Araştırma Makalesi
BibTex RIS Kaynak Göster

A New Blockchain-Based Authentication Infrastructure For Wireless Networks: BCAUTH

Yıl 2023, Cilt: 10 Sayı: 19, 9 - 17, 30.06.2023

Öz

Authentication in wireless networks is the process of verifying the identity of users to authorize them to access the wireless network. This process is critical to ensure network security and prevent unauthorized access. Access to wireless networks carries the risk of unauthorized persons interfering with the network, accessing sensitive data, or engaging in malicious activities on the network. Authentication ensures that only authorized users can access the network and helps prevent security vulnerabilities. The inability of unauthorized access to the network prevents data traffic from being monitored and malicious actors from stealing data. Authentication helps manage network resources effectively. Unauthorized users accessing the network can degrade network performance and lead to inefficient use of resources. Authentication increases network efficiency by ensuring that only authorized users can access network resources. The fact that blockchain technology has proven itself in data security is quite suitable for combining it with such a critical area as authentication. In this study, an authentication system with the help of smart contracts is connected to a blockchain infrastructure and executed. The performance tests of the proposed model are rigorously performed and discussed.

Kaynakça

  • Abbas, S. et al. (2021) ‘Blockchain-Based Authentication in Internet of Vehicles: A Survey’, Sensors 2021, Vol. 21, Page 7927, 21(23), p. 7927. Available at: https://doi.org/10.3390/S21237927.
  • Alabady, S.A.J. (2008) ‘Design and implementation of a network security model using static VLAN and AAA server’, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA [Preprint]. Available at: https://doi.org/10.1109/ICTTA.2008.4530276.
  • Benzekki, K., El Fergougui, A. and El Belrhiti El Alaoui, A. (2016) ‘Devolving IEEE 802.1X authentication capability to data plane in software-defined networking (SDN) architecture’, Security and Communication Networks, 9(17), pp. 4369–4377. Available at: https://doi.org/10.1002/SEC.1613.
  • Chen, J.C. and Wang, Y.P. (2005) ‘Extensible Authentication Protocol (EAP) and IEEE 802.1x: Tutorial and Empirical Experience’, IEEE Communications Magazine, 43(12), pp. S26–S32. Available at: https://doi.org/10.1109/MCOM.2005.1561920.
  • Cui, Z. et al. (2020) ‘A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN’, IEEE Transactions on Services Computing, 13(2), pp. 241–251. Available at: https://doi.org/10.1109/TSC.2020.2964537.
  • Dantu, R., Clothier, G. and Atri, A. (2007) ‘EAP methods for wireless networks’, Computer Standards & Interfaces, 29(3), pp. 289–301. Available at: https://doi.org/10.1016/J.CSI.2006.04.001.
  • Diallo, E. hacen, Dib, O. and Al Agha, K. (2022) ‘A scalable blockchain-based scheme for traffic-related data sharing in VANETs’, Blockchain: Research and Applications, 3(3), p. 100087. Available at: https://doi.org/10.1016/J.BCRA.2022.100087.
  • Esposito, C., Ficco, M. and Gupta, B.B. (2021) ‘Blockchain-based authentication and authorization for smart city applications’, Information Processing & Management, 58(2), p. 102468. Available at: https://doi.org/10.1016/J.IPM.2020.102468.
  • Ferreira, C.M.S. et al. (2021) ‘IoT Registration and Authentication in Smart City Applications with Blockchain’, Sensors 2021, Vol. 21, Page 1323, 21(4), p. 1323. Available at: https://doi.org/10.3390/S21041323.
  • Grover, K. and Lim, A. (2015) ‘A survey of broadcast authentication schemes for wireless networks’, Ad Hoc Networks, 24(PA), pp. 288–316. Available at: https://doi.org/10.1016/J.ADHOC.2014.06.008.
  • Guo, R. et al. (2019) ‘Flexible and Efficient Blockchain-Based ABE Scheme with Multi-Authority for Medical on Demand in Telemedicine System’, IEEE Access, 7, pp. 88012–88025. Available at: https://doi.org/10.1109/ACCESS.2019.2925625.
  • Hammi, M.T. et al. (2018) ‘Bubbles of Trust: A decentralized blockchain-based authentication system for IoT’, Computers & Security, 78, pp. 126–142. Available at: https://doi.org/10.1016/J.COSE.2018.06.004.
  • He, D. et al. (2012) ‘Analysis and improvement of a secure and efficient handover authentication for wireless networks’, IEEE Communications Letters, 16(8), pp. 1270–1273. Available at: https://doi.org/10.1109/LCOMM.2012.061912.120941.
  • Henry, P.S. and Luo, H. (2002) ‘WiFi: What’s next?’, IEEE Communications Magazine, 40(12), pp. 66–72. Available at: https://doi.org/10.1109/MCOM.2002.1106162.
  • Kablosuz Ağlarda Şifreleme, Kimlik Doğrulama ve Güvenlik Önlemleri (no date). Available at: https://yazilimcigenclik.com.tr/kablosuz-aglarda-sifreleme-kimlik-dogrulama-ve-guvenlik-onlemleri/ (Accessed: 18 March 2023).
  • Kim, Y.P., Yoo, S. and Yoo, C. (2015) ‘DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things’, 2015 IEEE International Conference on Consumer Electronics, ICCE 2015, pp. 196–197. Available at: https://doi.org/10.1109/ICCE.2015.7066378.
  • Kumar, U. and Gambhir, S. (2014) ‘A Literature Review of Security Threats to Wireless Networks’, International Journal of Future Generation Communication and Networking, 7(4), pp. 25–34. Available at: https://doi.org/10.14257/IJFGCN.2014.7.4.03.
  • Lau, C.H., Alan, K.H.Y. and Yan, F. (2019) ‘Blockchain-Based Authentication in IoT Networks’, DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing [Preprint]. Available at: https://doi.org/10.1109/DESEC.2018.8625141.
  • Li, D. et al. (2018) ‘A blockchain-based authentication and security mechanism for IoT’, Proceedings - International Conference on Computer Communications and Networks, ICCCN, 2018-July. Available at: https://doi.org/10.1109/ICCCN.2018.8487449.
  • Li, J.S. et al. (2017) ‘A comparison of classifiers and features for authorship authentication of social networking messages’, Concurrency and Computation: Practice and Experience, 29(14), p. e3918. Available at: https://doi.org/10.1002/CPE.3918.
  • Li, X. et al. (2018) ‘A robust and energy efficient authentication protocol for industrial internet of things’, IEEE Internet of Things Journal, 5(3), pp. 1606–1615. Available at: https://doi.org/10.1109/JIOT.2017.2787800.
  • Liang, Y. et al. (2020) ‘Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective’, IEEE Internet of Things Journal, 7(9), pp. 9128–9143. Available at: https://doi.org/10.1109/JIOT.2020.3004077.
  • Liao, K.-C. and Lee, W.-H. (2010) ‘A Novel User Authentication Scheme Based on QR-Code’, Journal of Networks, 5(8). Available at: https://doi.org/10.4304/jnw.5.8.937-941.
  • Mir, O. and Nikooghadam, M. (2015) ‘A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services’, Wireless Personal Communications, 83(4), pp. 2439–2461. Available at: https://doi.org/10.1007/S11277-015-2538-4/TABLES/2.
  • Mohsin, A.H. et al. (2019) ‘Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions’, Computer Standards & Interfaces, 64, pp. 41–60. Available at: https://doi.org/10.1016/J.CSI.2018.12.002.
  • Muhammad, M. and Safdar, G.A. (2018) ‘Survey on existing authentication issues for cellular-assisted V2X communication’, Vehicular Communications, 12, pp. 50–65. Available at: https://doi.org/10.1016/J.VEHCOM.2018.01.008.
  • Neuman, C.B. and Ts’o, T. (1994) ‘Kerberos: An Authentication Service for Computer Networks’, IEEE Communications Magazine, 32(9), pp. 33–38. Available at: https://doi.org/10.1109/35.312841.
  • Okada, A. et al. (2019) ‘e-Authentication for online assessment: A mixed-method study’, British Journal of Educational Technology, 50(2), pp. 861–875. Available at: https://doi.org/10.1111/BJET.12608.
  • Pan, F. et al. (2017) ‘Physical layer authentication based on channel information and machine learning’, 2017 IEEE Conference on Communications and Network Security, CNS 2017, 2017-January, pp. 364–365. Available at: https://doi.org/10.1109/CNS.2017.8228660.
  • (PDF) Securing UMaT Wireless Network Using pfSense Captive Portal with Radius Authentication (no date). Available at: https://www.researchgate.net/publication/306056068_Securing_UMaT_Wireless_Network_Using_pfSense_Captive_Portal_with_Radius_Authentication (Accessed: 18 March 2023).
  • Pradeep, R. et al. (2019) ‘Formal Verification of Authentication and Confidentiality for TACACS+ Security Protocol using Scyther’, 2019 10th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2019 [Preprint]. Available at: https://doi.org/10.1109/ICCCNT45670.2019.8944623.
  • Ramya, S. et al. (2022) ‘Face Biometric Authentication System for ATM using Deep Learning’, Proceedings - 2022 6th International Conference on Intelligent Computing and Control Systems, ICICCS 2022, pp. 1446–1451. Available at: https://doi.org/10.1109/ICICCS53718.2022.9788310.
  • Sahu, A.K. et al. (2018) ‘Secure Authentication Protocol for IoT Architecture’, Proceedings - 2017 International Conference on Information Technology, ICIT 2017, pp. 220–224. Available at: https://doi.org/10.1109/ICIT.2017.21.
  • Soewito, B. and Hirzi (2014) ‘Building secure wireless access point based on certificate authentication and firewall captive portal’, EPJ Web of Conferences, 68, p. 00029. Available at: https://doi.org/10.1051/EPJCONF/20146800029.
  • Yavuz, A.A. (2014) ‘An efficient real-time broadcast authentication scheme for command and control messages’, IEEE Transactions on Information Forensics and Security, 9(10), pp. 1733–1742. Available at: https://doi.org/10.1109/TIFS.2014.2351255.
  • Yildirim, S. et al. (2021) ‘Kampüs Ağlarında İnternet Erişimi İçin Bağlantı Katmanı Kimlik Doğrulama Uygulaması’, Computer Science, (Special), pp. 82–92. Available at: https://doi.org/10.53070/BBD.990930.
  • Yu, R. et al. (2017) ‘Authentication with Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network’, IEEE Access, 5, pp. 24944–24951. Available at: https://doi.org/10.1109/ACCESS.2017.2767285.
  • Zhang, Z. et al. (2022) ‘Artificial intelligence in physiological characteristics recognition for internet of things authentication’, Digital Communications and Networks [Preprint]. Available at: https://doi.org/10.1016/J.DCAN.2022.10.006.
  • Zhu, J. and Ma, J. (2004) ‘A new authentication scheme with anonymity for wireless environments’, IEEE Transactions on Consumer Electronics, 50(1), pp. 231–235. Available at: https://doi.org/10.1109/TCE.2004.1277867.
  • Zia, M. (2021) ‘B-DRIVE: A blockchain based distributed IoT network for smart urban transportation’, Blockchain: Research and Applications, 2(4), p. 100033. Available at: https://doi.org/10.1016/J.BCRA.2021.100033.
  • Xu, Z., Smyth, C. E., Lemprière, T. C., Rampley, G. J., & Kurz, W. A. (2018). Climate change mitigation strategies in the forest sector: biophysical impacts and economic implications in British Columbia, Canada. Mitigation and adaptation strategies for global change, 23(2), 257-290.

Kablosuz Ağlar İçin Blockchain Tabanlı Yeni Bir Kimlik Doğrulama Altyapısı: BCAUTH

Yıl 2023, Cilt: 10 Sayı: 19, 9 - 17, 30.06.2023

Öz

Kablosuz ağlarda kimlik doğrulama, kablosuz ağa erişim yetkisi vermek için kullanıcıların kimliğini doğrulama işlemidir. Bu süreç, ağ güvenliğini sağlamak ve yetkisiz erişimi önlemek için kritik öneme sahiptir. Kablosuz ağlara erişim, yetkisiz kişilerin ağa müdahale etmesi, hassas verilere erişmesi veya ağ üzerinde kötü niyetli faaliyetlerde bulunması riskini taşır. Kimlik doğrulama, yalnızca yetkili kullanıcıların ağa erişebilmesini sağlar ve güvenlik açıklarının önlenmesine yardımcı olur. Ağa yetkisiz erişimin engellenmesi, veri trafiğinin izlenmesini ve kötü niyetli kişilerin veri çalmasını önler. Kimlik doğrulama, ağ kaynaklarının etkin bir şekilde yönetilmesine yardımcı olur. Yetkisiz kullanıcıların ağa erişmesi ağ performansını düşürebilir ve kaynakların verimsiz kullanılmasına yol açabilir. Kimlik doğrulama, yalnızca yetkili kullanıcıların ağ kaynaklarına erişebilmesini sağlayarak ağ verimliliğini artırır. Blok zinciri teknolojisinin veri güvenliği konusunda kendini kanıtlamış olması, kimlik doğrulama gibi kritik bir alanla birleştirilmesi için oldukça uygundur. Bu çalışmada akıllı sözleşmeler yardımıyla bir kimlik doğrulama sistemi blok zinciri altyapısına bağlanarak çalıştırılmıştır. Önerilen modelin performans testleri titizlikle gerçekleştirilmiş ve tartışılmıştır.

Kaynakça

  • Abbas, S. et al. (2021) ‘Blockchain-Based Authentication in Internet of Vehicles: A Survey’, Sensors 2021, Vol. 21, Page 7927, 21(23), p. 7927. Available at: https://doi.org/10.3390/S21237927.
  • Alabady, S.A.J. (2008) ‘Design and implementation of a network security model using static VLAN and AAA server’, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA [Preprint]. Available at: https://doi.org/10.1109/ICTTA.2008.4530276.
  • Benzekki, K., El Fergougui, A. and El Belrhiti El Alaoui, A. (2016) ‘Devolving IEEE 802.1X authentication capability to data plane in software-defined networking (SDN) architecture’, Security and Communication Networks, 9(17), pp. 4369–4377. Available at: https://doi.org/10.1002/SEC.1613.
  • Chen, J.C. and Wang, Y.P. (2005) ‘Extensible Authentication Protocol (EAP) and IEEE 802.1x: Tutorial and Empirical Experience’, IEEE Communications Magazine, 43(12), pp. S26–S32. Available at: https://doi.org/10.1109/MCOM.2005.1561920.
  • Cui, Z. et al. (2020) ‘A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN’, IEEE Transactions on Services Computing, 13(2), pp. 241–251. Available at: https://doi.org/10.1109/TSC.2020.2964537.
  • Dantu, R., Clothier, G. and Atri, A. (2007) ‘EAP methods for wireless networks’, Computer Standards & Interfaces, 29(3), pp. 289–301. Available at: https://doi.org/10.1016/J.CSI.2006.04.001.
  • Diallo, E. hacen, Dib, O. and Al Agha, K. (2022) ‘A scalable blockchain-based scheme for traffic-related data sharing in VANETs’, Blockchain: Research and Applications, 3(3), p. 100087. Available at: https://doi.org/10.1016/J.BCRA.2022.100087.
  • Esposito, C., Ficco, M. and Gupta, B.B. (2021) ‘Blockchain-based authentication and authorization for smart city applications’, Information Processing & Management, 58(2), p. 102468. Available at: https://doi.org/10.1016/J.IPM.2020.102468.
  • Ferreira, C.M.S. et al. (2021) ‘IoT Registration and Authentication in Smart City Applications with Blockchain’, Sensors 2021, Vol. 21, Page 1323, 21(4), p. 1323. Available at: https://doi.org/10.3390/S21041323.
  • Grover, K. and Lim, A. (2015) ‘A survey of broadcast authentication schemes for wireless networks’, Ad Hoc Networks, 24(PA), pp. 288–316. Available at: https://doi.org/10.1016/J.ADHOC.2014.06.008.
  • Guo, R. et al. (2019) ‘Flexible and Efficient Blockchain-Based ABE Scheme with Multi-Authority for Medical on Demand in Telemedicine System’, IEEE Access, 7, pp. 88012–88025. Available at: https://doi.org/10.1109/ACCESS.2019.2925625.
  • Hammi, M.T. et al. (2018) ‘Bubbles of Trust: A decentralized blockchain-based authentication system for IoT’, Computers & Security, 78, pp. 126–142. Available at: https://doi.org/10.1016/J.COSE.2018.06.004.
  • He, D. et al. (2012) ‘Analysis and improvement of a secure and efficient handover authentication for wireless networks’, IEEE Communications Letters, 16(8), pp. 1270–1273. Available at: https://doi.org/10.1109/LCOMM.2012.061912.120941.
  • Henry, P.S. and Luo, H. (2002) ‘WiFi: What’s next?’, IEEE Communications Magazine, 40(12), pp. 66–72. Available at: https://doi.org/10.1109/MCOM.2002.1106162.
  • Kablosuz Ağlarda Şifreleme, Kimlik Doğrulama ve Güvenlik Önlemleri (no date). Available at: https://yazilimcigenclik.com.tr/kablosuz-aglarda-sifreleme-kimlik-dogrulama-ve-guvenlik-onlemleri/ (Accessed: 18 March 2023).
  • Kim, Y.P., Yoo, S. and Yoo, C. (2015) ‘DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things’, 2015 IEEE International Conference on Consumer Electronics, ICCE 2015, pp. 196–197. Available at: https://doi.org/10.1109/ICCE.2015.7066378.
  • Kumar, U. and Gambhir, S. (2014) ‘A Literature Review of Security Threats to Wireless Networks’, International Journal of Future Generation Communication and Networking, 7(4), pp. 25–34. Available at: https://doi.org/10.14257/IJFGCN.2014.7.4.03.
  • Lau, C.H., Alan, K.H.Y. and Yan, F. (2019) ‘Blockchain-Based Authentication in IoT Networks’, DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing [Preprint]. Available at: https://doi.org/10.1109/DESEC.2018.8625141.
  • Li, D. et al. (2018) ‘A blockchain-based authentication and security mechanism for IoT’, Proceedings - International Conference on Computer Communications and Networks, ICCCN, 2018-July. Available at: https://doi.org/10.1109/ICCCN.2018.8487449.
  • Li, J.S. et al. (2017) ‘A comparison of classifiers and features for authorship authentication of social networking messages’, Concurrency and Computation: Practice and Experience, 29(14), p. e3918. Available at: https://doi.org/10.1002/CPE.3918.
  • Li, X. et al. (2018) ‘A robust and energy efficient authentication protocol for industrial internet of things’, IEEE Internet of Things Journal, 5(3), pp. 1606–1615. Available at: https://doi.org/10.1109/JIOT.2017.2787800.
  • Liang, Y. et al. (2020) ‘Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective’, IEEE Internet of Things Journal, 7(9), pp. 9128–9143. Available at: https://doi.org/10.1109/JIOT.2020.3004077.
  • Liao, K.-C. and Lee, W.-H. (2010) ‘A Novel User Authentication Scheme Based on QR-Code’, Journal of Networks, 5(8). Available at: https://doi.org/10.4304/jnw.5.8.937-941.
  • Mir, O. and Nikooghadam, M. (2015) ‘A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services’, Wireless Personal Communications, 83(4), pp. 2439–2461. Available at: https://doi.org/10.1007/S11277-015-2538-4/TABLES/2.
  • Mohsin, A.H. et al. (2019) ‘Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions’, Computer Standards & Interfaces, 64, pp. 41–60. Available at: https://doi.org/10.1016/J.CSI.2018.12.002.
  • Muhammad, M. and Safdar, G.A. (2018) ‘Survey on existing authentication issues for cellular-assisted V2X communication’, Vehicular Communications, 12, pp. 50–65. Available at: https://doi.org/10.1016/J.VEHCOM.2018.01.008.
  • Neuman, C.B. and Ts’o, T. (1994) ‘Kerberos: An Authentication Service for Computer Networks’, IEEE Communications Magazine, 32(9), pp. 33–38. Available at: https://doi.org/10.1109/35.312841.
  • Okada, A. et al. (2019) ‘e-Authentication for online assessment: A mixed-method study’, British Journal of Educational Technology, 50(2), pp. 861–875. Available at: https://doi.org/10.1111/BJET.12608.
  • Pan, F. et al. (2017) ‘Physical layer authentication based on channel information and machine learning’, 2017 IEEE Conference on Communications and Network Security, CNS 2017, 2017-January, pp. 364–365. Available at: https://doi.org/10.1109/CNS.2017.8228660.
  • (PDF) Securing UMaT Wireless Network Using pfSense Captive Portal with Radius Authentication (no date). Available at: https://www.researchgate.net/publication/306056068_Securing_UMaT_Wireless_Network_Using_pfSense_Captive_Portal_with_Radius_Authentication (Accessed: 18 March 2023).
  • Pradeep, R. et al. (2019) ‘Formal Verification of Authentication and Confidentiality for TACACS+ Security Protocol using Scyther’, 2019 10th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2019 [Preprint]. Available at: https://doi.org/10.1109/ICCCNT45670.2019.8944623.
  • Ramya, S. et al. (2022) ‘Face Biometric Authentication System for ATM using Deep Learning’, Proceedings - 2022 6th International Conference on Intelligent Computing and Control Systems, ICICCS 2022, pp. 1446–1451. Available at: https://doi.org/10.1109/ICICCS53718.2022.9788310.
  • Sahu, A.K. et al. (2018) ‘Secure Authentication Protocol for IoT Architecture’, Proceedings - 2017 International Conference on Information Technology, ICIT 2017, pp. 220–224. Available at: https://doi.org/10.1109/ICIT.2017.21.
  • Soewito, B. and Hirzi (2014) ‘Building secure wireless access point based on certificate authentication and firewall captive portal’, EPJ Web of Conferences, 68, p. 00029. Available at: https://doi.org/10.1051/EPJCONF/20146800029.
  • Yavuz, A.A. (2014) ‘An efficient real-time broadcast authentication scheme for command and control messages’, IEEE Transactions on Information Forensics and Security, 9(10), pp. 1733–1742. Available at: https://doi.org/10.1109/TIFS.2014.2351255.
  • Yildirim, S. et al. (2021) ‘Kampüs Ağlarında İnternet Erişimi İçin Bağlantı Katmanı Kimlik Doğrulama Uygulaması’, Computer Science, (Special), pp. 82–92. Available at: https://doi.org/10.53070/BBD.990930.
  • Yu, R. et al. (2017) ‘Authentication with Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network’, IEEE Access, 5, pp. 24944–24951. Available at: https://doi.org/10.1109/ACCESS.2017.2767285.
  • Zhang, Z. et al. (2022) ‘Artificial intelligence in physiological characteristics recognition for internet of things authentication’, Digital Communications and Networks [Preprint]. Available at: https://doi.org/10.1016/J.DCAN.2022.10.006.
  • Zhu, J. and Ma, J. (2004) ‘A new authentication scheme with anonymity for wireless environments’, IEEE Transactions on Consumer Electronics, 50(1), pp. 231–235. Available at: https://doi.org/10.1109/TCE.2004.1277867.
  • Zia, M. (2021) ‘B-DRIVE: A blockchain based distributed IoT network for smart urban transportation’, Blockchain: Research and Applications, 2(4), p. 100033. Available at: https://doi.org/10.1016/J.BCRA.2021.100033.
  • Xu, Z., Smyth, C. E., Lemprière, T. C., Rampley, G. J., & Kurz, W. A. (2018). Climate change mitigation strategies in the forest sector: biophysical impacts and economic implications in British Columbia, Canada. Mitigation and adaptation strategies for global change, 23(2), 257-290.
Toplam 41 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Veri Yönetimi ve Veri Bilimi (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Enes Açıkgözoğlu 0000-0001-7293-883X

Remzi Gürfidan 0000-0002-4899-2219

Erken Görünüm Tarihi 30 Haziran 2023
Yayımlanma Tarihi 30 Haziran 2023
Yayımlandığı Sayı Yıl 2023 Cilt: 10 Sayı: 19

Kaynak Göster

APA Açıkgözoğlu, E., & Gürfidan, R. (2023). A New Blockchain-Based Authentication Infrastructure For Wireless Networks: BCAUTH. 21. Yüzyılda Fen Ve Teknik, 10(19), 9-17.