A Hybrid BlockChain-Based Identity Authentication Scheme For Multi-WSN
A Hybrid BlockChain-Based Identity Authentication Scheme For Multi-WSN
Abstract—Internet of Things (IoT) equipment is usually in a harsh environment, and its security has always been a widely concerned
issue. Node identity authentication is an important means to ensure its security. Traditional IoT identity authentication protocols usually
rely on trusted third parties. However, many IoT environments do not allow such conditions, and are prone to single point failure.
Blockchain technology with decentralization features provides a new solution for distributed IoT system. In this paper, a blockchain based
multi-WSN authentication scheme for IoT is proposed. The nodes of IoT are divided into base stations, cluster head nodes and ordinary
nodes according to their capability differences, which are formed to a hierarchical network. A blockchain network is constructed among
different types of nodes to form a hybrid blockchain model, including local chain and public chain. In this hybrid model, nodes identity
mutual authentication in various communication scenarios is realized, ordinary node identity authentication operation is accomplished
by local blockchain, and cluster head node identity authentication are realized in public blockchain. The analysis of security and
performance shows that the scheme has comprehensive security and better performance.
1 INTRODUCTION
IRELESS Sensor Network (WSN) is an important part of In the IoT environment, different sensor networks, networks
W the Internet of Things (IoT), which is used to collect
information from specific areas. WSN is a self-organizing
and end users, and intra-network nodes need to cooperate to
provide services. Therefore, it is necessary to manage the
network formed by a large number of cheap, weak comput- identity of sensor nodes safely and to realize the security
ing and storage capacity and limited energy sensor nodes. authentication between sensor nodes [7]. Because the envi-
WSN of the IoT is widely used in various fields, including ronment of sensor nodes in WSN is more complex and harsh,
medical monitoring, environmental monitoring, agricultural it is important to study the security authentication between
management, military applications, disaster management, sensor nodes in WSN.
and surveillance systems and other areas [1], [2], [3], [4], [5]. Traditional IoT security authentication protocols mostly
WSN architecture of the IoT mainly includes centralized and adopt centralized authentication methods. Such authentica-
distributed [6]. In centralized WSN, sensor nodes aggregate tion protocols [8], [9], [10] need to rely on a trusted third
data to base stations through network routing for processing party, such as Certificate Authorization center, authentica-
and analysis. In distributed WSN, user terminals and other tion server, and so on, so there is a threat of single-point fail-
network entities (such as other sensor nodes or network ure. Blockchain, as a new decentralized distributed system
devices) can obtain original data directly from sensor nodes. technology, coincides with the distributed characteristics of
the IoT, which provides a new way to solve the security
problems of the IoT [11], [12]. However, as the implementa-
Z. Cui and X. Cai are with the College of Computer Science and Technology, tion of blockchain for IoT security is still in the exploratory
Taiyuan University of Science and Technology, Taiyuan, Shanxi 030024, stage, there are still many problems in the existing block-
China. E-mail: [email protected], [email protected].
F. Xue and Y. Cao are with the School of Information, Beijing Wuzi chain-based methods.
University, Beijing 101149, China. In current research on the security of the IoT, the related
E-mail: {xuefei2004, caoyangcwz}@126.com. work on the blockchain is mainly carried out from two
S. Zhang is with the Faculty of Information Technology, Beijing University
of Technology, Beijing 100124, China. E-mail: [email protected].
aspects: the security architecture of the IoT and the security
W. Zhang is with the State Key Laboratory of Intelligent Control and authentication [13], [14], [15]. The research of security archi-
Management of Complex Systems, Institute of Automation Chinese Academy tecture of IoT based on blockchain mainly focus on the dis-
of Sciences, Beijing 100190, China. E-mail: [email protected]. tributed characteristics of devices in the IoT and how they fit
J. Chen is with Complex System and Computational Intelligence Labo-
ratory, Taiyuan University of Science and Technology, Taiyuan, Shanxi better with the topological structure of blockchain, so as to
030024, China, and also with Swinburne Data Science Research Institute, achieve the unification of the logical structure of the two, so
Swinburne University of Technology, Hawthorn, VIC 3122, Australia. that the blockchain can better serve the security of the IoT. In
E-mail: [email protected].
the aspect of authentication, the existing research mainly
Manuscript received 30 Mar. 2019; revised 11 Nov. 2019; accepted 20 Dec. constructs a peer-to-peer network through gateway nodes,
2019. Date of publication 7 Jan. 2020; date of current version 15 Apr. 2020.
(Corresponding author: Xingjuan Cai.) edge nodes, fog nodes and other devices that can support the
Digital Object Identifier no. 10.1109/TSC.2020.2964537 deployment of blockchain to form a blockchain network, and
1939-1374 ß 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See ht_tps://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Indian Institute of Information Technology Kottayam. Downloaded on August 13,2024 at 09:00:01 UTC from IEEE Xplore. Restrictions apply.
242 IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 13, NO. 2, MARCH/APRIL 2020
achieves the identity authentication of devices in the IoT transaction records in the block twice, the result is regarded
through the blockchain. as the leaf node of Merkle tree, and then the hash value of
However, these security solutions for the IoT still have two adjacent nodes is recursively obtained until the last hash
many problems, such as not completely solving the single result, which is Merkle root. Transactions are bundled
point failure problem, weak scene adaptability and so on. together and submitted to blockchains in block form, and
To deal with these problems a blockchain-based mutual password technology is used to connect all blocks in a deter-
authentication scheme for multi-WSN IoT nodes is pro- mined order. In this way, all blocks together form an orderly
posed in this paper. Specifically, this paper makes the fol- chain structure.
lowing contributions: Encryption algorithm ensures that blocks are immutable,
which means that once a block is added to the chain, it can
A multi-WSN network model is designed. There are not be tampered with. In the blockchain system [29], [30], the
many nodes in the IoT. According to the different whole network relies on a consensus mechanism and is
functions of the nodes, the nodes of the IoT are maintained by all the nodes, which can be any device. Under
divided into base stations, cluster heads and ordinary the consensus mechanism, even if the node fails, the remain-
nodes according to their capabilities, which facilitates ing nodes can still maintain normal operation, which solves
the management and cooperation of the nodes. the shortcomings of the traditional centralized mode that is
A hybrid blockchain model is proposed. In order to fit vulnerable to malicious attacks and tampering. Blockchain is
the multi-WSN network model better, according to a kind of credit system, which is different from the trust
the different capabilities and energies of different model of trusted third party endorsement in the traditional
nodes, local blockchain and public blockchain are distributed network. It is a kind of ‘no trust’ system. This sys-
deployed between cluster head nodes and base sta- tem is not based on any laws and regulations and uses
tions respectively, and a hybrid blockchain model is machine language to implement [31].
formed. Blockchains are divided into three categories: public
A mutual authentication scheme for IoT nodes is pro- blockchain, private blockchain, and consortium blockchain
posed. In order to enhance the scalability of the IoT [32], [33]. Private blockchain and consortium blockchain are
authentication, we adopt the hierarchical blockchain private chains in a broad sense. Public blockchain refers to
mode. For cluster head nodes, we use the global block- any individual or group sharing a blockchain. As long as the
chain for authentication, and for ordinary nodes, we recipient of the chain can send transactions on it, and the
use the local blockchain for authentication. transaction can be effectively confirmed by the blockchain,
The rest of this article is organized as follows. Section 2 any group or individual can participate in the consensus pro-
introduces the knowledge related to blockchain and block- cess. Public blockchain is the first and most widely used
chain-based authentication. Section 3 describes the system blockchain, which is considered to be ‘completely decentral-
model in detail. Section 4 elaborates on our proposed mutual ized’. Consortium blockchain refers to a blockchain whose
authentication scheme for the IoT nodes. Section 5 analyses consensus process is controlled by some preselected nodes.
the security performance and efficiency of this scheme. Such blockchain is considered to be ‘partially decentralized’.
Finally, Section 6 concludes this paper. Private blockchain refers to the use of blockchain only for
bookkeeping operations, but they are not publicly available.
Its object can be either a company or an individual, which
2 BLOCKCHAIN AND BLOCKCHAIN BASED
has to write access to the blockchain alone and may have
AUTHENTICATION highly restricted access to the outside world. Blockchain is
2.1 Blockchain also expected to be combined with AI and intelligent algo-
Blockchain technology is regarded as a subversive technol- rithms [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44]
ogy by industry and research circles. It was first introduced to solve more problems.
as the underlying technology of encrypted digital currency
Bitcoin [16], which was proposed by Nakamoto in 2008. It is 2.2 Blockchain-Based Node Management and
actually a distributed, shared and no-tampered database Authentication
distributed account book, which stores transaction records of Because of the distributed characteristics of blockchain, it
assets and transactions through P2P network. Blockchain has a natural fit with the IoT [7], [45]. It is expected to play
technology is widely used in various fields [17], [18], [19], an important role in the management, control, and security
[20], for example, many researchers apply it to cloud resource of the most important equipment in the IoT. It will provide
scheduling problem [21], and employ intelligent optimal new solutions for the security of various areas of the IoT,
algorithms [22], [23], [24], [25], [26] to improve performance. such as vehicle network security, equipment management,
In Blockchain, each block consists of two parts: block head privacy protection and so on. Node authentication based on
and block. Blocks represent transaction records or transac- blockchain is a research hotspot in current research.
tions (which the database must store), which can be any type Owing to the limitation of IoT equipment itself, it is
of currency transactions, health data, system logs, traffic impossible to meet the deployment conditions of blockchain.
information, etc. [27]. Block headers consist of two sets of Many researchers establish the connection between IoT
metadata, one related to mining, including timestamps, diffi- equipment and blockchain through gateway nodes, edge
culty targets and Nonce values; the other related to the block nodes and other similar devices to achieve the management
itself, including fields linking parent blocks, version num- and authentication of devices. In [15], Hammi et al. proposed
bers and roots of Merkle tree [28]. After hashing all a method of ‘decentralized’ device node authentication
Authorized licensed use limited to: Indian Institute of Information Technology Kottayam. Downloaded on August 13,2024 at 09:00:01 UTC from IEEE Xplore. Restrictions apply.
CUI ET AL.: HYBRID BLOCKCHAIN-BASED IDENTITY AUTHENTICATION SCHEME FOR MULTI-WSN 243
1) Verify the validity of the Timestamp. information entering the block in the authentication stage as
2) Verify whether cluster head nodes already exist in follow.
the public blockchain by querying the node identifi- The ‘Time’ indicates when the transaction was created,
cation information stored in the public blockchain, the ‘Tran Type’ indicates the type of the transaction, the ‘Au
and the verification fails if they already exist. Type’ indicates the type of the authentication which includes
3) Verify the validity of the base station identification intradomain and interdomain, the ‘Req node’ indicates the
SID. node that initiated the request, and the ‘Tar node’ indicates
4) Verify the correctness of the cluster head node iden- the target node, the ‘Au result’ indicates the authentication
tity nameplate IDcardCID by using CID and SID in result which includes yes or no.
the registration transaction request message Reques-
t_of_Registration and the public key of the base station.
When any of the above steps fail to validate, the cluster
head node fails to register and then returns the registration
error message. When all the processes are validated success-
fully, the public blockchain stores the identity information of Algorithm 2. The Smart Contract Nodes Mutual Authen-
the cluster head node in the format designed above and pub- tication Process
lishes the validated message. The local blockchain agrees
that the cluster head node can access the network. 1 begin
VerifyIDcardðIDcardA Þ ¼ error then
2 if VerifyIDcard
3 Return errorðÞ;
4.2.2 Ordinary Node Registration
4 end
The registration verification process of ordinary nodes is car- 5 /*PB is the abbreviation of Public Blockchain*/
ried out on the local blockchain. Since there are many cluster NodeExitsðAOID ; PBÞ ¼ error then
6 if NodeExits
head nodes, each ordinary node can only join one cluster net- 7 Return errorðÞ;
work. After choosing the cluster network according to some 8 end
rules, the common node needs to broadcast its registration NodeExitsðBOID ; PBÞ ¼ error then
9 if NodeExits
request message Request_of_Registration(SID, CID, OID, 10 Return errorðÞ;
IDcardOID , Timestamp). The cluster head node receiving 11 end
Request_of_Registration first verifies the timeliness of time- VerifyaliveðAOID Þ ¼ error then
12 if Verifyalive
stamp. If the timeliness is satisfied, the registration transac- 13 Return errorðÞ;
tion event will be set up in the local blockchain network to 14 end
trigger the smart contract for the ordinary node identity VerifyaliveðBOID Þ ¼ error then
15 if Verifyalive
information registration procedure. The registration process 16 Return errorðÞ;
is performed in sequence as follows: 17 end
18 if ASID ¼ BSID then
1) The local blockchain node executing the smart contract 19 if ACID ¼ BCID then
downloads the identity information of all nodes from 20 Nodes A and B establish secure connections Return;
the public blockchain, and queries whether the OID of 21 end
the ordinary node requesting registration already 23 else
exists, and if it already exists, the registration fails. 23 /*LB is the abbreviation of Local Blockchain*/
2) Verify that the cluster head node CID exists in the pub- 24 LB sends Message_of_Confirm;
lic blockchain, and if it not exist, the registration fails. 25 Clusters exchange Credential_of_Authentication;
3) Verify the validity of the base station identification 26 if Credential of Authentication ¼ true then
SID. 27 Nodes A and B establish secure connections
4) Verify the correctness of the cluster head node iden- 28 Return;
29 end
tity nameplate IDcardOID by using OID and SID in
30 end
the registration transaction request message Reques-
31 end
t_of_Registration and the public key of the base station.
32 else
If any of the above steps fails to validate, the registration
33 PB sends Message_of_Confirm;
error message will be returned. When all the processes are Clusters exchange Credential_of_Authentication;
validated successfully, the local blockchain node will upload 34 if Credential of Authentication ¼ true then
the identity information of the ordinary node to the public 35 Nodes A and B establish secure connections Return;
blockchain for storage in the format designed above, and 36 end
publish the message of successful validation. The local block- 37 end
chain agrees that the ordinary node can access the corre- 38 Return errorðÞ;
sponding cluster network. 39 end
4.3 Authentication
The overall process of authentication is shown in Algorithm
2, which includes authentication between ordinary nodes 4.3.1 Authentication Between Ordinary Nodes
and communication authentication between end-users and When ordinary node A needs to interact with ordinary node
ordinary nodes. And, we defined the content of transaction B, it is necessary to establish a secure channel between the
Authorized licensed use limited to: Indian Institute of Information Technology Kottayam. Downloaded on August 13,2024 at 09:00:01 UTC from IEEE Xplore. Restrictions apply.
CUI ET AL.: HYBRID BLOCKCHAIN-BASED IDENTITY AUTHENTICATION SCHEME FOR MULTI-WSN 247
[9] M. A. Ferrag, L. A. Maglaras, H. Janicke, J. Jiang, and [32] T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, “Security
L. Shu, “Authentication protocols for Internet of Things: A services using blockchains: A state of the art survey,” IEEE Commun.
comprehensive survey,” Secur. Commun. Netw., vol. 2017, Surv. Tuts., vol. 21, no. 1, pp. 858–880, Jan.–Mar. 2019.
pp. 6 562 953:1–6 562 953:41, 2017. [33] M. Wu, K. Wang, X. Cai, S. Guo, M. Guo, and C. Rong, “A com-
[10] M. A. Ferrag, L. Maglaras, and A. Ahmim, “Privacy-preserving prehensive survey of blockchain: From theory to IoT applications
schemes for ad hoc social networks: A survey,” IEEE Commun. and beyond,” IEEE Internet Things J., vol. 6, no. 5, pp. 8114–8154,
Surveys Tuts., vol. 19, no. 4, pp. 3015–3045, Oct.–Dec. 2017. Oct. 2019.
[11] S. Biswas, K. Sharif, F. Li, B. Nour, and Y. Wang, “A scalable [34] Z. Shae and J. Tsai, “AI blockchain platform for trusting news,” in
blockchain framework for secure transactions in IoT,” IEEE Inter- Proc. IEEE 39th Int. Conf. Distrib. Comput. Syst., 2019, pp. 1610–1619.
net Things J., vol. 6, no. 3, pp. 4650–4659, Jun. 2019. [35] X. Cai, J. Zhang, H. Liang, L. Wang, and Q. Wu, “An ensemble bat
[12] J. Huang, L. Kong, G. Chen, M.-Y. Wu, X. Liu, and P. Zeng, algorithm for large-scale optimization,” Int. J. Mach. Learn. Cybern.,
“Towards secure industrial IoT: Blockchain system with credit- vol. 10, no. 11, pp. 3099–3113, 2019.
based consensus mechanism,” IEEE Trans. Ind. Informat., vol. 15, [36] K. E. Heraguemi, N. Kamel, and H. Drias, “Multi-objective bat algo-
no. 6, pp. 3680–3689, Jun. 2019. rithm for mining numerical association rules,” Int. J. Bio-Inspired
[13] Z. Bao, W. Shi, D. He, and K.-K. R. Chood, “IoTChain: A three-tier Comput., vol. 11, no. 4, pp. 239–248, 2018.
blockchain-based IoT security architecture,” CoRR, 2018. [Online]. [37] X. Cai, P. Wang, L. Du, Z. Cui, W. Zhang, and J. Chen, “Multi-objec-
Available: https://arxiv.org/abs/1806.02008 tive 3-dimensional DV-hop localization algorithm with NSGA-II,”
[14] R. Almadhoun, M. Kadadha, M. Alhemeiri, M. Alshehhi, and IEEE Sensors J., vol. 19, no. 21, pp. 10 003–10 015, Nov. 2019.
K. Salah, “A user authentication scheme of IoT devices using [38] J. Barnett and P. Treleaven, “Algorithmic dispute resolution the
blockchain-enabled fog nodes,” in Proc. IEEE/ACS 15th Int. Conf. automation of professional dispute resolution using AI and block-
Comput. Syst. Appl., 2018, pp. 1–8. chain technologies,” Comput. J., vol. 61, no. 3, pp. 399–408, 2017.
[15] M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, “Bubbles
[39] V. Kersic, P. Stukelj, A. Kamisalic, S. Karakatic, and M. Turkanovic,
of trust: A decentralized blockchain-based authentication system “A blockchain-and AI-based platform for global employability,” in
for IoT,” Comput. Secur., vol. 78, pp. 126–142, 2018. Proc. Int. Congr. Blockchain Appl., 2019, pp. 161–168.
[16] N. S. Bitcoin, “Bitcoin: A peer-to-peer electronic cash system,” [40] Z. Cui, Y. Chang, J. Zhang, X. Cai, and W. Zhang, “Improved
2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf NSGA-III with selection-and-elimination operator,” Swarm Evol.
[17] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An overview of Comput., vol. 49, pp. 23–33, 2019.
blockchain technology: Architecture, consensus, and future trends,” [41] T. N. Dinh and M. T. Thai, “AI and blockchain: A disruptive inte-
in Proc. IEEE Int. Congr. Big Data, 2017, pp. 557–564. gration,” Computer, vol. 51, no. 9, pp. 48–53, 2018.
[18] S. Aggarwal, R. Chaudhary, G. S. Aujla, N. Kumar, K.-K. R. Choo, [42] X. Cai et al., “An under-sampled software defect prediction
and A. Y. Zomaya, “Blockchain for smart communities: Applica- method based on hybrid multi-objective cuckoo search,” Concur-
tions, challenges and opportunities,” J. Netw. Comput. Appl., vol. 144, rency Comput. Pract. Experience, 2019, Art. no. e5478. [Online].
pp. 13–48, 2019. Available: https://doi.org/10.1002/cpe.5478
[19] T. McGhin, K.-K. R. Choo, C. Z. Liu, and D. He, “Blockchain in [43] K. Sarpatwar, V. Sitaramagiridharganesh Ganapavarapu,
healthcare applications: Research challenges and opportunities,” K. Shanmugam, A. Rahman, and R. Vaculin, “Blockchain enabled
J. Netw. Comput. Appl., vol. 135, pp. 62–75, 2019. AI marketplace: The price you pay for trust,” in Proc. IEEE Conf.
[20] S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, and F.-Y. Wang, Comput. Vis. Pattern Recognit. Workshops, 2019, pp. 1–10.
“Blockchain-enabled smart contracts: Architecture, applications, [44] Z. Cui et al., “A pigeon-inspired optimization algorithm for many-
and future trends,” IEEE Trans. Syst., Man, Cybern. Syst., vol. 49, objective optimization problems,” Sci. China Inf. Sci., vol. 62,
no. 11, pp. 2266–2277, Nov. 2019. pp. 070 212:1–070 212:3, 2019.
[21] M. Liu, F. R. Yu, Y. Teng, V. C. Leung, and M. Song, “Distributed [45] A. Reyna, C. Martın, J. Chen, E. Soler, and M. Dıaz, “On block-
resource allocation in blockchain-based video streaming systems chain and its integration with IoT. Challenges and opportunities,”
with mobile edge computing,” IEEE Trans. Wireless Commun., Future Gener. Comput. Syst., vol. 88, pp. 173–190, 2018.
vol. 18, no. 1, pp. 695–708, Jan. 2019. [46] J. Pan, J. Wang, A. Hester, I. Alqerm, Y. Liu, and Y. Zhao,
[22] X. Cai, X.-Z. Gao, and Y. Xue, “Improved bat algorithm with optimal “EdgeChain: An edge-IoT framework and prototype based on
forage strategy and random disturbance strategy,” Int. J. Bio-Inspired blockchain and smart contracts,” IEEE Internet Things J., vol. 6, no. 3,
Comput., vol. 8, no. 4, pp. 205–214, 2016. pp. 4719–4732, Jun. 2019.
[23] X. Deng, P. Jiang, X. Peng, and C. Mi, “An intelligent outlier detec-
tion method with one class support tucker machine and genetic
algorithm toward big sensor data in internet of things,” IEEE
Zhihua Cui received the PhD degree in control
Trans. Ind. Electron., vol. 66, no. 6, pp. 4672–4683, Jun. 2019. theory and engineering from Xi’an Jiaotong Uni-
[24] L. Li et al., “CreditCoin: A privacy-preserving blockchain-based versity, Xi’an, China, in 2008. He is currently a
incentive announcement network for communications of smart professor with the School of Computer Science
vehicles,” IEEE Trans. Intell. Transp. Syst., vol. 19, no. 7, pp. 2204–2220, and Technology, Taiyuan University of Science
Jul. 2018. and Technology, China. He is the editor-in-chief
[25] Z. Cui, F. Xue, X. Cai, Y. Cao, G.-G. Wang, and J. Chen, “Detection
of the International Journal of Bio-inspired Com-
of malicious code variants based on deep learning,” IEEE Trans. putation. His research interests include computa-
Ind. Informat., vol. 14, no. 7, pp. 3187–3196, Jul. 2018. tional intelligence, stochastic algorithm, and
[26] Y. Cao, Z. Ding, F. Xue, and X. Rong, “An improved twin support combinatorial optimization.
vector machine based on multi-objective cuckoo search for soft-
ware defect prediction,” Int. J. Bio-Inspired Comput., vol. 11, no. 4,
pp. 282–291, 2018.
[27] V. L. Lemieux, “Trusting records: Is blockchain technology the Fei Xue received the MS degree in computer
answer?” Rec. Manage. J., vol. 26, no. 2, pp. 110–139, 2016. application technology from the Taiyuan Univer-
[28] I.-C. Lin and T.-C. Liao, “A survey of blockchain security issues and sity of Science and Technology, Taiyuan, China,
challenges,” Int. J. Netw. Secur., vol. 19, no. 5, pp. 653–659, 2017. in 2011, and the PD degree in computer science
[29] N. Z. Aitzhan and D. Svetinovic, “Security and privacy in decen- and technology from the Beijing University of
tralized energy trading through multi-signatures, blockchain and Technology, Chaoyang, China, in 2016. He is
anonymous messaging streams,” IEEE Trans. Dependable Secure currently a lecturer with the School of Information,
Comput., vol. 15, no. 5, pp. 840–852, Sep./Oct. 2018. Beijing Wuzi University. His research interests
[30] G. Karame, “On the security and scalability of bitcoin’s blockchain,” include swarm intelligence and network security.
in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2016,
pp. 1861–1862.
[31] A. Ouaddah, A. Abou Elkalam, and A. Ait Ouahman, “FairAccess:
A new blockchain-based access control framework for the Internet
of Things,” Secur. Commun. Netw., vol. 9, no. 18, pp. 5943–5964,
2016.
Authorized licensed use limited to: Indian Institute of Information Technology Kottayam. Downloaded on August 13,2024 at 09:00:01 UTC from IEEE Xplore. Restrictions apply.
CUI ET AL.: HYBRID BLOCKCHAIN-BASED IDENTITY AUTHENTICATION SCHEME FOR MULTI-WSN 251
Shiqiang Zhang received the BS degree in Wensheng Zhang received the PhD degree in
computer science and technology from the Beijing pattern recognition and intelligent systems from
University of Chemical Technology, Chaoyang, the Institute of Automation, CAS, Beijing, China,
China, in 2016. He is currently working toward the in 2000. He is currently a professor of Machine
PhD degree at the College of Computer Science, Learning and Data Mining and the director of the
Beijing University of Technology, Chaoyang, China. Research and Development, Institute of Automa-
His research interests include swarm intelligence, tion, Chinese Academy of Sciences (CAS). His
network security, and big data analysis. research interests include computer vision, pat-
tern recognition, artificial intelligence, and com-
puter-human interaction.
Authorized licensed use limited to: Indian Institute of Information Technology Kottayam. Downloaded on August 13,2024 at 09:00:01 UTC from IEEE Xplore. Restrictions apply.