首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于区块链的分布式物联网身份认证方案
引用本文:刘清源,刘瑞佳,查德平,林 耘.基于区块链的分布式物联网身份认证方案[J].福州大学学报(自然科学版),2023,51(5):670-676.
作者姓名:刘清源  刘瑞佳  查德平  林 耘
作者单位:东北林业大学,复旦大学,复旦大学,复旦大学
基金项目:中国高校产学研创新基金-新一代信息技术创新项目;上海市2022年度“科技创新行动计划”软科学研究项目
摘    要:随着计算机设备与通信技术的飞速发展,连接网络的设备数量正在以指数级迅速增长,然而在设备数量激增的背景下,数据泄露、数据篡改等数据安全问题也随之而来,因此设备之间的身份认证就显得尤为重要。然而在传统的网络环境中,身份认证大多采用集中式的网络结构,依靠身份认证中心等对设备身份进行管理,然而由于物联网设备的异构性和资源有限性,传统的集中式的身份认证方案并不完全符合物联网系统。为解决上述问题,本文在区块链的技术框架下提出了一种基于区块链的分布式物联网身份认证方案,该方案包括一种基于区块链的分布式物联网架构,并在该架构的基础上,提出了一种基于哈希链的身份认证方案以及一种基于网络安全编码的密钥分配方案,由于区块链技术具有开放性、不变性、可追溯性和容错性等特性,因此可以确保物联网场景中数据传输的私密性,从而提供安全的通信环境。文中对方案相关的性能指标进行了评价,实验分析证实了所提出的方案的高效性和可扩展性。

关 键 词:区块链  网络安全  身份认证  网络安全编码  哈希链
收稿时间:2023/10/3 0:00:00
修稿时间:2023/10/18 0:00:00

Blockchain-based distributed IoT identity authentication scheme
LIU Qingyuan,LIU Ruiji,ZHA Deping,LIN Yun.Blockchain-based distributed IoT identity authentication scheme[J].Journal of Fuzhou University(Natural Science Edition),2023,51(5):670-676.
Authors:LIU Qingyuan  LIU Ruiji  ZHA Deping  LIN Yun
Institution:Northeast Forestry University,Fudan University,Fudan University,Fudan University
Abstract:With the rapid development of computer equipment and communication technology, the number of devices connected to the network is growing exponentially. However, in the context of the surge in the number of devices, data security issues such as data leakage and data tampering also follow. The identity authentication between them is particularly important. However, in the traditional network environment, the identity authentication mostly adopts a centralized network structure, relying on the identity authentication center to manage the device identity. However, due to the heterogeneity and limited resources of IoT devices, the traditional centralized identity authentication The solution is not entirely in line with IoT systems. In order to solve the above problems, this paper proposes a blockchain-based distributed IoT identity authentication scheme under the technical framework of blockchain, which includes a blockchain-based distributed IoT architecture. On the basis of the ar-chitecture, an identity authentication scheme based on hash chain and a key distribution scheme based on network security coding are proposed. Due to the characteristics of openness, immutability, traceability and fault tolerance of blockchain technology , thus ensuring the privacy of data transmission in IoT scenarios, thus providing a secure communication envi-ronment. The performance indicators related to the scheme are evaluated in this paper, and the experimental analysis con-firms the efficiency and scalability of the proposed scheme.
Keywords:Blockchain  Network security  Identity authentication  Network secure coding  Hash chain
点击此处可从《福州大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《福州大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号