International Conference on Pattern Analysis and Intelligent Systems.
1. Introduction. Problematic. 2. Internet of Things(IoT).
Introduction. The internet of things(IoT) plays an increasingly crucial role in the contemporary world..
Problematic. The exchange of data is essential among IoT devices. However, data can be vulnerable to various attacks. The authentication phase is one of the most important phases in security..
[image] J0078625. What is the Internet of Things?.
Security and Blockchain. 7.
Security mechanism:. Elliptic Curve Cryptography(ECC).
Blockchain. Security and Blockchain. A decentralized ledger..
Proposed approach. Our proposed approach comprises 4 phases.
01. The key generation phase. Proposed Approach. 11.
Generation of random numbers. Generation of the ECC private key.
02. The registration phase. Proposed Approach. 13.
Users. Proposed Approach. PuB EncryptedID. قفل PNG الصور | ناقل و PSD الملفات | تحميل مجاني على Pngtree.
03. The authentication phase. Proposed Approach. 17.
User. Generate N. Proposed Approach. Calculate HASH(ID).
04. The session key phase. s. Proposed Approach. 19.
SK = N Xor ID. SK = N’ Xor ID. Approche Proposé. Don’t share.
Simulation et Résultat. [image]. 21.
[image] J0078625. s. Why NS3?. NS3. 22. Open source.
Protocol excution time. The first graph highlights the following key elements:.
The third graph highlights the following key elements:.
The average block creation time. The first chart highlights the following key elements:.
Throughput. The following graph highlights the following points:.
Comparison graph. 27.
Computational cost. The following graph shows the comparison between our scheme and other schemes in terms of computation cost..
Communication cost. The following graph shows the comparison between our scheme and other schemes in terms of communication cost..
Conclusion. Security in the Internet of Things (IoT) is one of the hottest topics of our time. In this thesis, we have proposed a secure scheme that ensures a secure authentication and data exchange process by using blockchain..
THANK YOU FOR YOUR ATTENTION.. [image] 52rose ouvre.