Essays about: "Proof-of-Authentication"
Found 3 essays containing the word Proof-of-Authentication.
-
1. Comparison between consensus algorithms in an IIoT network : Analysis of Proof of Work, Proof of Stake and Proof of Authentication
University essay from KTH/Hälsoinformatik och logistikAbstract : The Industrial Internet of Things (IIoT) is growing day by day and is implemented in many industries. The centralized architecture of an IIoT system is composed of several devices that communicate with a special device only via one link, in an instance where this one link is attacked, major problems could occur for the whole system. READ MORE
-
2. PUF-enabled blockchain for IoT security : A comparative study
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The introduction of Physical Unclonable Functions (PUFs) and lightweight consensus algorithms to aid in the bolstering of security and privacy in both IoT and IoE does show a great deal of promise not only in these areas, but in resource cost over traditional methods of blockchain. However, several previous studies make claims regarding performance of novel solutions without providing detailed information as to the physical components of their experiments. READ MORE
-
3. Consensus algorithms for adding blocks to private blockchains in IIoT networks : Comparison of two Proof-of-Authentication implementations on IIoT hardware
University essay from KTH/Hälsoinformatik och logistikAbstract : The Internet of Things (IoT) market is growing by the day and there are no signs of stagnation. As the market grows, it becomes all the more important to address security concerns. A major security issue of IoT is that the devices usually send their collected data to a centralized entity, creating a single point of failure. READ MORE