Font Size: a A A

Research On Information Security Transmission And Storage In IoT Based On Blockchain

Posted on:2019-09-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ZhaoFull Text:PDF
GTID:2428330545477165Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet of Things,many devices around us are connected together through the Internet and we are forwarding into IoT intelligent times.However,many devices connected to the Internet also provide more attack surfaces for hackers,so the security problem of Internet of things is more severe.One of the common security problems is that most IoT devices are purchased and deployed in batches and users still use the default username and password provided by the manufacturer,which provides the attacker with the possibility of brute-force attack.In September 20,2016,Mirai virus using DDOS successfully attacked some website and dynamic domain name server.These devices were cracked,invaded and controlled using default username and password,and the Botnet was ultimately formed and cooperatively launched an attack.In order to solve security problem of the communication and message storage of IoT,this paper presents a key-based architecture using asymmetric encryption algorithm and blockchain technology and so on.For the secure transmission of information,the elliptic curve encryption algorithm and Diffle-Hellman-Merkle key exchange algorithm are used as the encryption tool of the whole architecture.ECC and D-H algorithm is not only used for encrypted communication between IoT devices,but also used for encrypted communication between IoT devices and Raft server cluster in order to ensure the confidentiality of sensitive information and efficiency of data communications.In the aspect of information storage,the paper uses blockchain data structure and the consensus algorithm to ensure secure storage.Considering the real-time nature of the Internet of Things,the Raft consensus algorithm is adopted,which has strong consistency in the existing blockchain consensus algorithms and is more in line with the requirement against the final consistency consensus algorithm of the public chain such as POW.The blockchain data structure is used to store public key data content committed separately by each IoT device.The hash pointers in the blockchain data structure can ensure the integrity and hard-to-change of stored data.Finally,the NS-3 network simulation platform is used to test the proposed security architecture.After the security architecture is implemented,each user of the IoT devices can log in service center for authorization and querying without manually setting a password,and symmetric password of each session between IoT devices will change and guarantee uniqueness.For the Raft cluster that stores the content of the public key of each IoT device,the blockchain technology not only ensures the hard-to-change storage,but also prevents violations of user privacy because the private key of each IoT device is only stored on its own device and the Raft only holds the corresponding public key.Based on the above methods,the architecture can enhances the security of the Internet of Things.
Keywords/Search Tags:Internet of Things, blockchain, Raft consensus algorithm, ECC asymmetric encryption, Diffle-Hellman-Merkle key exchange
PDF Full Text Request
Related items