Research on Distributed Network Authentication and Access Control Mechanism Based on Blockchain Technology
and
Mar 19, 2025
About this article
Published Online: Mar 19, 2025
Received: Oct 28, 2024
Accepted: Feb 06, 2025
DOI: https://doi.org/10.2478/amns-2025-0447
Keywords
© 2025 Ting Yin et al., published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Figure 1.

Figure 2.

Figure 3.

Figure 4.

Figure 5.

Figure 6.

Figure 7.

Figure 8.

Figure 9.

Figure 10.

Protocol operation
| Time overhead |
Client-side | ISE-side |
|---|---|---|
| Scheme 1 | 7 |
2 |
| Scheme 2 | 7 |
2 |
| This article’s scheme | 3 |
3 |
