Font Size: a A A

A Cross-domain Trusted Authentication Mechanism For IoT Based On The Consortium Blockchain

Posted on:2022-03-21Degree:MasterType:Thesis
Country:ChinaCandidate:X HuFull Text:PDF
GTID:2518306341951559Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of the IoT(Internet of Things)technology,intelligent IoT devices have exploded,and a large number of IoT systems have been built independently,resulting in the emergence of chimneys and data islands.While in the future,the IoT urgently requires efficient coordination between independent IoT terminals and systems to meet the ever-increasing demand for diversified IoT.However,due to the fragmentation of identity information between domains,the transferability of trust is poor,which greatly limits the ability of the terminal to collaborate between domains.Blockchain,as a distributed ledger technology,can solve the problem of trust transfer in the digital space through consensus.Many scholars at home and abroad try to introduce blockchain technology to provide the service capability of trustworthy authentication of IoT.But in the process of fusion of blockchain and authentication services,there are problems such as difficulty in the unification of credible identity mapping between domains and low efficiency of authentication services.For this reason,it is urgent to carry out research on the trusted authentication technology of IoT terminals that integrates blockchain and build a cluster.Centralized trusted authentication service is of great significance to solve the problem of trust transfer between IoT domains.To solve the above problems,this paper integrates blockchain and edge computing technologies,and proposes a cross-domain trusted authentication mechanism for the IoT based on the alliance chain,which realizes the unified trusted mapping and rapid authentication services of terminal identities between the Internet of Things domains.It mainly includes the following parts:First of all,in order to solve the problem of the unification of credibility mapping in the cross-domain authentication process,a distributed credible authentication mechanism based on smart contracts is proposed.Combining blockchain and edge computing technology,a multi-layer distributed trusted authentication architecture is designed to establish a trust mechanism between IoT platforms with different structures and decentralized powers.It allows terminals to authenticate on the blockchain network through the blockchain edge nodes,realizing the identity uniformity of smart terminals between different platforms.Then a digital signature mechanism based on an asymmetric encryption algorithm is proposed to ensure that the identity of the IoT terminal accessing the authentication system is credible and unforgeable,so that the two-way authentication between the terminal and the blockchain edge computing node is safe and reliable.And further optimize the PBFT consensus algorithm to improve the consensus efficiency.Secondly,in view of the inefficiency of terminal inter-domain authentication services and the limited storage of blockchain networks,this paper proposes an edge caching strategy for authentication data based on the belief propagation algorithm,which uses the terminal authentication data light-weight on-chain solution instead of full-on-chain,alleviating the caching pressure of the blockchain network.And an edge cache model is designed,calculating the best cache allocation plan that meets the lowest average delay through the belief propagation algorithm,which further optimizes the network throughput.Finally,our proposed authentication mechanism is evaluated from two aspects of security and efficiency.The security of the system is guaranteed through a variety of safety risk assessments.In the efficiency analysis,the authentication efficiency and the authentication data caching efficiency are investigated,and compared with other existing algorithms.Simulation results show that the caching strategy outperforms existing edge computing strategies by 6%-12%in terms of average delay,and 8%-14%in hit ratio.
Keywords/Search Tags:Cross-Domain trust authentication, Blockchain, Edge computing, Digital signature, Caching algorithm
PDF Full Text Request
Related items