Research Article

Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms

Table 1

The comparison results between the five schemes.

KPSDIBCCPAEAAPEPAWBA

Two-way authentication×
Privacy protection
Traceability××
Resistance to forgery attacks
Resistance to power abuse××××
Resistance to replay attacks××