I want simulate authentication in IoT with blockchain in a simplest way. I work with Ganache and Solidity in remix.ethereum.org. I have a academic project. Please help me... Thanks
I think you should choose your own evaluation parameters before you simulate.
As far as I have studied in authentication, authentication methods are usually proven by formal tools such as AVISPA and BAN.
Some articles use tools NS3 to measure the effectiveness of an authentication scheme. In my opinion, you must first prove the security of your authentication scheme. In the next step, you can implement the proposed scheme using the following source code.
The solution (opensource or custom built) will only be found once you have your hands on all the KPIs, model and targets to achieve. What authentication protocol you are planning to simulate, what will be size of the device network, how you are planning to register the devices and remove the one leaving your network, Elaborate all those answers and you will get a direct help not only here but also through google.