• Mi Re-Unir
    Búsqueda Avanzada
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    Ver ítem 
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Otras Publicaciones: artículos, libros...
    • Ver ítem
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Otras Publicaciones: artículos, libros...
    • Ver ítem

    IOTA-Based Authentication for IoT Devices in Satellite Networks

    Autor: 
    Bernal, David
    ;
    Ledesma, Oscar
    ;
    Lamo, Paula
    ;
    Bermejo-Higuera, Javier
    Fecha: 
    2025
    Palabra clave: 
    decentralized authentication; directed acyclic graph; IOTA identity; verifiable credentials; satellite loT
    Revista / editorial: 
    Tech Science Press
    Citación: 
    D. Bernal, O. Ledesma, P. Lamo and J. Bermejo, "IOTA-Based Authentication for IoT Devices in Satellite Networks," Computers, Materials & Continua, vol. 79, no. 3, pp. 3697–3728, Oct. 2025. DOI: 10.32604/cmc.2025.069746
    Tipo de Ítem: 
    Articulo Revista Indexada
    URI: 
    https://reunir.unir.net/handle/123456789/18300
    DOI: 
    https://doi.org/10.32604/cmc.2025.069746
    Dirección web: 
    https://www.techscience.com/cmc/online/detail/24724
    Open Access
    Resumen:
    This work evaluates an architecture for decentralized authentication of Internet of Things (IoT) devices in Low Earth Orbit (LEO) satellite networks using IOTA Identity technology. To the best of our knowledge, it is the first proposal to integrate IOTA’s Directed Acyclic Graph (DAG)-based identity framework into satellite IoT environments, enabling lightweight and distributed authentication under intermittent connectivity. The system leverages Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) over the Tangle, eliminating the need for mining and sequential blocks. An identity management workflow is implemented that supports the creation, validation, deactivation, and reactivation of IoT devices, and is experimentally validated on the Shimmer Testnet. Three metrics are defined and measured: resolution time, deactivation time, and reactivation time. To improve robustness, an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation. The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility. Unlike blockchain-based approaches, which typically suffer from high confirmation delays and scalability constraints, the proposed DAG architecture provides fast, cost-free operations suitable for resource-constrained IoT devices. The results show that authentication can be efficiently performed within satellite connectivity windows, positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks.
    Mostrar el registro completo del ítem
    Ficheros en el ítem
    icon
    Nombre: 19.- TSP_CMC_69746 (1).pdf
    Tamaño: 8.559Mb
    Formato: application/pdf
    Ver/Abrir
    Este ítem aparece en la(s) siguiente(s) colección(es)
    • Otras Publicaciones: artículos, libros...

    Estadísticas de uso

    Año
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    2021
    2022
    2023
    2024
    2025
    2026
    Vistas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    54
    19
    Descargas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    60
    38

    Ítems relacionados

    Mostrando ítems relacionados por Título, autor o materia.

    • MMALE a methodology for malware analysis in linux environments 

      de Vicente Mohino, José Javier ; Bermejo-Higuera, Javier; Bermejo Higuera, Juan Ramón; Sicilia, Juan Antonio ; Sánchez Rubio, Manuel ; Martínez Herraiz, José-Javier (Computers, materials and continua, 2021)
      In a computer environment, an operating systemis prone to malware, and even the Linux operating system is not an exception. In recent years, malware has evolved, and attackers have becomemore qualified compared to a fewyears ...
    • Prevention and fighting against web attacks through anomaly detection technology. A systematic review 

      Sureda Riera, Tomás; Bermejo Higuera, Juan Ramón ; Bermejo-Higuera, Javier ; Martínez Herraiz, José-Javier; Sicilia, Juan Antonio (Sustainability (Switzerland), 01/06/2020)
      Numerous techniques have been developed in order to prevent attacks on web servers. Anomaly detection techniques are based on models of normal user and application behavior, interpreting deviations from the established ...
    • Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities 

      Bermejo Higuera, Juan Ramón ; Bermejo-Higuera, Javier ; Sicilia, Juan Antonio ; Cubo Villalba, Javier ; Nombela Pérez, Juan José (CMC-Computers Materials & Continua, 2020)
      To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities ...

    Mi cuenta

    AccederRegistrar

    ¿necesitas ayuda?

    Manual de UsuarioContacto: reunir@unir.net

    Listar

    todo Re-UnirComunidades y coleccionesPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de accesoEsta colecciónPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de acceso






    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja
     
    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja