Font Size: a A A

Research On Identity Authentication Protocol Of Internet Of Things Equipment Based On Blockchain

Posted on:2020-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:X H ZhangFull Text:PDF
GTID:2428330572487275Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Recently,with the continuous development of the sharing economy,the IoT(Internet of Things)technology behind it has attracted more and more attention.IoT technology has the characteristics of large scale,complex structure and high cost,which makes it very difficult to ensure the security of it.Identity authentication is the key to solving this security problem.The traditional identity authentication protocols assume that the server and the reader communicate through a secure channel,and most of them use a centralized architecture.However,as the scale of the IoT continues to expand and new application scenarios such as mobile readers and cloud servers have been proposed,the traditional protocols have been challenged.This is mainly manifested in the following three aspects:Firstly,the assumed secure channel between the server and the reader no longer exists.Secondly,a malicious reader may appear in the protocol.Thirdly,the centralized network architecture cannot withstand the burden of the increasing network scale.The blockchain has the characteristics of decentralization,traceability,and non-changeability,which can effectively solve these problems,but it has a throughput bottleneck.The block-lattice is a directed acyclic graph structure in blockchain,it can effectively increase the throughput,but this still cannot meet the requirements of practical applications.We apply the block-lattice and propose the identity authentication protocol of IoT devices based on blockchain.However,there are two difficulties when employing the block-lattice into the identity authentication protocol.Firstly,the throughput of the block-lattice is still not enough to meet the requirements of the protocol.Secondly,the tag cannot execute the signature algorithm required by the blockchain.With the aforementioned considerations,we combine the advantages of the traditional identity authentication protocol and block-lattice in our protocol.First of all,we analyze the problems of traditional identity authentication protocols,give corresponding solutions to these problems,and propose the framework of the protocol.Secondly,in order to solve the problem of insufficient throughput,we analyze the influence of double-spent attack on the block-lattice structure,propose a block-lattice structure that can tolerate fork,and prove that it still contains a partial order relationship.Consequently,we solve the problem that the block-lattice structure may be subject to the double-spent attack and fail to work properly.Then,we design an identity authentication protocol based on the block-lattice structure in combination with the traditional protocol.The consensus mechanism is removed from the protocol,thus eliminating the protocol throughput bottleneck.Finally,we present a security analysis and efficiency analysis for the proposed protocol.The results show that our protocol solves the above three problems while still having the same security guarantees and asymptotically consistent efficiency,compared to the traditional protocol.
Keywords/Search Tags:block-lattice, identity authentication, Internet of Things, blockchain
PDF Full Text Request
Related items