Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Bcse: Blockchain-Based Trusted Service Evaluation Model Over Big Data, Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou Mar 2022

Bcse: Blockchain-Based Trusted Service Evaluation Model Over Big Data, Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou

Big Data Mining and Analytics

The blockchain, with its key characteristics of decentralization, persistence, anonymity, and auditability, has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions. Because of these characteristics, the blockchain is suitable for solving certain open problems in the service-oriented social network, where the unreliability of submitted reviews of service vendors can cause serious security problems. To solve the unreliability problems of submitted reviews, this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model. The new …


Research Of Multi-Factor Identity Authentication Scheme For Zigbee Network Nodes, Weiwei Zhou, Yuntian Yue, Bin Yu Aug 2020

Research Of Multi-Factor Identity Authentication Scheme For Zigbee Network Nodes, Weiwei Zhou, Yuntian Yue, Bin Yu

Journal of System Simulation

Abstract: To solve the problem of the man-in-the-middle attack and impersonation attack in ZigBee networks, a scheme based on multi-factor identity authentication for ZigBee network nodes was proposed. The scheme bound the fresh factor updated in a particular cycle with hardware information via a one-way hash function to generate hardware information factor. On this basis, the scheme achieved the authentication mechanism for the nodes through the comparison among key factor, hardware information factor and configuration information factor received by control center. Meanwhile, the nodes completed control center authentication through the signature verification of the message received. Thus, the bidirectional authentication …