Research Article
Unified Authentication and Access Control for Future Mobile Communication-Based Lightweight IoT Systems Using Blockchain
Algorithm 1
Process for authenticating P2P identity.
A sends connection request (ID_A, M_signed_by_A) to | B: | //B query Key_A and verify the identity of A | If (Key_A_exist_in_local) | Verify the identity of A; | Else | If (Key_A_exists_in_consensus_nodes) | Verify the identity of A; | Else | Reject the connection request of A; |
|