{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T01:59:19Z","timestamp":1776131959039,"version":"3.50.1"},"reference-count":61,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T00:00:00Z","timestamp":1603670400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,10,26]]},"abstract":"<jats:p>Communication security between IoT devices is a major concern in this area, and the blockchain has raised hopes that this concern will be addressed. In the blockchain concept, the majority or even all network nodes check the validity and accuracy of exchanged data before accepting and recording them, whether this data is related to financial transactions or measurements of a sensor or an authentication message. In evaluating the validity of an exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and unreliable interactions with the system is significantly reduced. Recently, in order to share and access management of IoT devices information with distributed attitude a new authentication protocol based on blockchain is proposed and it is claimed that this protocol satisfies user privacy preserving and security. However, in this paper, we show that this protocol has security vulnerabilities against secret disclosure, replay, traceability, and <jats:inline-formula>\n                     <a:math xmlns:a=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\">\n                        <a:mtext>Token<\/a:mtext>\n                     <\/a:math>\n                  <\/jats:inline-formula> reuse attacks with the success probability of 1 and constant complexity of also 1. We also proposed an improved blockchain-based authentication protocol (IBCbAP) that has security properties such as secure access management and anonymity. We implemented IBCbAP using JavaScript programming language and Ethereum local blockchain. We also proved IBCbAP\u2019s security both informally and formally through the Scyther tool. Our comparisons showed that IBCbAP could provide suitable security along with reasonable cost.<\/jats:p>","DOI":"10.1155\/2020\/8836214","type":"journal-article","created":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T20:05:09Z","timestamp":1603915509000},"page":"1-16","source":"Crossref","is-referenced-by-count":46,"title":["An Improved Blockchain-Based Authentication Protocol for IoT Network Management"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0776-1390","authenticated-orcid":true,"given":"Mostafa","family":"Yavari","sequence":"first","affiliation":[{"name":"Computer Engineering Department, Shahid Rajaee Teacher Training University, Tehran, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1897-0828","authenticated-orcid":true,"given":"Masoumeh","family":"Safkhani","sequence":"additional","affiliation":[{"name":"Computer Engineering Department, Shahid Rajaee Teacher Training University, Tehran, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4929-5383","authenticated-orcid":true,"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Chaudhary Charan Singh University, Meerut 250004, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5324-2156","authenticated-orcid":true,"given":"Sachin","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Ajay Kumar Garg Engineering College, Ghaziabad 201009, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6502-472X","authenticated-orcid":true,"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[{"name":"Shandong University of Science and Technology, Qingdao, Shandong, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-020-01638-9"},{"key":"2","doi-asserted-by":"crossref","first-page":"12\u2009047","DOI":"10.1109\/ACCESS.2019.2891105","article-title":"A secure authentication protocol for internet of vehicles","volume":"7","author":"C.-M. Chen","year":"2019","journal-title":"IEEE Access"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2105-8"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04758-1"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2020.1712746"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1029-y"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/tie.2006.881998"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0260-0"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102554"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106719"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tia.2020.2966160"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4137"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.001.1900526"},{"key":"14","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/978-981-13-8775-3_3","article-title":"Blockchain technologies for IoT","volume-title":"Advanced Applications of Blockchain Technology","author":"V. Dedeoglu","year":"2020"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102590"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.3390\/su12103984"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2963840"},{"key":"18","article-title":"Blockchain for IoT-based healthcare: background, consensus, platforms, and use cases","author":"P. P. Ray","year":"2020","journal-title":"IEEE Systems Journal"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02017-8"},{"key":"20","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-981-15-0694-9_6","article-title":"Securing IoT-driven remote healthcare data through blockchain","volume-title":"Advances in Data and Information Sciences","author":"S. Gupta","year":"2020"},{"key":"21","volume-title":"Bitcoin: A Peer-To-Peer Electronic Cash System","author":"S. Nakamoto","year":"2008"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2799942"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101871"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.005"},{"key":"25"},{"key":"26","author":"Hyperledger","year":"2020"},{"key":"27","author":"TestRPC","year":"2020"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1748"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2812239"},{"key":"30","article-title":"LSB: a lightweight scalable blockchain for IoT security and privacy","author":"A. Dorri","year":"2017"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.005"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2913682"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2018.1700467"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2903342"},{"key":"36"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2892009"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2890389"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.3390\/s19020326"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04319-2"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2999510"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106714"},{"key":"43","first-page":"305","article-title":"Decentralized e-voting systems based on the blockchain technology","volume-title":"Advances in Computer Science and Ubiquitous Computing","author":"J.-H. Hsiao","year":"2017"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2934947"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.3390\/s19214752"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4139"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1029-3"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.09.004"},{"key":"49","first-page":"419","article-title":"Security analysis of elliptic curve cryptography and RSA","author":"D. Mahto"},{"key":"50"},{"key":"51"},{"key":"52","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","article-title":"The Scyther tool: verification, falsification, and analysis of security protocols","volume-title":"Computer Aided Verification","author":"C. J. F. Cremers","year":"2008"},{"key":"53"},{"key":"54"},{"key":"55"},{"key":"56"},{"key":"57"},{"key":"58"},{"key":"59"},{"key":"60","year":"2020"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8836214.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8836214.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8836214.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T20:05:13Z","timestamp":1603915513000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8836214\/"}},"subtitle":[],"editor":[{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,10,26]]},"references-count":61,"alternative-id":["8836214","8836214"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8836214","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2020,10,26]]}}}