Font Size: a A A

Research On Identity Authentication Algorithm Of Internet Of Things Based On Blockchain

Posted on:2021-02-11Degree:MasterType:Thesis
Country:ChinaCandidate:W HanFull Text:PDF
GTID:2428330602476843Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The core of the Internet of Things is still the Internet,and mobile power terminal equipment and advanced communication technologies based on artificial intelligence and cloud computing are also constantly enriching the entire Internet of Things system.At present,the traditional Internet of Things still generally adopts a centralized service system architecture.For the Internet of Things,it requires a large amount of data transmission,stability,and multiple nodes to cover a wide range of application scenarios.The centralized service system architecture is bound to increase construction and maintenance costs.Especially nowadays,the ubiquitous electric power Internet of Things,which is constantly expanding and being developed,has become the primary consideration when massive terminals are connected to its systems.At the same time,the data security of the terminal completely depends on the central server,and the trust of the end user is a basic condition for the normal operation of the central server.Once a malicious attack by a hacker causes the end user's information to be leaked and leaked,accompanied by the collapse of trust,it will inevitably lead to The collapse of the entire trust system.Blockchain has attracted widespread attention from academia and industry because of its potential for decentralized and distributed system management.The consensus mechanism is the core of the blockchain,enabling highly dispersed nodes in the entire blockchain network to quickly reach a consensus on the data,ensuring data consistency across the network.The significant advantage of blockchain technology is that it maintains a distributed,authenticated,and synchronized transaction ledger without the need for centralized manager management.Therefore,as a blockchain with the main characteristics of decentralization,detrust,and data encryption,it becomes possible for the Internet of Things to access mass terminals for identity authentication and solve privacy protection issues.The main research work and contributions of this article are as follows:(1)This article will first analyze the characteristics of the overall architecture of the blockchain and its application in the IoT identity authentication process,build a blockchain-based identity authentication algorithm,solve the identity authentication problem between the terminal and the data aggregator,and improve the efficiency of authentication And security,keeping the security and reliability of authentication in line with the security and reliability of blockchain.(2)This article will focus on the use of the blockchain consensus mechanism and the Internet of Things,and consider the network structure,trusted establishment,information security and other aspects to improve the reliability and performance of the blockchain-based identity authentication algorithm in the Internet of Things.(3)We use hash algorithm to sign and verify signatures to improve the efficiency of blockchain authentication in the Internet of Things and the scalability of the authentication process.The authentication process uses RSA algorithm for asymmetric encryption.(4)Security analysis and efficiency analysis and demonstration are carried out,and the future trend of identity management system construction in the ubiquitous electric power Internet of Things is pointed out,and how to build a ubiquitous electric power Internet of Things complete identity authentication system is explained.
Keywords/Search Tags:blockchain, internet of things, identity authentication, hash algorithm, RSA
PDF Full Text Request
Related items