2025, Vol.28, No.3, pp.280 - 288
The paper provides a comparative analysis of node authentication solutions in distributed networks. The advantages of symmetric cryptography usage are shown in conditions of limited network node resources. Different distributed ledger architectures for data storage identification are considered. There is a system proposed for node authentication in distributed networks based on mutable permissioned blockchain.
Key words: distributed ledger, mutable blockchain, permissioned blockchain, node authentication (LHC)
DOI: https://doi.org/10.5281/zenodo.17241219
Full text: Acrobat PDF (592 KB) Open Access
Copyright © Nonlinear Phenomena in Complex Systems. Last updated: October 08, 2025