Skip to main content
Erschienen in: The Journal of Supercomputing 7/2024

15.12.2023

Fuzzy miner selection toward Blockchain-based secure communication using multifactor authentication

verfasst von: Sanjib Roy, Ayan Kumar Das

Erschienen in: The Journal of Supercomputing | Ausgabe 7/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The medical cyber-physical system utilizes various Internet of Medical Things (IoMT) devices that are connected to the network for real-time management and medication of patient. The resource constraint IoMT devices require energy-efficient lightweight security schemes to protect medical data. To the best of our knowledge, majority of the existing studies concentrate either on security or on energy efficiency issues. The main contribution of this research is to develop an energy-efficient lightweight authentication method without sacrificing the security level. The authentication is done using multiple factors, namely password, physical unclonable function (PUF), Chebyshev polynomial, smartcard and fuzzy extractor. Chebyshev polynomial is used for non-identification of the private key by any attacker, whereas PUF protects the smart card from cloning by generating unique challenge–response pairs. Apart from authentication, the proposed scheme includes Blockchain-enabled distributed trustable ecosystem among independent participants where miner is selected using lightweight fuzzy system. The proposed scheme carries out the formal security analysis using real or random model which is perseverance against different external attacks and the security verification has been done using AVISPA (Automate Validation of Internet Security Protocols and Applications) tool. As a major finding, the simulation result using NS-3 simulator confirms that the proposed study outperforms the existing studies in terms of packet loss rate, throughput, end-to-end delay, computational cost and communication cost.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon EJ, Yoo KY (2017) Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5:3028–3043 Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon EJ, Yoo KY (2017) Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5:3028–3043
2.
Zurück zum Zitat Ebenuwa SH, Sharif MS, Alazab M, Al-Nemrat A (2019) Variance ranking attributes selection techniques for binary classification problem in imbalance data. IEEE Access 7:24649–24666 Ebenuwa SH, Sharif MS, Alazab M, Al-Nemrat A (2019) Variance ranking attributes selection techniques for binary classification problem in imbalance data. IEEE Access 7:24649–24666
3.
Zurück zum Zitat Humayed A, Lin J, Li F, Luo B (2017) Cyber-physical systems security—a survey. IEEE Internet Things J 4(6):1802–1831 Humayed A, Lin J, Li F, Luo B (2017) Cyber-physical systems security—a survey. IEEE Internet Things J 4(6):1802–1831
4.
Zurück zum Zitat Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2016) Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment. IEEE Trans Dependable Secure Comput 15(5):824–839 Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2016) Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment. IEEE Trans Dependable Secure Comput 15(5):824–839
5.
Zurück zum Zitat Fang H, Qi A, Wang X (2020) Fast authentication and progressive authorization in large-scale IoT: how to leverage ai for security enhancement. IEEE Network 34(3):24–29 Fang H, Qi A, Wang X (2020) Fast authentication and progressive authorization in large-scale IoT: how to leverage ai for security enhancement. IEEE Network 34(3):24–29
6.
Zurück zum Zitat Scheidt EM, Domangue E (2006) Multiple factor-based user identification and authentication. U.S. Patent 7,131,009, 31 Scheidt EM, Domangue E (2006) Multiple factor-based user identification and authentication. U.S. Patent 7,131,009, 31
7.
Zurück zum Zitat Gope P, Sikdar B (2018) Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J 6(1):580–589 Gope P, Sikdar B (2018) Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J 6(1):580–589
8.
Zurück zum Zitat Wolf M, Serpanos D (2017) Safety and security in cyber-physical systems and internet-of-things systems. Proc IEEE 106(1):9–20 Wolf M, Serpanos D (2017) Safety and security in cyber-physical systems and internet-of-things systems. Proc IEEE 106(1):9–20
9.
Zurück zum Zitat Temirlan I, Li Y (2017) ECC-based user authentication scheme for wireless sensor networks. Int J Eng Res Sci 3(6):21–28 Temirlan I, Li Y (2017) ECC-based user authentication scheme for wireless sensor networks. Int J Eng Res Sci 3(6):21–28
10.
Zurück zum Zitat Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw 20:96–112 Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw 20:96–112
11.
Zurück zum Zitat Yoon EJ, Yoo KY, Ha KS (2011) A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 37(3):356–364 Yoon EJ, Yoo KY, Ha KS (2011) A user friendly authentication scheme with anonymity for wireless communications. Comput Electr Eng 37(3):356–364
12.
Zurück zum Zitat Yang D, Yang B (2010) A biometric password-based multi-server authentication scheme with smart card. In: 2010 International Conference on Computer Design and Applications, IEEE vol. 5, pp 534–554 Yang D, Yang B (2010) A biometric password-based multi-server authentication scheme with smart card. In: 2010 International Conference on Computer Design and Applications, IEEE vol. 5, pp 534–554
13.
Zurück zum Zitat Delvaux J, Gu D, Verbauwhede I, Hiller M, Yu MD (2016) Efficient fuzzy extraction of PUF-induced secrets: Theory and applications. In: Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International Conference, Santa Barbara, CA, USA, Springer, pp 412–431 Delvaux J, Gu D, Verbauwhede I, Hiller M, Yu MD (2016) Efficient fuzzy extraction of PUF-induced secrets: Theory and applications. In: Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International Conference, Santa Barbara, CA, USA, Springer, pp 412–431
14.
Zurück zum Zitat Odelu V, Das AK, Goswami A (2015) An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards. Secur Commun Netw 8(18):4136–4156 Odelu V, Das AK, Goswami A (2015) An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards. Secur Commun Netw 8(18):4136–4156
15.
Zurück zum Zitat Duan X, Li X (2011) Security of a new password authentication scheme using fuzzy extractor with Smart Card. In: 2011 IEEE 3rd International Conference on Communication Software and Networks, IEEE, pp 282–284 Duan X, Li X (2011) Security of a new password authentication scheme using fuzzy extractor with Smart Card. In: 2011 IEEE 3rd International Conference on Communication Software and Networks, IEEE, pp 282–284
16.
Zurück zum Zitat Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment. Internet Things J IEEE 5(6):4900–4913 Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment. Internet Things J IEEE 5(6):4900–4913
17.
Zurück zum Zitat Li Q, Guo M, Chang EC (xxxx) Fuzzy extractors for asymmetric biometric representations. In: 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, IEEE pp 1–6 Li Q, Guo M, Chang EC (xxxx) Fuzzy extractors for asymmetric biometric representations. In: 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, IEEE pp 1–6
18.
Zurück zum Zitat Bergamo P, D’Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst I Regul Pap 52(7):1382–1393MathSciNet Bergamo P, D’Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst I Regul Pap 52(7):1382–1393MathSciNet
19.
Zurück zum Zitat Yau WC, Phan RCW (2013) Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37:1–9 Yau WC, Phan RCW (2013) Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37:1–9
20.
Zurück zum Zitat Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map based authentication scheme for telecare medicine information systems. J Med Syst 37:1–19 Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map based authentication scheme for telecare medicine information systems. J Med Syst 37:1–19
21.
Zurück zum Zitat Lee TF (2013) An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J Med Syst 37(6):9985 Lee TF (2013) An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J Med Syst 37(6):9985
22.
Zurück zum Zitat Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3):669–674MathSciNet Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3):669–674MathSciNet
23.
Zurück zum Zitat Gassend B, Clarke D, Van Dijk M, Devadas S (2002) Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM, pp 148–160 Gassend B, Clarke D, Van Dijk M, Devadas S (2002) Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM, pp 148–160
24.
Zurück zum Zitat Rührmair U, Sölter J, Sehnke F, Xu X, Mahmoud A, Stoyanova V, Devadas S (2013) PUF modeling attacks on simulated and silicon data. IEEE Trans Inf Forensics Secur 8(11):1876–1891 Rührmair U, Sölter J, Sehnke F, Xu X, Mahmoud A, Stoyanova V, Devadas S (2013) PUF modeling attacks on simulated and silicon data. IEEE Trans Inf Forensics Secur 8(11):1876–1891
25.
Zurück zum Zitat Gao Y, Ma H, Al-Sarawi SF, Abbott D, Ranasinghe DC (2017) PUF-FSM: a controlled strong PUF. Trans Comput Aided Des Integr Circuits Syst IEEE 37(5):1104–1108 Gao Y, Ma H, Al-Sarawi SF, Abbott D, Ranasinghe DC (2017) PUF-FSM: a controlled strong PUF. Trans Comput Aided Des Integr Circuits Syst IEEE 37(5):1104–1108
26.
Zurück zum Zitat Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2019) LSB: a lightweight scalable Blockchain for IoT security and anonymity. J Parallel Distrib Comput 134:180–197 Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2019) LSB: a lightweight scalable Blockchain for IoT security and anonymity. J Parallel Distrib Comput 134:180–197
27.
Zurück zum Zitat Qu Y, Gao L, Luan TH, Xiang Y, Yu S, Li B, Zheng G (2020) Decentralized privacy using blockchain-enabled federated learning in fog computing. Internet Things J IEEE 7(6):5171–5183 Qu Y, Gao L, Luan TH, Xiang Y, Yu S, Li B, Zheng G (2020) Decentralized privacy using blockchain-enabled federated learning in fog computing. Internet Things J IEEE 7(6):5171–5183
28.
Zurück zum Zitat Zhou B, Li H, Xu L (xxxx)An authentication scheme using identity-based encryption & blockchain. In: 2018 IEEE Symposium on computers and communications (ISCC) pp 00556–00561 Zhou B, Li H, Xu L (xxxx)An authentication scheme using identity-based encryption & blockchain. In: 2018 IEEE Symposium on computers and communications (ISCC) pp 00556–00561
29.
Zurück zum Zitat Wang EK, Sun R, Chen CM, Liang Z, Kumari S, Khan MK (2020) Proof of X-repute blockchain consensus protocol for IoT systems. Comput Secur 95:101871 Wang EK, Sun R, Chen CM, Liang Z, Kumari S, Khan MK (2020) Proof of X-repute blockchain consensus protocol for IoT systems. Comput Secur 95:101871
30.
Zurück zum Zitat Ashfaq T, Khalid MI, Ali G, Affendi ME, Iqbal J, Hussain S, Mateen A (2022) An efficient and secure energy trading approach with machine learning technique and consortium blockchain. Sensors 22(19):7263 Ashfaq T, Khalid MI, Ali G, Affendi ME, Iqbal J, Hussain S, Mateen A (2022) An efficient and secure energy trading approach with machine learning technique and consortium blockchain. Sensors 22(19):7263
31.
Zurück zum Zitat Chaudhary R, Jindal A, Aujla GS, Aggarwal S, Kumar N, Choo KKR (2019) BEST: blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Comput Secur 85:288–299 Chaudhary R, Jindal A, Aujla GS, Aggarwal S, Kumar N, Choo KKR (2019) BEST: blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Comput Secur 85:288–299
32.
Zurück zum Zitat Jindal A, Aujla GS, Kumar N (2019) SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment. Comput Netw 153:36–48 Jindal A, Aujla GS, Kumar N (2019) SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment. Comput Netw 153:36–48
33.
Zurück zum Zitat Wu F, Xu L, Kumari S, Li X (2017) An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Syst 23:195–205 Wu F, Xu L, Kumari S, Li X (2017) An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Syst 23:195–205
34.
Zurück zum Zitat Amin R, Islam SH, Biswas GP, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Futur Gener Comput Syst 80:483–495 Amin R, Islam SH, Biswas GP, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Futur Gener Comput Syst 80:483–495
35.
Zurück zum Zitat Wallrabenstein JR (2016) Practical and secure IoT device authentication using physical unclonable functions. In: 2016 4th International Conference on Future Internet of Things and Cloud (FiCloud) IEEE, pp 99–106 Wallrabenstein JR (2016) Practical and secure IoT device authentication using physical unclonable functions. In: 2016 4th International Conference on Future Internet of Things and Cloud (FiCloud) IEEE, pp 99–106
36.
Zurück zum Zitat Che W, Saqib F, Plusquellic J PUF-based authentication. In: 2015 IEEE/ACM international conference on computer-aided design (ICCAD) pp 337–344 Che W, Saqib F, Plusquellic J PUF-based authentication. In: 2015 IEEE/ACM international conference on computer-aided design (ICCAD) pp 337–344
37.
Zurück zum Zitat Aman MN, Chua KC, Sikdar B (2017) Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet Things J 4(5):1327–1340 Aman MN, Chua KC, Sikdar B (2017) Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet Things J 4(5):1327–1340
38.
Zurück zum Zitat Chatterjee U, Govindan V, Sadhukhan R, Mukhopadhyay D, Chakraborty RS, Mahata D, Prabhu MM (2018) Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database. IEEE Trans Dependable Secure comput IEEE 16(3):424–437 Chatterjee U, Govindan V, Sadhukhan R, Mukhopadhyay D, Chakraborty RS, Mahata D, Prabhu MM (2018) Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database. IEEE Trans Dependable Secure comput IEEE 16(3):424–437
39.
Zurück zum Zitat Muhal MA, Luo X, Mahmood Z, Ullah A (2018) Physical unclonable function based authentication scheme for smart devices in Internet of Things. In: 2018 IEEE International Conference on Smart Internet of Things (SmartIoT) pp 160–165 Muhal MA, Luo X, Mahmood Z, Ullah A (2018) Physical unclonable function based authentication scheme for smart devices in Internet of Things. In: 2018 IEEE International Conference on Smart Internet of Things (SmartIoT) pp 160–165
40.
Zurück zum Zitat Frikken KB, Blanton M, Atallah MJ (2009) Robust authentication using physically unclonable functions. In: Information Security: 12th International Conference, ISC 2009, Springer, Pisa, Italy, pp 262–277 Frikken KB, Blanton M, Atallah MJ (2009) Robust authentication using physically unclonable functions. In: Information Security: 12th International Conference, ISC 2009, Springer, Pisa, Italy, pp 262–277
41.
Zurück zum Zitat Yilmaz Y, Gunn SR, Halak B (2018) Lightweight PUF-based authentication protocol for IoT devices. In: 2018 3rd International Verification And Security Workshop (IVSW), IEEE, pp 38–43 Yilmaz Y, Gunn SR, Halak B (2018) Lightweight PUF-based authentication protocol for IoT devices. In: 2018 3rd International Verification And Security Workshop (IVSW), IEEE, pp 38–43
42.
Zurück zum Zitat Gope P, Lee J, Quek TQ (2018) Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Trans Inf Forensics Secur 13(11):2831–2843 Gope P, Lee J, Quek TQ (2018) Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Trans Inf Forensics Secur 13(11):2831–2843
43.
Zurück zum Zitat Khan MK, Zhang J, Wang X (2008) Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 35(3):519–524 Khan MK, Zhang J, Wang X (2008) Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 35(3):519–524
44.
Zurück zum Zitat Irshad A, Ahmad HF, Alzahrani BA, Sher M, Chaudhry SA (2016) An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture Irshad A, Ahmad HF, Alzahrani BA, Sher M, Chaudhry SA (2016) An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture
45.
Zurück zum Zitat Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39(3):1283–1289MathSciNet Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39(3):1283–1289MathSciNet
46.
Zurück zum Zitat Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 30(1):e2933 Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 30(1):e2933
47.
Zurück zum Zitat Duan X, Li X (2011) Security of a new password authentication scheme using fuzzy extractor with Smart Card. In: 2011 IEEE 3rd International Conference on Communication Software and Networks, pp 282–284 Duan X, Li X (2011) Security of a new password authentication scheme using fuzzy extractor with Smart Card. In: 2011 IEEE 3rd International Conference on Communication Software and Networks, pp 282–284
48.
Zurück zum Zitat Tan Z (2013) An efficient biometrics-based authentication scheme for telecare medicine information systems. Network 2(3):200–204 Tan Z (2013) An efficient biometrics-based authentication scheme for telecare medicine information systems. Network 2(3):200–204
49.
Zurück zum Zitat Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment. IEEE Internet Things J 5(6):4900–4913 Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment. IEEE Internet Things J 5(6):4900–4913
50.
Zurück zum Zitat Tong VVT, Sibert H, Lecoeur J, Girault M (2007) Biometric fuzzy extractors made practical: a proposal based on fingercodes. In: Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea, Springer, pp 604–613 Tong VVT, Sibert H, Lecoeur J, Girault M (2007) Biometric fuzzy extractors made practical: a proposal based on fingercodes. In: Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea, Springer, pp 604–613
51.
Zurück zum Zitat Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, Springer, pp 523–540 Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, Springer, pp 523–540
52.
Zurück zum Zitat Arakala A, Jeffers J, Horadam KJ (2007) Fuzzy extractors for minutiae-based fingerprint authentication. In: Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea, Springer, pp 760–769 Arakala A, Jeffers J, Horadam KJ (2007) Fuzzy extractors for minutiae-based fingerprint authentication. In: Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea, Springer, pp 760–769
53.
Zurück zum Zitat Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208MathSciNet Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208MathSciNet
54.
Zurück zum Zitat Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, Springer Berlin Heidelberg, 2001, pp 453–474 Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, Springer Berlin Heidelberg, 2001, pp 453–474
55.
Zurück zum Zitat Qi R, Ji S, Shen J, Vijayakumar P, Kumar N (2021) Security preservation in industrial medical CPS using Chebyshev map: An AI approach. Futur Gener Comput Syst 122:52–62 Qi R, Ji S, Shen J, Vijayakumar P, Kumar N (2021) Security preservation in industrial medical CPS using Chebyshev map: An AI approach. Futur Gener Comput Syst 122:52–62
56.
Zurück zum Zitat Lamport L, Shostak R, Pease M (2019) The byzantine generals problem. In: Concurrency: the works of leslie lamport, p 20 Lamport L, Shostak R, Pease M (2019) The byzantine generals problem. In: Concurrency: the works of leslie lamport, p 20
57.
Zurück zum Zitat Alkhalifah A, Ng A, Watters PA, Kayes AS (2021) A mechanism to detect and prevent ethereum blockchain smart contract reentrancy attacks. Front Comput Sci 3:598–780 Alkhalifah A, Ng A, Watters PA, Kayes AS (2021) A mechanism to detect and prevent ethereum blockchain smart contract reentrancy attacks. Front Comput Sci 3:598–780
59.
Zurück zum Zitat Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, Springer, pp 65–84 Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, Springer, pp 65–84
60.
Zurück zum Zitat Kumar G, Saha R, Rai MK, Thomas R, Kim TH (2019) Proof-ofwork consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics. IEEE Internet Things J 6(4):6835–6842 Kumar G, Saha R, Rai MK, Thomas R, Kim TH (2019) Proof-ofwork consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics. IEEE Internet Things J 6(4):6835–6842
61.
Zurück zum Zitat Fotouhi M, Bayat M, Das AK, Far HA, Pournaghi SM, Doostari MA (2020) A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput Netw 177:107333 Fotouhi M, Bayat M, Das AK, Far HA, Pournaghi SM, Doostari MA (2020) A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput Netw 177:107333
62.
Zurück zum Zitat Campanile L, Gribaudo M, Iacono M, Marulli F, Mastroianni M (2020) Computer network simulation with ns-3: A systematic literature review. Electronics 9(2):272 Campanile L, Gribaudo M, Iacono M, Marulli F, Mastroianni M (2020) Computer network simulation with ns-3: A systematic literature review. Electronics 9(2):272
63.
Zurück zum Zitat Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Trans Dependable Secure Comput 17(6):1133–1146 Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Trans Dependable Secure Comput 17(6):1133–1146
64.
Zurück zum Zitat Miller A, Xia Y, Croman K, Shi E, Song D (2016) The honey badger of BFT protocols. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 31–42 Miller A, Xia Y, Croman K, Shi E, Song D (2016) The honey badger of BFT protocols. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 31–42
65.
66.
Zurück zum Zitat Facchinetti G, Pacchiarotti N (2003) A general defuzzification method for fuzzy total cost in an inventory without backorder case. In: Fuzzy Logic and Applications: 5th International Workshop, WILF 2003, Naples, Italy, Springer, pp 140–147 Facchinetti G, Pacchiarotti N (2003) A general defuzzification method for fuzzy total cost in an inventory without backorder case. In: Fuzzy Logic and Applications: 5th International Workshop, WILF 2003, Naples, Italy, Springer, pp 140–147
67.
Zurück zum Zitat Amintoosi H, Nikooghadam M, Shojafar M, Kumari S, Alazab M (2022) Slight: A lightweight authentication scheme for smart healthcare services. Comput Electr Eng 99:107803 Amintoosi H, Nikooghadam M, Shojafar M, Kumari S, Alazab M (2022) Slight: A lightweight authentication scheme for smart healthcare services. Comput Electr Eng 99:107803
68.
Zurück zum Zitat Nikkhah F, Safkhani M (2021) LAPCHS: a lightweight authentication protocol for cloud-based health-care systems. Comput Netw 187:107833 Nikkhah F, Safkhani M (2021) LAPCHS: a lightweight authentication protocol for cloud-based health-care systems. Comput Netw 187:107833
69.
Zurück zum Zitat Rangwani D, Om H (2022) Four-factor mutual authentication scheme for health-care based on wireless body area network. J Supercomput, 1–35 Rangwani D, Om H (2022) Four-factor mutual authentication scheme for health-care based on wireless body area network. J Supercomput, 1–35
70.
Zurück zum Zitat Alshawish I, Al-Haj A (2022) An efficient mutual authentication scheme for IoT systems. J Supercomput 78(14):16056–16087 Alshawish I, Al-Haj A (2022) An efficient mutual authentication scheme for IoT systems. J Supercomput 78(14):16056–16087
71.
Zurück zum Zitat Jan SU, Ghani A, Alzahrani A, Saqlain SM, Yahya K, Sajjad H (2023) Bandwidth and Power Efficient Lightweight Authentication Scheme for Healthcare Systeme. J King Saud Univ Comput Inf Sci, 101601 Jan SU, Ghani A, Alzahrani A, Saqlain SM, Yahya K, Sajjad H (2023) Bandwidth and Power Efficient Lightweight Authentication Scheme for Healthcare Systeme. J King Saud Univ Comput Inf Sci, 101601
Metadaten
Titel
Fuzzy miner selection toward Blockchain-based secure communication using multifactor authentication
verfasst von
Sanjib Roy
Ayan Kumar Das
Publikationsdatum
15.12.2023
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 7/2024
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05844-6

Weitere Artikel der Ausgabe 7/2024

The Journal of Supercomputing 7/2024 Zur Ausgabe

Premium Partner