浏览全部资源
扫码关注微信
[ "谭琛(1995- ),男,江苏徐州人,南京邮电大学硕士生,主要研究方向为区块链技术和物联网等" ]
[ "陈美娟(1971- ),女,陕西咸阳人,博士,南京邮电大学副教授,主要研究方向为异构无线网络资源管理、区块链技术以及SDN/NFV技术等" ]
[ "Amuah Ebenezer Ackah(1987- ),男,加纳人,南京邮电大学博士生,主要研究方向为物联网、区块链以及MIMO等" ]
纸质出版日期:2020-06-30,
网络出版日期:2020-06,
移动端阅览
谭琛, 陈美娟, Amuah Ebenezer Ackah. 基于区块链的分布式物联网设备身份认证机制研究[J]. 物联网学报, 2020,4(2):70-77.
CHEN TAN, MEIJUAN CHEN, EBENEZER ACKAH AMUAH. Research on distributed identity authentication mechanism of IoT device based on blockchain. [J]. Chinese journal on internet of things, 2020, 4(2): 70-77.
谭琛, 陈美娟, Amuah Ebenezer Ackah. 基于区块链的分布式物联网设备身份认证机制研究[J]. 物联网学报, 2020,4(2):70-77. DOI: 10.11959/j.issn.2096-3750.2020.00167.
CHEN TAN, MEIJUAN CHEN, EBENEZER ACKAH AMUAH. Research on distributed identity authentication mechanism of IoT device based on blockchain. [J]. Chinese journal on internet of things, 2020, 4(2): 70-77. DOI: 10.11959/j.issn.2096-3750.2020.00167.
为了解决物联网集中式平台在设备身份认证过程中兼容性低、抗攻击能力弱等问题,提出了一种基于区块链的分布式物联网设备身份认证架构。将数字身份等信息存入新型区块数据结构中,并根据密码学相关知识提出了分布式物联网设备身份认证机制,设计了设备数字证书颁发和身份认证的详细流程。从各实体间的权力约束、设备隐私性保护、抵御攻击能力等方面对所提机制进行了安全性分析,并对比分析了安全属性、计算开销和存储开销3个方面的性能。结果表明,所提出的身份认证机制可以抵御多种恶意攻击,能够实现高度安全的分布式物联网身份认证,并且在性能方面具有一定优势。
Aiming to solve problems of the low compatibility and weak anti-attack ability of the Internet of things (IoT) centralized platform in the device identity authentication process
a blockchain-based distributed IoT device identity authentication architecture was proposed.The digital identity and related information were stored in the new block data structure
and a distributed IoT device identity authentication mechanism was proposed based on the cryptography related knowledge.At the same time
a device digital certificate issuance process and a detailed process of the identity authentication were designed.The security analysis of the proposed mechanism were carried out from the aspects of power constraints
device privacy protection
and ability to resist attacks among various entities.The performance of three aspects
which were security attributes
computational overhead and storage overhead
were compared and analyzed.The results show that the proposed identity authentication mechanism can resist a variety of malicious attacks
achieve highly secure distributed IoT identity authentication
and has certain advantages in the performance.
区块链物联网分布式身份认证密码学
blockchainInternet of thingsdistributedidentity authenticationcryptography
邬贺铨 . 物联网技术与应用的新进展[J]. 物联网学报, 2017,1(1): 1-6.
WU H Q . Technology and application progress on Internet of things[J]. Chinese Journal on Internet of Things, 2017,1(1): 1-6.
YAQOOB I, HASHEM I A T, AHMED A ,et al. Internet of things forensics:recent advances,taxonomy,requirements,and open challenges[J]. Future Generation Computer Systems, 2019,92: 265-275.
FENG T, CHEN W Y, ZHANG D ,et al. One-stop efficient PKI authentication service model based on blockchain[C]// CCF China Blockchain Conference. Springer, 2019: 31-47.
毕宇 . 基于区块链智能合约的PKI-CA体系设计[J]. 金融科技时代, 2018,275(7): 44-46.
BI Y . PKI-CA system design based on blockchain smart contract[J]. Financial Technology Time, 2018,275(7): 44-46.
FAROOQ S M, HUSSAIN S M S, USTUN T S . Elliptic curve digital signature algorithm (ECDSA) certificate based authentication scheme for advanced metering infrastructure[C]// 2019 Innovations in Power and Advanced Computing Technologies (i-PACT). IEEE, 2019,1: 1-6.
刘巧平, 周斌, 王文涛 . 基于椭圆曲线的信息加密及网络身份认证算法的研究[J]. 自动化与仪器仪表, 2016(8): 159-160.
LIU Q P, ZHOU B, WANG W T . Research on information encryption and network identity authentication algorithm based on elliptic curve[J]. Automation & Instrumentation, 2016(8): 159-160.
BEHESHTI-ATASHGAH M, AREF M R, BAYAT M ,et al. ID-based strong designated verifier signature scheme andits applications in Internet of things[C]// 2019 27th Iranian Conference on Electrical Engineering (ICEE). IEEE, 2019: 1486-1491.
SAHANA S C, BHUYAN B . A provable secure short signature scheme based on bilinear pairing over elliptic curve[J]. IJ Network Security, 2019,21(1): 145-152.
GUO S Y, HU X, ZHOU Z Q ,et al. Trust access authentication in vehicular network based on blockchain[J]. China Communications, 2019,16(6): 18-30.
HAN S, XIE M D, YANG B L ,et al. A certificateless verifiable strong designated verifier signature scheme[J]. IEEE Access, 2019,7: 126391-126408.
ALI M S, VECCHIO M, PINCHEIRA M ,et al. Applications of blockchains in the Internet of things:a comprehensive survey[J]. IEEE Communications Surveys & Tutorials, 2019,21(2): 1676-1717.
陈美娟, 朱晓荣 . 基于区块链的物联网设备标识研究[J]. 物联网学报, 2018,2(2): 18-26.
CHEN M J, ZHU X R . Research on IoT device identification based on blockchain[J]. Chinese Journal on Internet of Things, 2018,2(2): 18-26.
LU Z J, WANG Q, QU G ,et al. A blockchain-based privacy-preserving authentication scheme for VANETs[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019,27(12): 2792-2801.
GUO S Y, HU X, GUO S ,et al. Blockchain meets edge computing:a distributed and trusted authentication system[J]. IEEE Transactions on Industrial Informatics, 2019,16(3): 1-11.
YAO Y Y, CHANG X L, MIŠIĆ J ,et al. BLA:blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services[J]. IEEE Internet of Things Journal, 2019,6(2): 3775-3784.
LU R X, LI X D, LUAN T H ,et al. Pseudonym changing at social spots:an effective strategy for location privacy in VANETs[J]. IEEE Transactions on Vehicular Technology, 2012,61(1): 86-96.
SHAO J, LIN X D, LU R X ,et al. A threshold anonymous authentication protocol for VANETs[J]. IEEE Transactions on Vehicular Technology, 2016,65(3): 1711-1720.
AZEES M, VIJAYAKUMAR P, DEBOARH L J . EAAP:efficient anonymous authentication with conditional privacy-preserving scheme for vehicular Ad Hoc networks[J]. IEEE Transactions on Intelligent Transportation Systems, 2017,18(9): 2467-2476.
JEGADEESAN S, AZEES M, BABU N R ,et al. EP-AW:efficient privacy preserving anonymous mutual authentication scheme for wireless bodyarea networks (WBANs)[J]. IEEE Access, 2020,8: 48576-48586.
CARO D A, IOVINO V . jPBC:java pairing based cryptography[J]. International Symposium on Computers and Communications, 2011,22(3): 850-855.
0
浏览量
883
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构