Decentralized Blockchain-Based Authentication and Interplanetary File System-Based Data Management Protocol for Internet of Things Using Ascon
Abstract
:1. Introduction
- Decentralized Authentication Framework: The proposed protocol employs asymmetric cryptography and the Diffie–Hellman key exchange to establish a shared secret, enabling secure and verifiable mutual authentication between devices.
- Advanced Data Security: By leveraging ASCON encryption, the protocol ensures the confidentiality and integrity of IoT data during transmission and storage.
- Decentralized Data Management: The integration of IPFS allows for secure, decentralized data storage, reducing dependency on centralized servers and improving data availability.
- Traceability through Blockchain: Encrypted content identifiers (CIDs) are stored on the Ethereum blockchain, providing a transparent and immutable audit trail for data exchanges.
- Scalability and Efficiency: The protocol is optimized for resource-constrained IoT environments, ensuring minimal computational and communication overhead while supporting large-scale deployments.
2. Related Work
2.1. Decentralized Storage Solutions
2.2. Hybrid Authentication Mechanisms
2.3. Lightweight Encryption in the IoT
3. Background
3.1. Blockchain
- -
- Block Header: This contains metadata, including a timestamp, the hash of the previous block, the Merkle root of transactions, and, in Proof-of-Work systems, a difficulty target. These elements ensure that each block is uniquely identified and linked to the previous one.
- -
- Block Body: This stores a list of validated transactions. The transactions are structured in a Merkle tree, which allows for the efficient verification of the integrity and consistency of transaction records.
- -
- Nonce: This is a randomly generated number used in mining to adjust the difficulty level, ensuring that block creation remains computationally feasible yet resistant to attacks.
- -
- Genesis Block: This is the first block in the blockchain, which initializes the chain and serves as the foundation upon which subsequent blocks are built. Each new block references the hash of its predecessor, ensuring data integrity and immutability.
- -
- Public Key Infrastructure (PKI): Blockchain employs asymmetric cryptography [25], where transactions are signed using a private key and verified using a corresponding public key, ensuring authenticity and non-repudiation.
- -
- -
- Consensus Mechanisms:
- Proof-of-Work (PoW): Requires computational effort to validate transactions, as seen in Bitcoin, ensuring that adding new blocks is costly and difficult to manipulate.
- Proof-of-Stake (PoS): Selects validators based on their stake in the network, reducing energy consumption and incentivizing honest participation.
- Delegated Proof-of-Stake (DPoS): Introduces a voting mechanism to elect trusted validators, enhancing scalability and transaction speed.
- -
- Transparency and Immutability: Transactions recorded on the blockchain are visible to authorized participants and cannot be altered once recorded, preventing fraud and enhancing trust [27].
- -
- Decentralized Identity Management: Blockchain enables the efficient management of digital identities without relying on centralized authorities. In a decentralized or “self-sovereign” identity framework, individuals retain full control over their personal data, thereby minimizing the risks of identity theft and unauthorized access. Recent research has explored the advantages and challenges of blockchain-based identity systems [28].
- -
- Supply Chain Tracking: In supply chain management, blockchain’s transparency and immutability offer an effective means to track products from origin to destination. Every transaction or transfer is permanently recorded, which enhances traceability, helps prevent fraud or counterfeiting, and improves overall operational efficiency [29].
- -
- Smart Contracts: Smart contracts are self-executing programs that automatically enforce the terms of an agreement once predefined conditions are met. By removing the need for intermediaries, they lower transaction costs and reduce the chances of human error or fraud [30].
3.2. IPFS (Interplanetary File System)
3.3. ASCON
4. Proposed Work
- Personal account;
- Corresponding device account;
- Shared ID.
- -
- Key Generation: IoT devices (IoT1 and IoT2) generate asymmetric key pairs (public and private).
- -
- Public Key Registration: Public keys are stored on the blockchain for authentication.
- -
- Shared Key Calculation: Devices calculate a shared key using the Diffie–Hellman protocol.
- -
- Secure Authentication System (SAS) Generation: Devices generate a SAS by combining their shared key and shared ID.
- -
- SAS Storage: The SAS is stored on the blockchain.
- -
- SAS Comparison: Devices compare SASs for mutual authentication validation.
- -
- Data Storage: IoT1 stores data (images, etc.) in IPFS.
- -
- Content ID Retrieval: IoT1 retrieves data CID.
- -
- CID Encryption: CID is encrypted using ASCON algorithm and shared key.
- -
- Encrypted CID Storage: Encrypted CID is stored on blockchain.
- -
- Encrypted CID Retrieval: IoT2 retrieves encrypted CID.
- -
- CID Decryption: IoT2 decrypts CID using shared key.
- -
- Data Retrieval: IoT2 retrieves data from IPFS using decrypted CID.
- Blockchain (authentication, key storage, and CID encrypted storage);
- IPFS (data storage);
- Asymmetric encryption algorithms (key generation);
- ASCON algorithm (CID encryption and decryption);
- Diffie–Hellman protocol (shared key generation).
4.1. Smart Contract
Algorithm 1: Smart contract |
contract IoTmanagement { // Contract owner’s address address public owner; // Mapping of device addresses to their public keys mapping(address => string) private publicKeys; // Mapping of device addresses to their shared keys mapping(address => string) private sharedKeys; // Structure to store encrypted CID, nonce, and authTag struct EncryptedData { string encryptedCID; string nonce; string authTag;} // Mapping of device addresses to their encrypted data mapping(address => EncryptedData) private encryptedDeviceData; // Event emitted when a device is registered event DeviceRegistered(address indexed device, string publicKey); // Event emitted when a shared key is set event SharedKeySet(address indexed device, string sharedKey); // Event emitted when encrypted data are set event EncryptedDataSet(address indexed device, string encryptedCID); // Constructor: sets the contract owner constructor() { owner = msg.sender; // Set the deployer as the owner} // Function to register a device and its public key function registerDevice(address _deviceAddress, string memory _publicKey) public { publicKeys[_deviceAddress] = _publicKey; // Store the public key emit DeviceRegistered(_deviceAddress, _publicKey); // Emit registration event} // Function to retrieve a device’s public key function getPublicKey(address _deviceAddress) public view returns (string memory) { return publicKeys[_deviceAddress]; // Return the public key} // Function to set a shared key for a device function setSaS(address _deviceAddress, string memory _sharedKey) public { sharedKeys[_deviceAddress] = _sharedKey; // Store the shared key emit SharedKeySet(_deviceAddress, _sharedKey); // Emit shared key event} // Function to retrieve a device’s shared key function getSaS(address _deviceAddress) public view returns (string memory) { return sharedKeys[_deviceAddress]; // Return the shared key} // Function to store encrypted data (CID) for a device function setEncryptedData(address _deviceAddress, string memory _encryptedCID, string memory _nonce, string memory _authTag) public { // Only the owner or the device itself can call this function encryptedDeviceData[_deviceAddress] = EncryptedData(_encryptedCID, _nonce, _authTag); // Store encrypted data emit EncryptedDataSet(_deviceAddress, _encryptedCID, _nonce, _authTag); // Emit encrypted data event} // Function to retrieve encrypted data for a device function getEncryptedData(address _deviceAddress) public view returns (EncryptedData memory) { return encryptedDeviceData[_deviceAddress]; // Return encrypted data}} |
4.2. Mutual Authentication
4.3. Secure Data Sharing
4.4. Global Architecture
4.5. Lightweight Cryptography: ASCON
- Padding the data: The 34-byte CID is padded with 2 additional bytes, bringing the total size to 36 bytes. This size is a multiple of 16 bytes, meeting the requirements of ASCON-128, which encrypts blocks of 128 bits (or 16 bytes).
- Encryption with ASCON-128: This 36-byte block is then encrypted in a single operation using ASCON-128. The result of the encryption is also a 36-byte block, containing the encrypted data as well as an authentication tag. This tag ensures the integrity of the information and detects any attempts to modify the CIDs.
5. Implementation
5.1. Experimental Environment
- Two laptops (blockchain and IPFS nodes);
- Two machines simulating IoT devices;
- A local server hosting the main IPFS node.
- Remix IDE, Ganache, Web3.js;
- IPFS Desktop;
- Node-RED.
5.2. Estimation of Resource Consumption
- A-
- Time consumption
- B-
- CPU consumption
- C-
- RAM consumption
6. Evaluation and Security
6.1. Security Analysis
6.2. Threat Mitigation
6.3. Protection Against Specific Attacks
6.4. Evaluation of Existing IoT Security Protocols
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
IOT | Internet of Things |
IPFS | Interplanetary File System |
ECC | Elliptic Curve Cryptography |
ASCON | Authenticated Secure Construction |
References
- Mouha, R.A. Internet of Things (IoT). J. Data Anal. Inf. Process. 2021, 9, 77–101. [Google Scholar] [CrossRef]
- Panahi Rizi, M.H.; Hoseini Seno, S.A. A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city. Internet Things 2022, 20, 100584. [Google Scholar] [CrossRef]
- Steneck, N.H. Fostering integrity in research: Definitions, current knowledge, and future directions. Sci. Eng. Ethics 2006, 12, 53–74. [Google Scholar] [CrossRef]
- Gabriel, T.; Cornel-Cristian, A.; Arhip-Calin, M.; Zamfirescu, A. Cloud storage: A comparison between centralized solutions versus decentralized cloud storage solutions using blockchain technology. In Proceedings of the 2019 54th International Universities Power Engineering Conference (UPEC), Bucharest, Romania, 3–6 September 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Wu, F.; Li, X.; Xu, L.; Kumari, S.; Karuppiah, M.; Shen, J. A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Comput. Electr. Eng. 2017, 63, 168–181. [Google Scholar] [CrossRef]
- Mahmoud, R.; Yousuf, T.; Aloul, F.; Zualkernan, I. Internet of things (IoT) security: Current status, challenges and prospective measures. In Proceedings of the 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 14–16 December 2015; pp. 336–341. [Google Scholar] [CrossRef]
- Xu, L.; Lu, Y.; Li, L. Embedding blockchain technology into IoT for security: A survey. IEEE Internet Things J. 2021, 8, 10452–10473. [Google Scholar] [CrossRef]
- Gugueoth, V.; Safavat, S.; Shetty, S.; Rawat, D. A review of IoT security and privacy using decentralized blockchain techniques. Comput. Sci. Rev. 2023, 50, 100585. [Google Scholar] [CrossRef]
- Lao, L.; Li, Z.; Hou, S.; Xiao, B.; Guo, S.; Yang, Y. A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling. ACM Comput. Surv. 2020, 53, 18. [Google Scholar] [CrossRef]
- Abdelmaboud, A.; Ahmed, A.I.A.; Abaker, M.; Eisa, T.A.E.; Albasheer, H.; Ghorashi, S.A.; Karim, F.K. Blockchain for IoT applications: Taxonomy, platforms, recent advances, challenges and future research directions. Electronics 2022, 11, 630. [Google Scholar] [CrossRef]
- Rahimi, P.; Khan, N.D.; Chrysostomou, C.; Vassiliou, V.; Nazir, B. A secure communication for maritime IoT applications using blockchain technology. In Proceedings of the 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS), Marina del Rey, CA, USA, 25–27 May 2020; pp. 244–251. [Google Scholar] [CrossRef]
- Badhe, G.; Arjunwadkar, M. Decentralised Storage Systems for Blockchain Powered Applications. Int. J. Eng. Technol. Manag. Sci. 2024, 7, 324–326. [Google Scholar]
- Guidi, B.; Michienzi, A.; Ricci, L. Evaluating the Decentralisation of Filecoin. In Proceedings of the 3rd International Workshop on Distributed Infrastructure for the Common Good (DICG ‘22), Quebec City, QC, Canada, 7 November 2022; ACM: New York, NY, USA, 2022; pp. 1–6. [Google Scholar] [CrossRef]
- Daniel, E.; Tschorsch, F. IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks. IEEE Communications Surveys & Tutorials 2022, 24, 1176–1205. [Google Scholar] [CrossRef]
- McCabe, C.; Mohideen, A.I.C.; Singh, R. A Blockchain-Based Authentication Mechanism for Enhanced Security. Sensors 2024, 24, 5830. [Google Scholar] [CrossRef] [PubMed]
- Khashan, O.A.; Khafajah, N.M. Efficient Hybrid Centralized and Blockchain-Based Authentication Architecture for Heterogeneous IoT Systems. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 726–739. [Google Scholar] [CrossRef]
- Venkatesan, K.; Rahayu, S.B. Blockchain Security Enhancement: An Approach Towards Hybrid Consensus Algorithms and Machine Learning Techniques. Sci. Rep. 2024, 14, 1149. [Google Scholar] [CrossRef]
- De Santis, F.; Schauer, A.; Sigl, G. ChaCha20-Poly1305 Authenticated Encryption for High-Speed Embedded IoT Applications. In Proceedings of the 2017 Design, Automation and Test in Europe Conference (DATE), Lausanne, Switzerland, 27–31 March 2017; IEEE: New York, NY, USA, 2017; pp. 692–694. [Google Scholar] [CrossRef]
- Allouch, A.; Cheikhrouhou, O.; Koubâa, A.; Khalgui, M.; Abbes, T. MAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems. In Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; IEEE: New York, NY, USA, 2019; pp. 621–628. [Google Scholar] [CrossRef]
- Radhakrishnan, I.; Jadon, S.; Honnavalli, P.B. Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices. Sensors 2024, 24, 4008. [Google Scholar] [CrossRef] [PubMed]
- Mistry, I.; Tanwar, S.; Tyagi, S.; Kumar, N. Blockchain for 5G-Enabled IoT for Industrial Automation: A Systematic Review, Solutions, and Challenges. Mech. Syst. Signal Process. 2019, 135, 106382. [Google Scholar] [CrossRef]
- Kabra, N.; Bhattacharya, P.; Tanwar, S.; Tyagi, S. MudraChain: Blockchain-Based Framework for Automated Cheque Clearance in Financial Institutions. Future Gener. Comput. Syst. 2020, 102, 574–587. [Google Scholar] [CrossRef]
- Bashir, I. Mastering Blockchain: Deeper Insights into Decentralization, Cryptography, Bitcoin, and Popular Blockchain Frameworks; Packt Publishing: Birmingham, UK, 2017. [Google Scholar]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. In Proceedings of the 2017 IEEE 6th International Congress on Big Data, Honolulu, HI, USA, 25–30 June 2017. [Google Scholar] [CrossRef]
- Crosby, M.; Nachiappan; Pattanayak, P.; Verma, S.; Kalyanaraman, V. Blockchain Technology: Beyond Bitcoin. Appl. Innov. Rev. 2016, 2, 6–19. Available online: https://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf (accessed on 9 March 2025).
- Yli-Huumo, J.; Ko, D.; Choi, S.; Park, S.; Smolander, K. Where Is Current Research on Blockchain Technology?—A Systematic Review. PLoS ONE 2016, 11, e0163477. [Google Scholar] [CrossRef]
- Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A Survey on the Security of Blockchain Systems. Future Gener. Comput. Syst. 2020, 107, 841–853. [Google Scholar] [CrossRef]
- Ahmed, M.R.; Saeed, S.; Khan, M.K.; Han, J.; Han, K. Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey. IEEE Access 2022, 10, 113436–113481. [Google Scholar] [CrossRef]
- Sylvestre, C.E. The Role of Blockchain in Enhancing Supply Chain Transparency. J. Bus. Logist. 2021, 42, 71–87. [Google Scholar] [CrossRef]
- Hewa, T.; Ylianttila, M.; Liyanage, M. Survey on blockchain based smart contracts: Applications, opportunities and challenges. J. Netw. Comput. Appl. 2021, 177, 102857. [Google Scholar] [CrossRef]
- Jayabalan, J.; Jeyanthi, N. Scalable Blockchain Model Using Off-Chain IPFS Storage for Healthcare Data Security and Privacy. J. Parallel Distrib. Comput. 2022, 164, 152–167. [Google Scholar] [CrossRef]
- Kang, P.; Yang, W.; Zheng, J. Blockchain Private File Storage-Sharing Method Based on IPFS. Sensors 2022, 22, 5100. [Google Scholar] [CrossRef]
- Cagua, G.; Gauthier-Umaña, V.; Lozano-Garzon, C. Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices. IEEE Access 2025, 13, 16671. [Google Scholar] [CrossRef]
- Dobraunig, C.; Eichlseder, M.; Mendel, F.; Schläffer, M. Ascon v1.2: Lightweight Authenticated Encryption and Hashing. J. Cryptol. 2021, 34, 1–42. [Google Scholar] [CrossRef]
- Baraiya, H. Comparative Analysis and Benchmarking of ASCON and Grain128AEAD. Cryptography 2023, 7, 15. [Google Scholar] [CrossRef]
- Kandi, A.; Banerjee, A.; Mukhopadhyay, D. Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation. In Proceedings of the 2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Knoxville, TN, USA, 1–3 July 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Adomnicai, A.; Fournier, J.J.A.; Masson, L. Masking the Lightweight Authenticated Ciphers ACORN and ASCON in Software. Cryptol. ePrint Arch. 2018, 2018, 1–20. [Google Scholar] [CrossRef]
- Dobraunig, C.; Eichlseder, M.; Mendel, F.; Schläffer, M. Cryptanalysis of Ascon. In Topics in Cryptology—CT-RSA 2015; Springer: Cham, Switzerland, 2015; Volume 9048, pp. 371–387. [Google Scholar] [CrossRef]
- Xu, R.; Chen, Y.; Blasch, E.; Chen, G. BlendCAC: A Blockchain-Enabled Decentralized Capability-based Access Control for IoTs. arXiv 2018, arXiv:1804.09267. [Google Scholar] [CrossRef]
- Bao, Z.; Shi, W.; He, D.; Choo, K.-R.R. IoTChain: A Three-Tier Blockchain-based IoT Security Architecture. arXiv 2018, arXiv:1806.02008. [Google Scholar] [CrossRef]
- Zhang, Y.; Kasahara, S.; Shen, Y.; Jiang, X.; Wan, J. Smart Contract-Based Access Control for the Internet of Things. arXiv 2018, arXiv:1802.04410. [Google Scholar] [CrossRef]
Article | Decentralized Storage | Hybrid Authentication Mechanisms | Lightweight Encryption for the IoT | Description |
---|---|---|---|---|
[12] | ✓ | ✕ | ✕ | Focuses on decentralized storage solutions but lacks authentication and encryption aspects. |
[13] | ✓ | ✕ | ✕ | Highlights blockchain-based storage with some centralization issues but no mention of encryption or authentication. |
[14] | ✓ | ✕ | ✕ | IPFS is emphasized for scalability and content-based addressing, but no hybrid mechanisms or encryption is discussed. |
[15] | ✕ | ✓ | ✕ | Proposes blockchain-based 2FA for securing traditional systems but lacks storage or encryption components. |
[16] | ✕ | ✓ | ✓ | Combines IoT authentication with lightweight cryptography for better efficiency and energy use. |
[17] | ✕ | ✓ | ✕ | Uses hybrid consensus algorithms and AI for blockchain security but does not address storage or lightweight encryption. |
[18] | ✕ | ✕ | ✓ | Optimizes implementation of ChaCha20 for IoT embedded systems with high efficiency but no storage or authentication focus. |
[19] | ✕ | ✕ | ✓ | Is integrated for secure drone communication in IoT but lacks storage or authentication mechanisms. |
[20] | ✕ | ✕ | ✓ | Comparative analysis for selecting encryption algorithms suitable for resource-constrained IoT devices. |
Data Type | CID (34 Bytes) | Hexadecimal (34 Bytes) | Padding (36 Bytes) |
---|---|---|---|
Image | QmA1bD4…eW3xy7 | 5A 67 89 10 4C 7F 3B E1 92 D5 46 77 3B 5C 93 2F A1 D2 0F 57 3D C8 71 89 2F D0 5A 12 61 74 90 8D 56 34 2A | 5A 67 89 10 4C 7F 3B E1 92 D5 46 77 3B 5C 93 2F A1 D2 0F 57 3D C8 71 89 2F D0 5A 12 61 74 90 8D 56 34 2A 80 00 |
File | QmX7cM2V…kT4pQ1 | 12 39 47 A8 C3 9F 7B D0 51 67 84 1A 95 C8 3F 9A 12 57 76 6D 43 B0 81 45 9E C7 54 31 F0 D4 C3 29 D8 7E | 12 39 47 A8 C3 9F 7B D0 51 67 84 1A 95 C8 3F 9A 12 57 76 6D 43 B0 81 45 9E C7 54 31 F0 D4 C3 29 D8 7E 80 00 |
Text | QmK7hL3A…rV9zQ2 | 8B 15 49 33 5D F2 98 8E 44 77 5F 26 1D 38 92 A9 5C 10 6E 3D A1 D8 44 F7 33 18 74 2B A1 91 D2 D5 7C 8A | 8B 15 49 33 5D F2 98 8E 44 77 5F 26 1D 38 92 A9 5C 10 6E 3D A1 D8 44 F7 33 18 74 2B A1 91 D2 D5 7C 8A 80 00 |
Category | Components | Specifications |
---|---|---|
Hardware | Two computers (blockchain and IPFS nodes) | Model: DELL CPU: Intel i5 or equivalent RAM: 8 GB Storage: 256 GB SSD OS: Windows 10 or Linux (Ubuntu recommended) |
Two machines simulating IoT devices | Model: Raspberry Pi 4 or equivalent CPU: Quad-core ARM Cortex-A72 RAM: 2 GB or 4 GB OS: Raspbian or any Linux-based OS | |
A local server hosting the main IPFS node | Model: HP CPU: Intel i3 or equivalent RAM: 4 GB Storage: 500 GB HDD or SSD OS: Ubuntu 20.04 LTS or equivalent | |
Software and Tools | Remix IDE, Ganache, Web3.js | Ensure the software is up to date |
IPFS Desktop | 0.42.0 | |
Node-RED | 4.0.9 |
Function | Max Time | Average Time |
---|---|---|
KeypairGeneration | 0.015 | 0.001 |
VerifieSAS | 0.07 | 0.03 |
CIDEncryption | 0.01 | 0.003 |
AddCID | 0.11 | 0.04 |
GetCID | 0.06 | 0.02 |
AddData | 0.12 | 0.05 |
GetData | 0.06 | 0.02 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Belfqih, H.; Abdellaoui, A. Decentralized Blockchain-Based Authentication and Interplanetary File System-Based Data Management Protocol for Internet of Things Using Ascon. J. Cybersecur. Priv. 2025, 5, 16. https://doi.org/10.3390/jcp5020016
Belfqih H, Abdellaoui A. Decentralized Blockchain-Based Authentication and Interplanetary File System-Based Data Management Protocol for Internet of Things Using Ascon. Journal of Cybersecurity and Privacy. 2025; 5(2):16. https://doi.org/10.3390/jcp5020016
Chicago/Turabian StyleBelfqih, Hiba, and Abderrahim Abdellaoui. 2025. "Decentralized Blockchain-Based Authentication and Interplanetary File System-Based Data Management Protocol for Internet of Things Using Ascon" Journal of Cybersecurity and Privacy 5, no. 2: 16. https://doi.org/10.3390/jcp5020016
APA StyleBelfqih, H., & Abdellaoui, A. (2025). Decentralized Blockchain-Based Authentication and Interplanetary File System-Based Data Management Protocol for Internet of Things Using Ascon. Journal of Cybersecurity and Privacy, 5(2), 16. https://doi.org/10.3390/jcp5020016