Font Size: a A A

Research On Authentication Protocol Assisted By Blockchain For IoT Scenarios

Posted on:2024-08-03Degree:MasterType:Thesis
Country:ChinaCandidate:X B XuFull Text:PDF
GTID:2568307178473714Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the continuous rise of Internet of Things(Io T)technology,it has been widely applied in various fields,such as smart health,smart cities,and intelligent transportation.In various Io T scenarios,users need to communicate with various smart devices through public channels,which may be vulnerable to various attacks.Therefore,people increasingly need powerful security mechanisms to prevent unauthorized access and data leakage.One of the main challenges in ensuring the security of Io T networks is the limited resources of most Io T devices,such as low computing power,limited memory,and inadequate energy supply.Therefore,the authentication protocol for Io T scenarios must be lightweight,efficient,and easy to scale.Currently,there are various authentication protocols for Io T scenarios,such as certificate-based authentication,password-based authentication,and biometric-based authentication.Unfortunately,these solutions are difficult to balance security attributes and performance,and most of them adopt centralized authentication.With the assistance of blockchain,this paper mainly focuses on the security and privacy issues of Io T networks in Io T scenarios.The main contributions of this paper are as follows:(1)In response to the single-point failure,efficiency,and security trade-off issues in current general Io T scenarios,this article proposes a domain-based identity authentication protocol based on private blockchain,using a typical smart home environment as an example.The solution automates identity authentication using public key cryptography mechanisms and smart contracts running on a local chain.In contrast to the widely used public blockchain,our network model is built on a private blockchain where the consensus time is almost negligible,significantly improving authentication efficiency.To protect user privacy,a fuzzy extractor is introduced.In the proposed solution,each fog node manages a group of smart devices,connecting to Ethereum smart contracts through fog nodes to verify user-device schemes,while also improving system scalability.Finally,security analysis shows that our solution can resist various attacks and has smaller computational and communication costs compared to other solutions.(2)The paper presents a lightweight distributed inter-domain authentication protocol that extends from intra-domain to inter-domain,targeting the communication and cross-domain device access control issues in Io T subsystems.In the proposed approach,all fog cluster nodes form a consortium blockchain,enabling cross-domain device identity authentication and access control through nearby fog nodes.By constructing a consortium blockchain on the fog layer,the protocol effectively reduces communication latency,creating a controlled and secure environment for the Io T system.The proposed solution relies solely on one-way hash function cryptographic primitives,resulting in lower communication and computation costs.Finally,formal and informal security analyses demonstrate the protocol’s provable security and multiple security properties.A comparison with alternative approaches reveals superior performance of our protocol.
Keywords/Search Tags:Authentication protocol, Internet of Things, fog computing, blockchain, privacy protection
PDF Full Text Request
Related items