Research Article

IoT Devices, User Authentication, and Data Management in a Secure, Validated Manner through the Blockchain System

Table 5

Comparison between existing techniques and the proposed technique.

Existing techniquesFlaws in the existing techniquesMitigation of flaws in the proposed technique

Mutual authenticationCentralized architectureDe-centralized architecture
There is a need to be both client and server for authentication of each other. Both are relaid on each other for authenticationThere is no need of both client and server for authentication each other
Less secure because relies on centralized authorityMore secure because does not rely on centralized authority
Open authenticationIn open authentication, tokens are generated for end-users for authenticationDirectly, hash key values are assigned to the end-users
Tokens are not in an encrypted form, so everyone can access the token and breach securityHash key values are in an encrypted form, so other entities do not understand the hash key values and cannot breach security
Totally based on open authentication serverNot based on server
Kerberos authenticationKerberos authentication uses temporal tickets for authentication purposes in a specific periodThe proposed solution provides hash key values permanently to end-users
Temporal tickets are not in an encrypted formHash key values are in an encrypted form
Dependent on temporal tickets and time, so kerberos authentication follows the centralized architectureProvides decentralized architecture for authentication
Group authenticationGroup authentication authenticates entities with the permission of all other entities in the group. Message passing in a group is not in an encrypted form, so every entity in the group can easily perform some maliciousnessHash key values are distributed across all entities in the system with the help of distributed ledgers. Hash key values are in an encrypted form, so it is hard to understand for any entity in the system.