Research Article
Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms
Table 1
The comparison results between the five schemes.
| | KPSD | IBCCPA | EAAP | EPAW | BA |
| Two-way authentication | × | √ | √ | √ | √ | Privacy protection | √ | √ | √ | √ | √ | Traceability | × | √ | √ | × | √ | Resistance to forgery attacks | √ | √ | √ | √ | √ | Resistance to power abuse | × | × | × | × | √ | Resistance to replay attacks | × | √ | × | √ | √ |
|
|