Back to Search Start Over

FOG ENABLED PRIVATE BLOCKCHAIN-BASED IDENTITY AUTHENTICATION SCHEME FOR OIL AND GAS FIELD MONITORING.

Authors :
Aldarwish, Abdulla J. Y.
Patel, Kalyani
Yaseen, Aqeel A.
Yassin, Ali A.
Abduljabbar, Zaid Ameen
Source :
ICTACT Journal on Communication Technology; Sep2024, Vol. 15 Issue 3, p3236-3247, 12p
Publication Year :
2024

Abstract

The oil and gas industry remains critical to the global economy, as it contributes to the provision of energy and raw materials. Nonetheless, this sector continued to face clear challenges in operational effectiveness, risk and security. Regular tracking methods are limited to latency issues; they are not secure, and data may face integrity issues. To this end, this paper lays out an efficient fog-enabled private blockchain-based identity authentication approach for oil and gas field monitoring. By integrating IoT devices to blockchain,, decentralized control systems are created that enhance security, transparency, and efficient execution of transactions. In this scheme, by making full use of the decentralized structure of blockchain technology and applying the computational power of fog nodes, a secure and efficient identity authentication framework is designed. Fog nodes are an intermediary between IoT devices and blockchain technology, providing lower latency in communication, and therefore more efficient. The main contributions of this paper include: developing a decentralized authentication system based on private blockchains and fog nodes to overcome the drawbacks of centralized models. Create a network model using a private blockchain that dramatically improves feasibility by incorporating strict admission and authorization procedures. Hence, this leads to simultaneous registrations with minimal network time consensus Authentication that incorporating fuzzy extractor to connect the privacy-centric approach and to improve the security analysis and performance evaluation proving that the proposed solution provides better. According to the previous security analysis, it is clear that the scheme conflicts with different types of threats including DoS, MITM attacks, replay, Sybil, and message substitution attacks. The performance evaluation also shows low computational and communication costs, high compatibility, and real-time operation, which indicates that the proposed scheme is effective and can be implemented as a real-time oil and gas field monitoring system. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
09760091
Volume :
15
Issue :
3
Database :
Supplemental Index
Journal :
ICTACT Journal on Communication Technology
Publication Type :
Academic Journal
Accession number :
180546597
Full Text :
https://doi.org/10.21917/ijct.2024.0482