart homes: A survey
  publication-title: Tsinghua Sci. Technol.
  doi: 10.26599/TST.2021.9010001
– ident: ref_30
  doi: 10.1109/NILES.2019.8909206
– volume: 9
  start-page: 76518
  year: 2021
  ident: ref_31
  article-title: Improved Twofish Algorithm: A Digital Image Enciphering Application
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3081792
– volume: 34
  start-page: 9677
  year: 2022
  ident: ref_7
  article-title: High-performance Edwards curve aggregate signature (HECAS) for non-repudiation in IoT-based applications built on the blockchain ecosystem
  publication-title: J. King Saud. Univ.-Comput. Inf. Sci.
– volume: 6
  start-page: 24639
  year: 2018
  ident: ref_34
  article-title: A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2799942
– ident: ref_8
  doi: 10.2139/ssrn.3392331
– volume: 8
  start-page: 129
  year: 2019
  ident: ref_13
  article-title: Identity and Access Management for the Internet of Things
  publication-title: Int. J. Future Comput. Commun.
  doi: 10.18178/ijfcc.2019.8.4.554
– volume: 9
  start-page: 63
  year: 2018
  ident: ref_23
  article-title: Identity Management Systems
  publication-title: Int. J. Strateg. Decis. Sci.
  doi: 10.4018/IJSDS.2018010105
– volume: 100
  start-page: 325
  year: 2019
  ident: ref_28
  article-title: Securing IoTs in distributed blockchain: Analysis, requirements and open issues
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.05.023
– volume: 8
  start-page: 6230
  year: 2019
  ident: ref_37
  article-title: Performance analysis of data encryption algorithm
  publication-title: Int. J. Recent Technol.
– volume: 10
  start-page: 24095
  year: 2022
  ident: ref_22
  article-title: Wireless Transmissions, Propagation and Channel Modelling for IoT Technologies: Applications and Challenges
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3151967
– ident: ref_9
  doi: 10.1109/BigDataSecurity-HPSC-IDS.2019.00018
– volume: 57
  start-page: 2266
  year: 2013
  ident: ref_12
  article-title: On the features and challenges of security and privacy in distributed internet of things
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2012.12.018
– ident: ref_27
  doi: 10.1109/BICITS51482.2021.9509883
– ident: ref_16
  doi: 10.3390/electronics10091127
– volume: 10
  start-page: 139
  year: 2018
  ident: ref_29
  article-title: Review on improvement of advanced encryption standard (AES) algorithm based on time execution, differential cryptanalysis and level of security
  publication-title: J. Telecommun. Electron. Comput. Eng. JTEC
– ident: ref_11
  doi: 10.3390/s18124215
– volume: 4
  start-page: 12
  year: 2021
  ident: ref_24
  article-title: Securing Collaborative Environment Monitoring in Smart Cities Using Blockchain Enabled Software-Defined Internet of Drones
  publication-title: IEEE Internet Things Mag.
  doi: 10.1109/IOTM.0011.2000045
– ident: ref_14
  doi: 10.3390/s21041323
– volume: 35
  start-page: 1477
  year: 2020
  ident: ref_1
  article-title: The case for blockchain in IoT identity management
  publication-title: J. Enterp. Inf. Manag.
  doi: 10.1108/JEIM-07-2018-0148
– volume: 2022
  start-page: 9065768
  year: 2022
  ident: ref_4
  article-title: Blockchain Technology on Smart Grid, Energy Trading, and Big Data: Security Issues, Challenges, and Recommendations
  publication-title: Wirel. Commun. Mob. Comput.
  doi: 10.1155/2022/9065768
– ident: ref_17
  doi: 10.3390/s21227629
– volume: 23
  start-page: 391
  year: 2020
  ident: ref_2
  article-title: Potential Identity Resolution Systems for the Industrial Internet of Things: A Survey
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2020.3045136
– ident: ref_15
– volume: 84
  start-page: 47
  year: 2018
  ident: ref_33
  article-title: Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications
  publication-title: Futur. Gener. Comput. Syst.
  doi: 10.1016/j.future.2018.02.034
– volume: 34
  start-page: 1417
  year: 2018
  ident: ref_36
  article-title: BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing
  publication-title: J. King Saud Univ.-Comput. Inf. Sci.
– volume: 81
  start-page: 36587
  year: 2021
  ident: ref_3
  article-title: Blockchain for record-keeping and data verifying: Proof of concept
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-021-11336-7
– ident: ref_38
– ident: ref_18
  doi: 10.1109/WiMOB.2019.8923232
– ident: ref_19
– volume: 86
  start-page: 318
  year: 2019
  ident: ref_10
  article-title: Blockchain based permission delegation and access control in Internet of Things (BACI)
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2019.06.010
– ident: ref_26
  doi: 10.3390/sym11020293
– volume: 2021
  start-page: 4401809
  year: 2021
  ident: ref_35
  article-title: Data Integrity Time Optimization of a Blockchain IoT Smart Home Network Using Different Consensus and Hash Algorithms
  publication-title: Wirel. Commun. Mob. Comput.
  doi: 10.1155/2021/4401809
– volume: 7
  start-page: 22328
  year: 2019
  ident: ref_5
  article-title: A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2896108
SSID ssj0023338
Score 2.4507196
Snippet Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities...
SourceID doaj
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 2106
SubjectTerms Access control
Algorithms
Blockchain
Communication
digital integrity
Digital signatures
encryption algorithms
Internet of Things
P2P
Privacy
Public Key Infrastructure
Sensors
Smart cities
smart contract
Smart houses
user integrity
SummonAdditionalLinks – databaseName: DOAJ Open Access Full Text
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Na9wwEB1KyCE9lLbph9OkKKXQXkxsy7KkY1IaWgjbQJOSm5BkiSxpvSG7KfTfd8bWmjUt9NLTfngW5NHMPD2v5gngbZS6iAiLuZU65HXEuXBC-xyZRKVFDIhq_aklZ3I2U1dX-nzjqC_aEzbIAw-OO7Khra2PUjQOwU7V2kcXPdfRet4o5aj6FlKvyVSiWhyZ16AjxJHUHy3p0SeSm2aCPr1I_5-leAOLpvskN4Dn9DE8SitGdjyM9Ak8CN1TeLihI7gLX8_xXb5a5PTKLjGqWGrA_cW-oU1MD-YYNXywL1glfqT2Szbv2OfFBTtBTLvx1xY_zoaN4c_g8vTjxYdPeTotIfe4yFrl3CoeRFG6ILmzsRUkvug4AhSvQ9GKurHUVhui4K1vg669r1QUVQylbIvW8-ew1S268BJYFALTVJcq2rq2hXDaVQhb3OHyxCvuMni_9qLxSUqcTrT4bpBSkMPN6PAM3oymt4N-xt-MTmgqRgOSvO6_wEAwKRDMvwIhg3c0kYYSEwfjbeovwFsiiStzjL9CQyQTGeyv59qkjF2aSkqNwI38KYPD8TLmGv2BYruwuCcbVWA9VgXP4MUQGuOYScgfy2eZgZwEzeSmple6-XWv542Us2wU3_sfXngFOxWGP-0rL_k-bK3u7sMBbPufq_ny7nWfJL8BhiUZUA
  priority: 102
  providerName: Directory of Open Access Journals
Title Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network
URI https://www.ncbi.nlm.nih.gov/pubmed/36850701
https://www.proquest.com/docview/2779678675
https://www.proquest.com/docview/2780763803
https://pubmed.ncbi.nlm.nih.gov/PMC9961683
https://doaj.org/article/aed4acf756b743849cfbfc39fac3688b
Volume 23
WOSCitedRecordID wos000941451300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: PIMPY
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9MwFLfYxgEOfA8CowoICS7RkjiO7RNaUScmsRLBhsopsh2bVWzJaDskLvztvJe4oRGIC5ckTV6lF73vF_v3CHnhuIwdhMVIcWmjzIEsNJMmgkoilcxZiGrt1JJ3fDoVs5ksfMNt6ZdVrn1i66irxmCPfD_lXIJjhfz29eW3CKdG4ddVP0Jji-wgUhno-c54Mi0-9CUXhQqswxOiUNzvL7EFCkVOPohCLVj_ny55IyYN10tuBKDD2__L-h1yy6ee4UGnK3fJNVvfIzc3AAnvk48FXEWrJsJzeArqGfqdvD_CT0DjfIcvxJ0j4XtwNxd-H2c4r8Oj5iQcQ3D8as4U_Jx2K8wfkNPDycmbt5EfuxAZyNZWEVWCWhYn2nKqlasYojhqCpGOZjauWJYr3J9rHaOVqazMjEmFY6mzCa_iytBdsl03tX1EQscY2LtMhFNZpmKmpU4h_lENeY4RVAfk1VoMpfGY5Dga47yE2gQlVvYSC8jznvSyA-L4G9EYZdkTIHZ2e6NZfCm9KZbKVpkyjrNcQ_okMmmcdoZKpwzNhQCmXqImlGjhwIxRfqMCvBJiZZUH8C8ghKokIHtrgZfe9Jflb2kH5Fn_GIwWv8So2jZXSCNicOwipgF52OlWzzNOBAA_nASED7Ru8FLDJ_X8rAUGh9o1yQV9_G-2npAbKVgGLj1P6B7ZXi2u7FNy3XxfzZeLEdniM94exchb06htVMDx-OcE7hVHx8XnXyZvLNw
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VLRJw4P0IFDAIBJeoSRwn9gGhFqi66nZZiS0qp2A7Nl0BSdndgvqn-I2M82IjELceOO0js5G9_ma-GcczA_DEpiKwSIu-TIXxY4troZjQPkYSkWDWIKtVXUtG6XjMDw_FZA1-trkw7lhlaxMrQ52X2u2Rb0ZpKtCwon_78vib77pGuaerbQuNGhZ75vQHhmyLF8PXuL5Po2jnzfTVrt90FfA1OiNLn0pODQtCZVKqpM2ZK1KoKBpyGpsgZ3EiXfqpsYzmOjci1jrilkXWhGke5Jrifc_BeoxgDwawPhnuTz50IR7FiK-uX0SpCDYXbssVg6qkx3pVc4A_KWCFA_vnM1cIb-fK__ZXXYXLjWtNtmpduAZrprgOl1YKLt6AdxN85y9L372SA1Q_0mQqn5L3KGObHUziMmPIWzSnX5s8VTIryLCckm0k_8_6SOLHcX2C_iYcnMmsbsGgKAtzB4hlDO2ZCLmVcSwDpoSKkN-pQj9Oc6o8eN4ue6abmuuu9ceXDGMvh5CsQ4gHjzvR47rQyN-Eth12OgFXG7z6opx_yhpTk0mTx1LblCUK3UMeC22V1VRYqWnCOQ7qmUNe5iwYDkbLJhEDp-RqgWVb-CsUxKjLg40WYFlj2hbZb3R58Ki7jEbJPWmShSlPnAwPkLh4QD24XWO5G7PreIA8E3qQ9lDem1T_SjE7qgqfY2weJpze_fewHsKF3en-KBsNx3v34GKEWumO2Yd0AwbL-Ym5D-f19-VsMX_QaC-Bj2etBb8AmN2F7w
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VglA58C4YCiwIBBcrttcb7x4QaikRUasQibbKzazXuzQC7JKkoP41fh0ztuPGAnHrgVOceGztxt9-M7OeB8Bzl6jAoVr0daKsHzt8FplQxkdPIlLCWdRqVdeS_WQ0kpOJGq_Br2UuDIVVLjmxIuq8NLRH3ouSRCGxon3bc01YxHh38Obku08dpOhN67KdRg2RPXv2E923-evhLj7rF1E0eHfw9r3fdBjwDRomC59rya0IwswmPNMuF1SwMONI6jy2QS7ivqZUVOsEz01uVWxMJJ2InA2TPMgNx_tegstUUpBIIZmcO3scfb-6khHnKujNafMV3at-R_9VbQL-VAYr2rAbqbmi-gY3_uc_7SZcbwxutl2vkFuwZovbcG2lDOMd-DjGI39R-vTJDnFRsiZ_-YwdoYxr9jUZ5cuwD0iy35rsVTYt2LA8YDtoEnwxxxq_juq4-rtweCGz2oT1oizsfWBOCGQ5FUqn41gHIlNZhFqfZ2jdGckzD14tIZCaphI7NQT5mqJHRmhJW7R48KwVPanLj_xNaIdw1ApQxfDqh3L2OW0IKNU2j7VxiehnaDTKWBmXOcOV04b3pcRBvSQUpsRrOBijm_QMnBJVCEu38SoURF_Mg60l2NKG8ObpOdI8eNqeRqqi90-6sOUpycgA1ZkMuAf3aly3Y6Y-CKh9Qg-SDuI7k-qeKabHVTl09NjDvuQP_j2sJ3AVoZ_uD0d7D2EjwgVKsfch34L1xezUPoIr5sdiOp89rpYxg08XvQR-A21vjRw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Peer-to-Peer+User+Identity+Verification+Time+Optimization+in+IoT+Blockchain+Network&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Ammar+Riadh+Kairaldeen&rft.au=Abdullah%2C+Nor+Fadzilah&rft.au=Abu-Samah%2C+Asma&rft.au=Nordin%2C+Rosdiadee&rft.date=2023-02-13&rft.pub=MDPI+AG&rft.eissn=1424-8220&rft.volume=23&rft.issue=4&rft.spage=2106&rft_id=info:doi/10.3390%2Fs23042106&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon