From: User authentication and access control to blockchain-based forensic log data
Security features | [4] | [5] | [6] | [2] | Our framework |
---|---|---|---|---|---|
Man-in-the-middle attack | Yes | Yes | Yes | No | Yes |
Impersonation attack | Yes | Yes | Yes | Yes | Yes |
Mutual authentication | Yes | Yes | Yes | Yes | Yes |
User anonymity | Yes | Yes | Yes | Yes | Yes |
Integrity of secret keys | No | No | Yes | Yes | Yes |
Formal security verification in AVISPA | No | Yes | Yes | Yes | Yes |
Blockchain-enabled | Yes | Yes | Yes | No | Yes |
Type of security algorithm | Asymmetric | Bitwise XOR, | Asymmetric | Oneway Hash | Asymmetric, |
 |  | Oneway Hash |  |  | Oneway Hash |
Resistance to denial-of-service attack | No | Yes | No | Yes | Yes |
Tamper Resistant Data Storage | Yes | Yes | Yes | No | Yes |
Session key integrity | Yes | Yes | No | Yes | Yes |
Insider attack | No | Yes | No | Yes | Yes |
Contributors to Scalability | Edge | Edge | Edge | None | Edge |
 | Computing, | Computing | Computing |  | Computing, |
 | Consortium |  |  |  | Lightweight |
 | Blockchain |  |  |  | Consensus, |
 |  |  |  |  | Consortium |
 |  |  |  |  | Blockchain |