Font Size: a A A

Design And Implementation Of A Trusted Authentication System For IoT Terminals Based On Authorized Consensus And Reputation Evaluation

Posted on:2024-05-17Degree:MasterType:Thesis
Country:ChinaCandidate:J Y YanFull Text:PDF
GTID:2568306944457014Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the deep integration of new-generation information technology and physical manufacturing industry,equipments in various industries and fields are transforming towards digitalization,networking,and intelligence.The Internet of Things(IoT)presents higher requirements for ubiquitous interconnection,security,reliability,and intelligent efficiency.Data interaction of IoT terminal devices requires cross-system,cross-enterprise,and cross-business demands,but this also leads to problems such as leakage of sensitive information and difficulty in distinguishing the authenticity of data.In the future human-machine-thing fully connected network,trust becomes the main problem that restricts network evolution,hindering the further development of IoT technology.Due to the large scale of IoT terminal devices and insufficient security protection measures,they are vulnerable to hacker hijacking attacks.Therefore,access authentication and access authorization for various terminal devices in the ubiquitous IoT are very important.In some IoT application scenarios,such as large-scale firefighting and rescue,venue security,battlefield reconnaissance,and other fields,the scale of terminal nodes in the edge network is huge,and some nodes have strong mobility,and network topology often changes.Centralized authentication to the cloud authentication center exists long transmission distance,high delay,and even disconnection.The centralized authentication scheme deployed by the edge server also has weaknesses such as poor anti-attack capability and network congestion.Based on the above challenges,this article proposes a distributed authentication scheme based on the DPoS consensus algorithm,which uses distributed authentication to authenticate the access node and uses a more comprehensive authentication evaluation algorithm to authenticate the terminal during the authentication process,making the authentication scheme adaptable to various complex and variable characteristics of IoT terminals,and improving the authentication efficiency and the anti-attack capability of the authentication network.However,a simple access authentication mechanism cannot guarantee the safety of nodes after accessing the network,so it is necessary to combine some security mechanisms,such as risk assessment,trust establishment,and terminal behavior monitoring,to maintain the security and stability of the network.To this end,this article proposes a dynamic reputation evaluation mechanism based on smart contracts,which directly associates the credibility of the node with its behavior.At the same time,the dynamic reputation evaluation result is uploaded to the blockchain storage,which guarantees the security and tamper-proofing of data,and also provides a historical reputation record for subsequent access authentication evaluations as a reference.Finally,based on the trustworthy access authentication and dynamic reputation evaluation mechanism proposed in this article,a simulation system for trustworthy authentication of IoT terminals was designed and implemented.To reduce the business coupling of the trustworthy access authentication system for IoT terminals,the system adopts a multi-layer architecture design.The bottom layer uses MySQL database for persistent storage of system data.The data layer,business layer,and control layer above it are the main backend architecture implemented in Java language.The frontend architecture is developed using the Vue3 framework and ElementPlus component library.The article finally provides a detailed introduction to the architecture and functional module design of the system,and showcases the frontend page effect of the system implementation.This system can effectively simulate and simulate the algorithms and processes proposed in this article.
Keywords/Search Tags:trusted access authentication, dynamic reputation evaluation, IoT, smart contract, blockchain
PDF Full Text Request
Related items