Cargando…

Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network

Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for...

Descripción completa

Detalles Bibliográficos
Autores principales: Kairaldeen, Ammar Riadh, Abdullah, Nor Fadzilah, Abu-Samah, Asma, Nordin, Rosdiadee
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9961683/
https://www.ncbi.nlm.nih.gov/pubmed/36850701
http://dx.doi.org/10.3390/s23042106
_version_ 1784895815126351872
author Kairaldeen, Ammar Riadh
Abdullah, Nor Fadzilah
Abu-Samah, Asma
Nordin, Rosdiadee
author_facet Kairaldeen, Ammar Riadh
Abdullah, Nor Fadzilah
Abu-Samah, Asma
Nordin, Rosdiadee
author_sort Kairaldeen, Ammar Riadh
collection PubMed
description Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for the user signature in a peer-to-peer decentralized IoT blockchain network. To achieve this, a user signature-based identity management framework is examined by using various encryption techniques and contrasting various hash functions built on top of the Modified Merkle Hash Tree (MMHT) data structure algorithm. The paper presents the execution of varying dataset sizes based on transactions between nodes to test the scalability of the proposed design for secure blockchain communication. The results show that the MMHT data structure algorithm using SHA3 and AES-128 encryption algorithm gives the lowest execution time, offering a minimum of 36% gain in time optimization compared to other algorithms. This work shows that using the AES-128 encryption algorithm with the MMHT algorithm and SHA3 hash function not only identifies malicious codes but also improves user integrity check performance in a blockchain network, while ensuring network scalability. Therefore, this study presents the performance evaluation of a blockchain network considering its distinct types, properties, components, and algorithms’ taxonomy.
format Online
Article
Text
id pubmed-9961683
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-99616832023-02-26 Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network Kairaldeen, Ammar Riadh Abdullah, Nor Fadzilah Abu-Samah, Asma Nordin, Rosdiadee Sensors (Basel) Article Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for the user signature in a peer-to-peer decentralized IoT blockchain network. To achieve this, a user signature-based identity management framework is examined by using various encryption techniques and contrasting various hash functions built on top of the Modified Merkle Hash Tree (MMHT) data structure algorithm. The paper presents the execution of varying dataset sizes based on transactions between nodes to test the scalability of the proposed design for secure blockchain communication. The results show that the MMHT data structure algorithm using SHA3 and AES-128 encryption algorithm gives the lowest execution time, offering a minimum of 36% gain in time optimization compared to other algorithms. This work shows that using the AES-128 encryption algorithm with the MMHT algorithm and SHA3 hash function not only identifies malicious codes but also improves user integrity check performance in a blockchain network, while ensuring network scalability. Therefore, this study presents the performance evaluation of a blockchain network considering its distinct types, properties, components, and algorithms’ taxonomy. MDPI 2023-02-13 /pmc/articles/PMC9961683/ /pubmed/36850701 http://dx.doi.org/10.3390/s23042106 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Kairaldeen, Ammar Riadh
Abdullah, Nor Fadzilah
Abu-Samah, Asma
Nordin, Rosdiadee
Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network
title Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network
title_full Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network
title_fullStr Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network
title_full_unstemmed Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network
title_short Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network
title_sort peer-to-peer user identity verification time optimization in iot blockchain network
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9961683/
https://www.ncbi.nlm.nih.gov/pubmed/36850701
http://dx.doi.org/10.3390/s23042106
work_keys_str_mv AT kairaldeenammarriadh peertopeeruseridentityverificationtimeoptimizationiniotblockchainnetwork
AT abdullahnorfadzilah peertopeeruseridentityverificationtimeoptimizationiniotblockchainnetwork
AT abusamahasma peertopeeruseridentityverificationtimeoptimizationiniotblockchainnetwork
AT nordinrosdiadee peertopeeruseridentityverificationtimeoptimizationiniotblockchainnetwork