Tuan et al., 2022 - Google Patents
A blockchain-based authentication and access control for smart devices in sdn-enabled networks for metaverseTuan et al., 2022
- Document ID
- 4991094655698806659
- Author
- Tuan D
- Duy P
- Pham V
- et al.
- Publication year
- Publication venue
- 2022 9th NAFOSTED Conference on Information and Computer Science (NICS)
External Links
Snippet
Emerging with outstanding features in network management, Software Defined Networking (SDN) is considered as a flexible and efficient paradigm in the context of smart city including a massive number of heterogeneous devices. In the vision of Metaverse towards, SDN plays …
- 230000002708 enhancing 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/485—Task life-cycle, e.g. stopping, restarting, resuming execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lim et al. | Blockchain technology the identity management and authentication service disruptor: a survey | |
Khalid et al. | A decentralized lightweight blockchain-based authentication mechanism for IoT systems | |
Han et al. | A blockchain-based auditable access control system for private data in service-centric IoT environments | |
Zissis et al. | Addressing cloud computing security issues | |
US9509692B2 (en) | Secured access to resources using a proxy | |
Abbasi et al. | Veidblock: Verifiable identity using blockchain and ledger in a software defined network | |
US20230370265A1 (en) | Method, Apparatus and Device for Constructing Token for Cloud Platform Resource Access Control | |
JP2023547630A (en) | Certificate-based security using post-quantum cryptography | |
Rui et al. | Research on secure transmission and storage of energy IoT information based on Blockchain | |
Huang et al. | An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture | |
Tuan et al. | A blockchain-based authentication and access control for smart devices in sdn-enabled networks for metaverse | |
Cui et al. | IoT data management and lineage traceability: A blockchain-based solution | |
Xu et al. | An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption | |
Kumar et al. | Multi-authentication for cloud security: A framework | |
Chen et al. | A self-sovereign decentralized identity platform based on blockchain | |
Karthick et al. | Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems | |
Otta et al. | Cloud identity and access management solution with blockchain | |
Chen et al. | Cloud service platform of electronic identity in cyberspace | |
Tiwari et al. | Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos | |
Chen et al. | A New Identity Authentication and Key Agreement Protocol Based on Multi-Layer Blockchain in Edge Computing | |
Xiaohong et al. | Intelligent computing scheme of blockchain based on trusted execution environment | |
Farzana et al. | Symmetric key-based patient controlled secured electronic health record management protocol | |
Varfolomeeva et al. | Blockchain Fog-based scheme for identity authentication in smart building | |
Abubakar | Blockchain-based Authentication and Access Control Mechanism for Internet of Things (IoT) | |
Akoramurthy et al. | A Blockchain approach to improving digital linked management information systems (MIS) |