Research Article

Smart Contract-Based Cross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks

Table 1

Comparison of some related protocols.

Protocols in referencesTechnologyStrengthsWeaknesses

[3]Symmetric keyLow in complexity and easy to implementHigh complexity of system management and low scalability

[4]Bridge CAFlexible authenticationHigh computation and communication overhead; requiring trusted third party

[5]Identity-based cryptographyWithout public key certificationThe same PKG; low scalability
[6, 7]Identity proxy signatures

[8]Key agreementDifferent PKG; without public key certificationHigh computation overhead
[9]
[10, 11]Paring free key agreement

[12]Certificateless authentication key agreementWithout public key certificationComplex cryptographic operations

[13]Group signature algorithmAnonymous cross-domain authenticationComplex cryptographic operations
[14](t, n) shared secret key
[15]Group key management

[16, 19, 20]ECCAnonymous multifactor authenticationComplex cryptographic operations
[17]Asymmetric bivariate polynomialLow communication cost

[18]Biohashing functionMultifactor and lightweight authenticationHigh communication cost

[22, 23]BlockchainEfficient key managementUser privacy leakage
[24]Privacy protectionHigh computation overhead
[25]Low communication cost
[26]Cross-domain authentication