Open Access

Research on Distributed Network Authentication and Access Control Mechanism Based on Blockchain Technology

 and   
Mar 19, 2025

Cite
Download Cover

Figure 1.

Blockchain Architecture
Blockchain Architecture

Figure 2.

Overall system architecture
Overall system architecture

Figure 3.

Schematic diagram of identity credential interaction
Schematic diagram of identity credential interaction

Figure 4.

Access control delay comparison
Access control delay comparison

Figure 5.

Policy retrieval delay
Policy retrieval delay

Figure 6.

Policy decision delay
Policy decision delay

Figure 7.

Success rate of policy decision
Success rate of policy decision

Figure 8.

Processing time for different number of policy requests
Processing time for different number of policy requests

Figure 9.

Protocol traffic contrast
Protocol traffic contrast

Figure 10.

The comparison of the calculation overhead of the agreement
The comparison of the calculation overhead of the agreement

Protocol operation

Time overheadScheme Client-side ISE-side
Scheme 1 7TPM+5TH+1TTP 2Te+5TPM+1TPA+4TH+1TTP
Scheme 2 7TPM+1TPA+8TH+1TTP 2Te+5TPM+1TPA+3TH+1TTP
This article’s scheme 3TPM+1TPA+1TE+4TH 3Te+3TPM+3TH
Language:
English