Research Article

Unified Authentication and Access Control for Future Mobile Communication-Based Lightweight IoT Systems Using Blockchain

Algorithm 1

Process for authenticating P2P identity.
A sends connection request (ID_A, M_signed_by_A) to
B:
//B query Key_A and verify the identity of A
If (Key_A_exist_in_local)
Verify the identity of A;
Else
If (Key_A_exists_in_consensus_nodes)
Verify the identity of A;
Else
Reject the connection request of A;