Table 2.
Comparison of various blockchain-based authentication mechanisms.
Reference | Type of Blockchain and Blockchain Platform |
Advantages | Limitations | Implementation Parameters |
Future Work |
---|---|---|---|---|---|
[38] | Permissioned, Hyperledger Fabric | decentralization, simplicity, general application | - | Raspberry Pi, Hyperledger Fabric | Management of IoT sensors data |
[39] | Public, Ethereum Blockchain | decentralization, reduces latency, compliant to security requirements | transaction time delay and high energy consumption due to Ethereum properties | Ganache-cli, Ethereum emulator | Development of a lightweight consensus protocol for better results in terms of energy consumption |
[36] | Ethereum Blockchain | decentralization, device credibility, patching |
needs credible users | Geth client, Ethereum, Ubuntu VM | Investigate zero-knowledge proof encryption, real implementation |
[40] | Public, Ethereum Blockchain | decentralization, scalability, resistant to attacks | not adapted to real time applications, no initialization phase, limited cryptocurrency rate | HP laptop- Ubuntu 14.04, Raspberry Pi–Rasbian 4.9.41, Ethereum | Controlled communication between bubbles, implementation of mechanism, design of a protocol for miner optimization |
[41] | Private, Hyperledger fabric 1.4 | suitable for password-based, certificate-based biotechnology- based authentication |
high time complexity | virtual box 5.2.8, Ubuntu 16.4 server client Windows 10 pro intel i5-6200 2.30 Ghz CPU |
- |
[42] | private, JUICE blockchain platform | decentralization, anonymity | - | Ubuntu 16.04, Intel Core i7-6700 CPU 3.40 GHZ, 3-GB RAM, nginx-1.11.3, truffle-4.1.13, JUICE-client |
Consider the attribute-based cryptographic approach in order to achieve better access control |
[43] | - | authentication and confidentiality of data sharing | - | Anonymous authentication of IoT | |
[44] | Private Blockchain | decentralization, scalability | evaluation results are theoretical | Ethernet workshop | - |
[37] | Private, Hyperledger Fabric | decentralization, data privacy, data integrity, SSI | - | - | Implementation of the designed mechanism in real life applications |