Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network
Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for...
Gespeichert in:
| Veröffentlicht in: | Sensors (Basel, Switzerland) Jg. 23; H. 4; S. 2106 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Switzerland
MDPI AG
13.02.2023
MDPI |
| Schlagworte: | |
| ISSN: | 1424-8220, 1424-8220 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for the user signature in a peer-to-peer decentralized IoT blockchain network. To achieve this, a user signature-based identity management framework is examined by using various encryption techniques and contrasting various hash functions built on top of the Modified Merkle Hash Tree (MMHT) data structure algorithm. The paper presents the execution of varying dataset sizes based on transactions between nodes to test the scalability of the proposed design for secure blockchain communication. The results show that the MMHT data structure algorithm using SHA3 and AES-128 encryption algorithm gives the lowest execution time, offering a minimum of 36% gain in time optimization compared to other algorithms. This work shows that using the AES-128 encryption algorithm with the MMHT algorithm and SHA3 hash function not only identifies malicious codes but also improves user integrity check performance in a blockchain network, while ensuring network scalability. Therefore, this study presents the performance evaluation of a blockchain network considering its distinct types, properties, components, and algorithms’ taxonomy. |
|---|---|
| AbstractList | Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for the user signature in a peer-to-peer decentralized IoT blockchain network. To achieve this, a user signature-based identity management framework is examined by using various encryption techniques and contrasting various hash functions built on top of the Modified Merkle Hash Tree (MMHT) data structure algorithm. The paper presents the execution of varying dataset sizes based on transactions between nodes to test the scalability of the proposed design for secure blockchain communication. The results show that the MMHT data structure algorithm using SHA3 and AES-128 encryption algorithm gives the lowest execution time, offering a minimum of 36% gain in time optimization compared to other algorithms. This work shows that using the AES-128 encryption algorithm with the MMHT algorithm and SHA3 hash function not only identifies malicious codes but also improves user integrity check performance in a blockchain network, while ensuring network scalability. Therefore, this study presents the performance evaluation of a blockchain network considering its distinct types, properties, components, and algorithms’ taxonomy. Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for the user signature in a peer-to-peer decentralized IoT blockchain network. To achieve this, a user signature-based identity management framework is examined by using various encryption techniques and contrasting various hash functions built on top of the Modified Merkle Hash Tree (MMHT) data structure algorithm. The paper presents the execution of varying dataset sizes based on transactions between nodes to test the scalability of the proposed design for secure blockchain communication. The results show that the MMHT data structure algorithm using SHA3 and AES-128 encryption algorithm gives the lowest execution time, offering a minimum of 36% gain in time optimization compared to other algorithms. This work shows that using the AES-128 encryption algorithm with the MMHT algorithm and SHA3 hash function not only identifies malicious codes but also improves user integrity check performance in a blockchain network, while ensuring network scalability. Therefore, this study presents the performance evaluation of a blockchain network considering its distinct types, properties, components, and algorithms' taxonomy.Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for the user signature in a peer-to-peer decentralized IoT blockchain network. To achieve this, a user signature-based identity management framework is examined by using various encryption techniques and contrasting various hash functions built on top of the Modified Merkle Hash Tree (MMHT) data structure algorithm. The paper presents the execution of varying dataset sizes based on transactions between nodes to test the scalability of the proposed design for secure blockchain communication. The results show that the MMHT data structure algorithm using SHA3 and AES-128 encryption algorithm gives the lowest execution time, offering a minimum of 36% gain in time optimization compared to other algorithms. This work shows that using the AES-128 encryption algorithm with the MMHT algorithm and SHA3 hash function not only identifies malicious codes but also improves user integrity check performance in a blockchain network, while ensuring network scalability. Therefore, this study presents the performance evaluation of a blockchain network considering its distinct types, properties, components, and algorithms' taxonomy. |
| Audience | Academic |
| Author | Abu-Samah, Asma Abdullah, Nor Fadzilah Kairaldeen, Ammar Riadh Nordin, Rosdiadee |
| AuthorAffiliation | Department of Electrical, Electronic and Systems Engineering, Faculty of Engineering and Built Environment, Universiti Kebangsaan Malaysia, Bangi 43600, Selangor, Malaysia |
| AuthorAffiliation_xml | – name: Department of Electrical, Electronic and Systems Engineering, Faculty of Engineering and Built Environment, Universiti Kebangsaan Malaysia, Bangi 43600, Selangor, Malaysia |
| Author_xml | – sequence: 1 givenname: Ammar Riadh orcidid: 0000-0003-2878-927X surname: Kairaldeen fullname: Kairaldeen, Ammar Riadh – sequence: 2 givenname: Nor Fadzilah orcidid: 0000-0002-6593-5603 surname: Abdullah fullname: Abdullah, Nor Fadzilah – sequence: 3 givenname: Asma orcidid: 0000-0001-8514-1459 surname: Abu-Samah fullname: Abu-Samah, Asma – sequence: 4 givenname: Rosdiadee orcidid: 0000-0001-9254-2023 surname: Nordin fullname: Nordin, Rosdiadee |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/36850701$$D View this record in MEDLINE/PubMed |
| BookMark | eNplkktv1DAQxy1URB9w4AugSFzgkNaxE9u5IJWqwEoVRWLL1XLG4623Sbw4Xqry6fF226otsuTH-Dd_ex77ZGcMIxLytqKHnLf0aGKc1qyi4gXZq2pWl4oxuvNov0v2p2lJKeOcq1dklwvVUEmrPfLzB2IsUyg3a3Ex5WlmcUw-3RS_MHrnwSQfxmLuByzOV8kP_u_W4sdiFubF5z7AFVyafPyO6TrEq9fkpTP9hG_u1gNy8eV0fvKtPDv_Ojs5PiuhoSqV3CiODa06lLwzzjYGGO04F4zXSG1TC6MoY-gabsFiWwMw5RrmsJKWWuAHZLbVtcEs9Sr6wcQbHYzXt4YQF9rE5KFHbdDWBpxsRCdrruoWXOeAt85AzoXqstanrdZq3Q1oIacgmv6J6NOb0V_qRfij21ZUQvEs8OFOIIbfa5ySHvwE2PdmxLCeNJOKSsEV3aDvn6HLsI5jTlWmZCukErLJ1OGWWpgcgB9dyO9CHhYHD7kBnM_24xxOjkCyNju8exzCw9_vi52Boy0AMUxTRKfBp9taZmXf64rqTTvph3bKHh-fedyL_s_-A74EyYE |
| CitedBy_id | crossref_primary_10_3390_s23063155 crossref_primary_10_3390_app14052045 crossref_primary_10_52711_book_anv_icons_2024_010 crossref_primary_10_3390_app15105602 crossref_primary_10_3390_electronics14081665 crossref_primary_10_1007_s11042_023_16970_x crossref_primary_10_3390_electronics14061185 |
| Cites_doi | 10.1016/j.csi.2018.12.002 10.1007/978-3-030-87629-6 10.1002/nem.2180 10.1016/j.future.2019.09.028 10.26599/TST.2021.9010001 10.1109/NILES.2019.8909206 10.1109/ACCESS.2021.3081792 10.1109/ACCESS.2018.2799942 10.2139/ssrn.3392331 10.18178/ijfcc.2019.8.4.554 10.4018/IJSDS.2018010105 10.1016/j.future.2019.05.023 10.1109/ACCESS.2022.3151967 10.1109/BigDataSecurity-HPSC-IDS.2019.00018 10.1016/j.comnet.2012.12.018 10.1109/BICITS51482.2021.9509883 10.3390/electronics10091127 10.3390/s18124215 10.1109/IOTM.0011.2000045 10.3390/s21041323 10.1108/JEIM-07-2018-0148 10.1155/2022/9065768 10.3390/s21227629 10.1109/COMST.2020.3045136 10.1016/j.future.2018.02.034 10.1007/s11042-021-11336-7 10.1109/WiMOB.2019.8923232 10.1016/j.cose.2019.06.010 10.3390/sym11020293 10.1155/2021/4401809 10.1109/ACCESS.2019.2896108 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2023 by the authors. 2023 |
| Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2023 by the authors. 2023 |
| DBID | AAYXX CITATION NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI PRINS 7X8 5PM DOA |
| DOI | 10.3390/s23042106 |
| DatabaseName | CrossRef PubMed ProQuest Central (Corporate) Proquest Health and Medical Complete ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) Health & Medical Collection (Alumni Edition) PML(ProQuest Medical Library) ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Open Access Full Text |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central China ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
| DatabaseTitleList | MEDLINE - Academic CrossRef PubMed Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1424-8220 |
| ExternalDocumentID | oai_doaj_org_article_aed4acf756b743849cfbfc39fac3688b PMC9961683 A743368729 36850701 10_3390_s23042106 |
| Genre | Journal Article |
| GrantInformation_xml | – fundername: National University of Malaysia grantid: GUP-2021-013 – fundername: Malaysian Ministry of Higher Education and Universiti Kebangsaan Malaysia grantid: GUP-2021-023 |
| GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFFHD AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PJZUB PPXIY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M ALIPV NPM 3V. 7XB 8FK AZQEC DWQXO K9. PKEHL PQEST PQUKI PRINS 7X8 PUEGO 5PM |
| ID | FETCH-LOGICAL-c508t-3a83e501be73bafd5ac20b336234e0d546a8022ef53dcde94cc28f52fe17d0dc3 |
| IEDL.DBID | BENPR |
| ISICitedReferencesCount | 9 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000941451300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1424-8220 |
| IngestDate | Fri Oct 03 12:40:25 EDT 2025 Tue Nov 04 02:06:40 EST 2025 Fri Sep 05 12:14:45 EDT 2025 Tue Oct 07 07:38:22 EDT 2025 Tue Nov 04 18:14:17 EST 2025 Mon Jul 21 05:44:24 EDT 2025 Sat Nov 29 07:17:33 EST 2025 Tue Nov 18 22:24:16 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Internet of Things (IoT) digital integrity blockchain privacy protection smart contract hash functions encryption algorithms user integrity P2P |
| Language | English |
| License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c508t-3a83e501be73bafd5ac20b336234e0d546a8022ef53dcde94cc28f52fe17d0dc3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0001-9254-2023 0000-0001-8514-1459 0000-0003-2878-927X 0000-0002-6593-5603 |
| OpenAccessLink | https://www.proquest.com/docview/2779678675?pq-origsite=%requestingapplication% |
| PMID | 36850701 |
| PQID | 2779678675 |
| PQPubID | 2032333 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_aed4acf756b743849cfbfc39fac3688b pubmedcentral_primary_oai_pubmedcentral_nih_gov_9961683 proquest_miscellaneous_2780763803 proquest_journals_2779678675 gale_infotracacademiconefile_A743368729 pubmed_primary_36850701 crossref_citationtrail_10_3390_s23042106 crossref_primary_10_3390_s23042106 |
| PublicationCentury | 2000 |
| PublicationDate | 20230213 |
| PublicationDateYYYYMMDD | 2023-02-13 |
| PublicationDate_xml | – month: 2 year: 2023 text: 20230213 day: 13 |
| PublicationDecade | 2020 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Basel |
| PublicationTitle | Sensors (Basel, Switzerland) |
| PublicationTitleAlternate | Sensors (Basel) |
| PublicationYear | 2023 |
| Publisher | MDPI AG MDPI |
| Publisher_xml | – name: MDPI AG – name: MDPI |
| References | Carnley (ref_13) 2019; 8 Moin (ref_28) 2019; 100 Wang (ref_5) 2019; 7 ref_14 Sohal (ref_36) 2018; 34 Mohammad (ref_21) 2021; 26 ref_11 ref_32 Hasan (ref_4) 2022; 2022 ref_30 ref_19 ref_18 ref_17 ref_16 ref_38 ref_15 Kumar (ref_23) 2018; 9 Cha (ref_34) 2018; 6 Ghazali (ref_3) 2021; 81 Jayabalasamy (ref_7) 2022; 34 Nikooghadam (ref_33) 2018; 84 Alobaidy (ref_22) 2022; 10 Ghaffari (ref_20) 2021; 32 Wei (ref_25) 2019; 102 Roman (ref_12) 2013; 57 Mohsin (ref_6) 2019; 64 Kairaldeen (ref_35) 2021; 2021 Ali (ref_10) 2019; 86 Haq (ref_31) 2021; 9 Sousa (ref_1) 2020; 35 Hameed (ref_29) 2018; 10 Ren (ref_2) 2020; 23 ref_27 ref_26 ref_9 ref_8 Liao (ref_24) 2021; 4 Churi (ref_37) 2019; 8 |
| References_xml | – volume: 64 start-page: 41 year: 2019 ident: ref_6 article-title: Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions publication-title: Comput. Stand. Interfaces doi: 10.1016/j.csi.2018.12.002 – ident: ref_32 doi: 10.1007/978-3-030-87629-6 – volume: 32 start-page: e2180 year: 2021 ident: ref_20 article-title: Identity and access management using distributed ledger technology: A survey publication-title: Int. J. Netw. Manag. doi: 10.1002/nem.2180 – volume: 102 start-page: 902 year: 2019 ident: ref_25 article-title: Blockchain data-based cloud data integrity protection mechanism publication-title: Futur. Gener. Comput. Syst. doi: 10.1016/j.future.2019.09.028 – volume: 26 start-page: 906 year: 2021 ident: ref_21 article-title: Access control and authorization in smart homes: A survey publication-title: Tsinghua Sci. Technol. doi: 10.26599/TST.2021.9010001 – ident: ref_30 doi: 10.1109/NILES.2019.8909206 – volume: 9 start-page: 76518 year: 2021 ident: ref_31 article-title: Improved Twofish Algorithm: A Digital Image Enciphering Application publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3081792 – volume: 34 start-page: 9677 year: 2022 ident: ref_7 article-title: High-performance Edwards curve aggregate signature (HECAS) for non-repudiation in IoT-based applications built on the blockchain ecosystem publication-title: J. King Saud. Univ.-Comput. Inf. Sci. – volume: 6 start-page: 24639 year: 2018 ident: ref_34 article-title: A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2799942 – ident: ref_8 doi: 10.2139/ssrn.3392331 – volume: 8 start-page: 129 year: 2019 ident: ref_13 article-title: Identity and Access Management for the Internet of Things publication-title: Int. J. Future Comput. Commun. doi: 10.18178/ijfcc.2019.8.4.554 – volume: 9 start-page: 63 year: 2018 ident: ref_23 article-title: Identity Management Systems publication-title: Int. J. Strateg. Decis. Sci. doi: 10.4018/IJSDS.2018010105 – volume: 100 start-page: 325 year: 2019 ident: ref_28 article-title: Securing IoTs in distributed blockchain: Analysis, requirements and open issues publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.05.023 – volume: 8 start-page: 6230 year: 2019 ident: ref_37 article-title: Performance analysis of data encryption algorithm publication-title: Int. J. Recent Technol. – volume: 10 start-page: 24095 year: 2022 ident: ref_22 article-title: Wireless Transmissions, Propagation and Channel Modelling for IoT Technologies: Applications and Challenges publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3151967 – ident: ref_9 doi: 10.1109/BigDataSecurity-HPSC-IDS.2019.00018 – volume: 57 start-page: 2266 year: 2013 ident: ref_12 article-title: On the features and challenges of security and privacy in distributed internet of things publication-title: Comput. Netw. doi: 10.1016/j.comnet.2012.12.018 – ident: ref_27 doi: 10.1109/BICITS51482.2021.9509883 – ident: ref_16 doi: 10.3390/electronics10091127 – volume: 10 start-page: 139 year: 2018 ident: ref_29 article-title: Review on improvement of advanced encryption standard (AES) algorithm based on time execution, differential cryptanalysis and level of security publication-title: J. Telecommun. Electron. Comput. Eng. JTEC – ident: ref_11 doi: 10.3390/s18124215 – volume: 4 start-page: 12 year: 2021 ident: ref_24 article-title: Securing Collaborative Environment Monitoring in Smart Cities Using Blockchain Enabled Software-Defined Internet of Drones publication-title: IEEE Internet Things Mag. doi: 10.1109/IOTM.0011.2000045 – ident: ref_14 doi: 10.3390/s21041323 – volume: 35 start-page: 1477 year: 2020 ident: ref_1 article-title: The case for blockchain in IoT identity management publication-title: J. Enterp. Inf. Manag. doi: 10.1108/JEIM-07-2018-0148 – volume: 2022 start-page: 9065768 year: 2022 ident: ref_4 article-title: Blockchain Technology on Smart Grid, Energy Trading, and Big Data: Security Issues, Challenges, and Recommendations publication-title: Wirel. Commun. Mob. Comput. doi: 10.1155/2022/9065768 – ident: ref_17 doi: 10.3390/s21227629 – volume: 23 start-page: 391 year: 2020 ident: ref_2 article-title: Potential Identity Resolution Systems for the Industrial Internet of Things: A Survey publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2020.3045136 – ident: ref_15 – volume: 84 start-page: 47 year: 2018 ident: ref_33 article-title: Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications publication-title: Futur. Gener. Comput. Syst. doi: 10.1016/j.future.2018.02.034 – volume: 34 start-page: 1417 year: 2018 ident: ref_36 article-title: BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing publication-title: J. King Saud Univ.-Comput. Inf. Sci. – volume: 81 start-page: 36587 year: 2021 ident: ref_3 article-title: Blockchain for record-keeping and data verifying: Proof of concept publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-021-11336-7 – ident: ref_38 – ident: ref_18 doi: 10.1109/WiMOB.2019.8923232 – ident: ref_19 – volume: 86 start-page: 318 year: 2019 ident: ref_10 article-title: Blockchain based permission delegation and access control in Internet of Things (BACI) publication-title: Comput. Secur. doi: 10.1016/j.cose.2019.06.010 – ident: ref_26 doi: 10.3390/sym11020293 – volume: 2021 start-page: 4401809 year: 2021 ident: ref_35 article-title: Data Integrity Time Optimization of a Blockchain IoT Smart Home Network Using Different Consensus and Hash Algorithms publication-title: Wirel. Commun. Mob. Comput. doi: 10.1155/2021/4401809 – volume: 7 start-page: 22328 year: 2019 ident: ref_5 article-title: A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2896108 |
| SSID | ssj0023338 |
| Score | 2.4507196 |
| Snippet | Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities... |
| SourceID | doaj pubmedcentral proquest gale pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
| StartPage | 2106 |
| SubjectTerms | Access control Algorithms Blockchain Communication digital integrity Digital signatures encryption algorithms Internet of Things P2P Privacy Public Key Infrastructure Sensors Smart cities smart contract Smart houses user integrity |
| SummonAdditionalLinks | – databaseName: DOAJ Open Access Full Text dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Na9wwEB1KyCE9lLbph9OkKKXQXkxsy7KkY1IaWgjbQJOSm5BkiSxpvSG7KfTfd8bWmjUt9NLTfngW5NHMPD2v5gngbZS6iAiLuZU65HXEuXBC-xyZRKVFDIhq_aklZ3I2U1dX-nzjqC_aEzbIAw-OO7Khra2PUjQOwU7V2kcXPdfRet4o5aj6FlKvyVSiWhyZ16AjxJHUHy3p0SeSm2aCPr1I_5-leAOLpvskN4Dn9DE8SitGdjyM9Ak8CN1TeLihI7gLX8_xXb5a5PTKLjGqWGrA_cW-oU1MD-YYNXywL1glfqT2Szbv2OfFBTtBTLvx1xY_zoaN4c_g8vTjxYdPeTotIfe4yFrl3CoeRFG6ILmzsRUkvug4AhSvQ9GKurHUVhui4K1vg669r1QUVQylbIvW8-ew1S268BJYFALTVJcq2rq2hXDaVQhb3OHyxCvuMni_9qLxSUqcTrT4bpBSkMPN6PAM3oymt4N-xt-MTmgqRgOSvO6_wEAwKRDMvwIhg3c0kYYSEwfjbeovwFsiiStzjL9CQyQTGeyv59qkjF2aSkqNwI38KYPD8TLmGv2BYruwuCcbVWA9VgXP4MUQGuOYScgfy2eZgZwEzeSmple6-XWv542Us2wU3_sfXngFOxWGP-0rL_k-bK3u7sMBbPufq_ny7nWfJL8BhiUZUA priority: 102 providerName: Directory of Open Access Journals |
| Title | Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/36850701 https://www.proquest.com/docview/2779678675 https://www.proquest.com/docview/2780763803 https://pubmed.ncbi.nlm.nih.gov/PMC9961683 https://doaj.org/article/aed4acf756b743849cfbfc39fac3688b |
| Volume | 23 |
| WOSCitedRecordID | wos000941451300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M~E dateStart: 20010101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 7X7 dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: BENPR dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: PIMPY dateStart: 20010101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9MwFLfYxgEOfA8CowoICS7RkjiO7RNaUScmsRLBhsopsh2bVWzJaDskLvztvJe4oRGIC5ckTV6lF73vF_v3CHnhuIwdhMVIcWmjzIEsNJMmgkoilcxZiGrt1JJ3fDoVs5ksfMNt6ZdVrn1i66irxmCPfD_lXIJjhfz29eW3CKdG4ddVP0Jji-wgUhno-c54Mi0-9CUXhQqswxOiUNzvL7EFCkVOPohCLVj_ny55IyYN10tuBKDD2__L-h1yy6ee4UGnK3fJNVvfIzc3AAnvk48FXEWrJsJzeArqGfqdvD_CT0DjfIcvxJ0j4XtwNxd-H2c4r8Oj5iQcQ3D8as4U_Jx2K8wfkNPDycmbt5EfuxAZyNZWEVWCWhYn2nKqlasYojhqCpGOZjauWJYr3J9rHaOVqazMjEmFY6mzCa_iytBdsl03tX1EQscY2LtMhFNZpmKmpU4h_lENeY4RVAfk1VoMpfGY5Dga47yE2gQlVvYSC8jznvSyA-L4G9EYZdkTIHZ2e6NZfCm9KZbKVpkyjrNcQ_okMmmcdoZKpwzNhQCmXqImlGjhwIxRfqMCvBJiZZUH8C8ghKokIHtrgZfe9Jflb2kH5Fn_GIwWv8So2jZXSCNicOwipgF52OlWzzNOBAA_nASED7Ru8FLDJ_X8rAUGh9o1yQV9_G-2npAbKVgGLj1P6B7ZXi2u7FNy3XxfzZeLEdniM94exchb06htVMDx-OcE7hVHx8XnXyZvLNw |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VLRJw4P0IFDAIBJeoSRwn9gGhFqi66nZZiS0qp2A7Nl0BSdndgvqn-I2M82IjELceOO0js5G9_ma-GcczA_DEpiKwSIu-TIXxY4troZjQPkYSkWDWIKtVXUtG6XjMDw_FZA1-trkw7lhlaxMrQ52X2u2Rb0ZpKtCwon_78vib77pGuaerbQuNGhZ75vQHhmyLF8PXuL5Po2jnzfTVrt90FfA1OiNLn0pODQtCZVKqpM2ZK1KoKBpyGpsgZ3EiXfqpsYzmOjci1jrilkXWhGke5Jrifc_BeoxgDwawPhnuTz50IR7FiK-uX0SpCDYXbssVg6qkx3pVc4A_KWCFA_vnM1cIb-fK__ZXXYXLjWtNtmpduAZrprgOl1YKLt6AdxN85y9L372SA1Q_0mQqn5L3KGObHUziMmPIWzSnX5s8VTIryLCckm0k_8_6SOLHcX2C_iYcnMmsbsGgKAtzB4hlDO2ZCLmVcSwDpoSKkN-pQj9Oc6o8eN4ue6abmuuu9ceXDGMvh5CsQ4gHjzvR47rQyN-Eth12OgFXG7z6opx_yhpTk0mTx1LblCUK3UMeC22V1VRYqWnCOQ7qmUNe5iwYDkbLJhEDp-RqgWVb-CsUxKjLg40WYFlj2hbZb3R58Ki7jEbJPWmShSlPnAwPkLh4QD24XWO5G7PreIA8E3qQ9lDem1T_SjE7qgqfY2weJpze_fewHsKF3en-KBsNx3v34GKEWumO2Yd0AwbL-Ym5D-f19-VsMX_QaC-Bj2etBb8AmN2F7w |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VglA58C4YCiwIBBcrttcb7x4QaikRUasQibbKzazXuzQC7JKkoP41fh0ztuPGAnHrgVOceGztxt9-M7OeB8Bzl6jAoVr0daKsHzt8FplQxkdPIlLCWdRqVdeS_WQ0kpOJGq_Br2UuDIVVLjmxIuq8NLRH3ouSRCGxon3bc01YxHh38Obku08dpOhN67KdRg2RPXv2E923-evhLj7rF1E0eHfw9r3fdBjwDRomC59rya0IwswmPNMuF1SwMONI6jy2QS7ivqZUVOsEz01uVWxMJJ2InA2TPMgNx_tegstUUpBIIZmcO3scfb-6khHnKujNafMV3at-R_9VbQL-VAYr2rAbqbmi-gY3_uc_7SZcbwxutl2vkFuwZovbcG2lDOMd-DjGI39R-vTJDnFRsiZ_-YwdoYxr9jUZ5cuwD0iy35rsVTYt2LA8YDtoEnwxxxq_juq4-rtweCGz2oT1oizsfWBOCGQ5FUqn41gHIlNZhFqfZ2jdGckzD14tIZCaphI7NQT5mqJHRmhJW7R48KwVPanLj_xNaIdw1ApQxfDqh3L2OW0IKNU2j7VxiehnaDTKWBmXOcOV04b3pcRBvSQUpsRrOBijm_QMnBJVCEu38SoURF_Mg60l2NKG8ObpOdI8eNqeRqqi90-6sOUpycgA1ZkMuAf3aly3Y6Y-CKh9Qg-SDuI7k-qeKabHVTl09NjDvuQP_j2sJ3AVoZ_uD0d7D2EjwgVKsfch34L1xezUPoIr5sdiOp89rpYxg08XvQR-A21vjRw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Peer-to-Peer+User+Identity+Verification+Time+Optimization+in+IoT+Blockchain+Network&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Ammar+Riadh+Kairaldeen&rft.au=Abdullah%2C+Nor+Fadzilah&rft.au=Abu-Samah%2C+Asma&rft.au=Nordin%2C+Rosdiadee&rft.date=2023-02-13&rft.pub=MDPI+AG&rft.eissn=1424-8220&rft.volume=23&rft.issue=4&rft.spage=2106&rft_id=info:doi/10.3390%2Fs23042106&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |