Skip to main content

Table 9 Comparison of the proposed framework with other state of the art methods

From: User authentication and access control to blockchain-based forensic log data

Security features

[4]

[5]

[6]

[2]

Our framework

Man-in-the-middle attack

Yes

Yes

Yes

No

Yes

Impersonation attack

Yes

Yes

Yes

Yes

Yes

Mutual authentication

Yes

Yes

Yes

Yes

Yes

User anonymity

Yes

Yes

Yes

Yes

Yes

Integrity of secret keys

No

No

Yes

Yes

Yes

Formal security verification in AVISPA

No

Yes

Yes

Yes

Yes

Blockchain-enabled

Yes

Yes

Yes

No

Yes

Type of security algorithm

Asymmetric

Bitwise XOR,

Asymmetric

Oneway Hash

Asymmetric,

  

Oneway Hash

  

Oneway Hash

Resistance to denial-of-service attack

No

Yes

No

Yes

Yes

Tamper Resistant Data Storage

Yes

Yes

Yes

No

Yes

Session key integrity

Yes

Yes

No

Yes

Yes

Insider attack

No

Yes

No

Yes

Yes

Contributors to Scalability

Edge

Edge

Edge

None

Edge

 

Computing,

Computing

Computing

 

Computing,

 

Consortium

   

Lightweight

 

Blockchain

   

Consensus,

     

Consortium

     

Blockchain