Font Size: a A A

Research On Secure Access Mechanism Of Internet Of Things Based On Block Chain Technology

Posted on:2022-12-24Degree:MasterType:Thesis
Country:ChinaCandidate:X R JuFull Text:PDF
GTID:2518306788456594Subject:Computer Software and Application of Computer
Abstract/Summary:PDF Full Text Request
Since the birth of Internet of Things technology,the security of Internet of Things information has become the focus of people.With the development and popularity of the Internet of Things,the access security of the Internet of Things is becoming more and more important.The Internet of Things itself has the problem of low computing power and vulnerability to attack,and its privacy information cannot be protected.Traditional centralized access control can protect privacy information to a certain extent,but due to the single point of failure,internal attack and central disclosure threats,the use of Io T devices in an untrusted environment will cause great security risks.Therefore,the security of Internet of Things access has gradually become the focus of attention.Decentralized blockchain technology allows the attribute information of access control to be deployed on the chain.The combination of blockchain and Io T access control can relieve the pressure and credibility problems caused by the concentration of third-party information,and effectively improve the security of Io T access.However,the pseudo anonymous nature of blockchain itself still has security risks,and the immutable nature brings challenges to the privacy of access.In addition,too much computing on the blockchain leads to a waste of computing resources and storage space.To solve the above problems,this paper improves the traditional Internet of Things access control model by using zero-knowledge proof,block chain technology and sequential pattern mining method,and proposes a new Internet of Things access control model based on block chain.The model is mainly composed of three entities:access subject,access object and attribute authorization organization,and two functional modules: security monitoring module and identity authentication module.The main work and contributions of this paper are as follows: First,the decentralized blockchain is used to deploy device attribute information to relieve the pressure and credibility problems caused by the centralization of third-party information;Secondly,the access control token with zero-knowledge encryption applied to the model is used to obtain access to resources,which can conceal the identity,effectively avoid the problem of exposing the ownership of device attributes,optimize the authentication mode,and improve the access efficiency.In addition,considering the user's malicious behavior is generally regular,through the sequence pattern mining algorithm to identify some malicious users,using the chain to intercept malicious users,to prevent the block chain in meaningless computing to spend too much resources,reduce the chain computing overhead;Finally,implemented a Io T access control simulation model,and the security level of the access control model based on attribute,compared the simulation results show that with the increase of access level,using the access efficiency of the model gradually improve,under the condition of normal visits to access efficiency increased by 35.31%,preliminary interception of the malicious user rate reached 70%.
Keywords/Search Tags:Internet of Things, Access Control, Blockchain, Smart Contracts
PDF Full Text Request
Related items