Font Size: a A A

Research On Blockchain Based Identity Authentication For IoT Devices

Posted on:2020-06-06Degree:MasterType:Thesis
Country:ChinaCandidate:Q WangFull Text:PDF
GTID:2428330590471804Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
The traditional identity authentication schemes for Internet of Things(IoT)terminal devices are vulnerable to single point of failure and data tampering due to relying on a trusted third party.Blockchain with the functions of decentralization,tamper-resistance and traceability provides a new solution for this problem.Although some scholars have introduced blockchain technology into the field of identity authentication for IoT devices,and proposed some blockchain-based identity authentication schemes,there are still shortcomings such as not being able to resist forgery attacks,not having non-repudiation,and able to only conduct one-way authentication.Therefore,in order to solve the above problems,a identity authentication mechanism for IoT devices based on blockchain technology is proposed and implemented.The main research contents are as follows:1.The theory and attributes of blockchain technology are researched.The research status of blockchain in the security field for IoT devices,such as access control,data protection,trust management,device identification and location privacy are summarized.Meanwhile,the shortcomings of blockchain-based research schemes in the field of identity authentication for IoT devices are analyzed.2.In view of the problems and shortcomings of the traditional centralization-based authentication schemes and the existing blockchain-based authentication schemes,a blockchain-based authentication mechanism for IoT devices is designed.In this mechanism,the blockchain transaction and the trust credential for verifying the identity of the devices are constructed.Besides,Keccak hash algorithm and ECDSA digital signature algorithm are used to ensure the integrity and non-repudiation of the interactive message between the devices and the blockchain nodes.Theoretical analysis shows that the identity authentication process of this scheme requires at most 2 ECDSA signature operations and 98 Bytes storage capacity for IoT devices,which has lower computational and storage overhead requirements.Security and comparative analysis show that compared with the traditional centralization-based authentication schemes,this scheme can not only solve the problem of relying on a trusted third party but also achieve authentication data consistency and tamper resistance.Compared with the existing blockchain-based authentication scheme,this scheme can not only make up for the shortcomings such as the inability to resist forgery attacks and the lack of non-repudiation,but also achieve mutual authentication between devices.3.A blockchain-based identity authentication system is designed.By the use of the EthereumJS TestRPC simulation tool,the Ethereum blockchain network environment is built in the Linux environment.Besides,the corresponding smart contract algorithm and code implementation is compiled for each phase of the proposed scheme.In addition,with the help of open source Keccak hash algorithm and ECDSA digital signature algorithm,the front and rear ends of the system's each key module is implemented under the framework of Qt development.Finally,from the perspective of system functional test,the validity of the trust domain creation,the trust domain association and identity authentication phase in the scheme is verified.
Keywords/Search Tags:identity authentication, blockchain, smart contract, devices, security
PDF Full Text Request
Related items