Font Size: a A A

The Design And Implementation Of Iot Security Platform Based On Block Chain

Posted on:2019-03-30Degree:MasterType:Thesis
Country:ChinaCandidate:C MeiFull Text:PDF
GTID:2348330545455602Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid growth of the Internet of Things,various intelligent devices are applied to daily life through connecting to the Internet.The increasing connection of intelligent devices facilitate and enrich our life in accompany with some security issues.Therefore,how to manage intelligent devices safely is becoming a problem that should not be neglected.At present,centralized management is mostly adopted by the management platform,which puts huge pressure on management and maintenance facing explosive growth of access devices.The trust issue of single point in centralized management can greatly reduce device safety as well.This paper proposes a distributed management platform for increasing access of heterogeneous devices to provide security assurance for devices accessing the platform by taking advantage of security feature in block chain technology.Here are the details that were mainly done in the paper:1.Design a distrusted platform of the Internet of Things by using block chain technology,combining the platform with block chain distributed network nodes.2.Implement authentication function for devices access by referring to common identity authentication policy and making use of device features of the Internet of Things.We use block chain's smart contract to implement this strategy to ensure the credibility of certification,and we use block chain book to back up the authentication result to guarantee the result do not be falsified.3.Implement access control in the platform by referring to proven access control model and make use of device features of the Internet of Things.We use block chain book to store privilege table to ensure the privilege do not be modified easily,and we use block chain's smart contract to implement the authority judgment to guarantee the reliability of judgment.4.Implement intrusion-tolerant policy in the platform by referring to common intrusion-tolerant policy,to some extent,to ensure the service performance of the platform.We use block chain's smart contract to implement arbitration decision of event analyzers to ensure the accuracy of the arbitration results,and we use block chain book to store event database to guarantee the traceability of system tolerance invasion process.
Keywords/Search Tags:distrusted management platform, access authentication, authority management, intrusion-tolerance
PDF Full Text Request
Related items