Research Article
Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms
Figure 7
The identity authentication scheme. Notes: timestamp, flag, and signature SA are omitted from the transactions in all processes of this scheme.