Blockchain-based secure authentication with improved performance for fog computing

Otuekong Umoren, Raman Singh, Shahid Awan, Zeeshan Pervez*, Keshav Dahal

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

20 Downloads (Pure)


Advancement in the Internet of Things (IoT) and cloud computing has escalated the number of connected edge devices in a smart city environment. Having billions more devices has contributed to security concerns, and an attack-proof authentication mechanism is the need of the hour to sustain the IoT environment. Securing all devices could be a huge task and require lots of computational power, and can be a bottleneck for devices with fewer computational resources. To improve the authentication mechanism, many researchers have proposed decentralized applications such as blockchain technology for securing fog and IoT environments. Ethereum is considered a popular blockchain platform and is used by researchers to implement the authentication mechanism due to its programable smart contract. In this research, we proposed a secure authentication mechanism with improved performance. Neo blockchain is a platform that has properties that can provide improved security and faster execution. The research utilizes the intrinsic properties of Neo blockchain to develop a secure authentication mechanism. The proposed authentication mechanism is compared with the existing algorithms and shows that the proposed mechanism is 20 to 90 per cent faster in execution time and has over 30 to 70 per cent decrease in registration and authentication when compared to existing methods.
Original languageEnglish
Article number8969
Number of pages15
Issue number22
Publication statusPublished - 19 Nov 2022


  • authentication
  • neo blockchain
  • fog computing
  • internet of things
  • blockchain technology
  • cloud computing
  • smart contracts


Dive into the research topics of 'Blockchain-based secure authentication with improved performance for fog computing'. Together they form a unique fingerprint.

Cite this