Essays about: "Proof-of-Authentication"

Found 3 essays containing the word Proof-of-Authentication.

  1. 1. Comparison between consensus algorithms in an IIoT network : Analysis of Proof of Work, Proof of Stake and Proof of Authentication

    University essay from KTH/Hälsoinformatik och logistik

    Author : Baran Polat; Ilyas Göcmenoglu; [2022]
    Keywords : Proof of work; Proof of stake; IIoT; Proof of authentication; Blockchain; CloudRail; electricity consumption; time effectiveness; security; Proof of work; Proof of stake; IIoT; Proof of authentication; Blockkedja; CloudRail; elkonsumtion; tidseffektivitet; säkerhet;

    Abstract : The Industrial Internet of Things (IIoT) is growing day by day and is implemented in many industries. The centralized architecture of an IIoT system is composed of several devices that communicate with a special device only via one link, in an instance where this one link is attacked, major problems could occur for the whole system. READ MORE

  2. 2. PUF-enabled blockchain for IoT security : A comparative study

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jonathon Bisiach; Victor Elfving; [2021]
    Keywords : Internet of Things; Internet of Everything; Blockchain; Physical Unclonable Functions; Consensus Algorithms; Proof of Work; Proof of Authentication; Proof of PUF-enabled Authentication;

    Abstract : The introduction of Physical Unclonable Functions (PUFs) and lightweight consensus algorithms to aid in the bolstering of security and privacy in both IoT and IoE does show a great deal of promise not only in these areas, but in resource cost over traditional methods of blockchain.  However, several previous studies make claims regarding performance of novel solutions without providing detailed information as to the physical components of their experiments. READ MORE

  3. 3. Consensus algorithms for adding blocks to private blockchains in IIoT networks : Comparison of two Proof-of-Authentication implementations on IIoT hardware

    University essay from KTH/Hälsoinformatik och logistik

    Author : Kamile Juvencius; Therése Ankarberg; [2021]
    Keywords : IoT; IIoT; blockchain; consensus algorithms; Proof-of-Authentication; CloudRail; IoT; IIoT; blockkedja; konsensusalgoritmer; Proof-of-Authentication; CloudRail;

    Abstract : The Internet of Things (IoT) market is growing by the day and there are no signs of stagnation. As the market grows, it becomes all the more important to address security concerns. A major security issue of IoT is that the devices usually send their collected data to a centralized entity, creating a single point of failure. READ MORE