Research Article
Smart Contract-Based Cross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks
Table 1
Comparison of some related protocols.
| Protocols in references | Technology | Strengths | Weaknesses |
| [3] | Symmetric key | Low in complexity and easy to implement | High complexity of system management and low scalability |
| [4] | Bridge CA | Flexible authentication | High computation and communication overhead; requiring trusted third party |
| [5] | Identity-based cryptography | Without public key certification | The same PKG; low scalability | [6, 7] | Identity proxy signatures |
| [8] | Key agreement | Different PKG; without public key certification | High computation overhead | [9] | [10, 11] | Paring free key agreement |
| [12] | Certificateless authentication key agreement | Without public key certification | Complex cryptographic operations |
| [13] | Group signature algorithm | Anonymous cross-domain authentication | Complex cryptographic operations | [14] | (t, n) shared secret key | [15] | Group key management |
| [16, 19, 20] | ECC | Anonymous multifactor authentication | Complex cryptographic operations | [17] | Asymmetric bivariate polynomial | Low communication cost |
| [18] | Biohashing function | Multifactor and lightweight authentication | High communication cost |
| [22, 23] | Blockchain | Efficient key management | User privacy leakage | [24] | Privacy protection | High computation overhead | [25] | Low communication cost | [26] | Cross-domain authentication |
|
|