INTERNET OF THINGS ACCESS CONTROL IDENTITY AUTHENTICATION METHOD BASED ON BLOCKCHAIN

被引:0
作者
Zhai, Peng [1 ]
Zhang, Liping [2 ]
Zhang, Yu [1 ]
机构
[1] Jining Univ, Sch Comp Sci & Engn, Jining, Peoples R China
[2] Shandong Yankuang Technician Inst, Inst Tech Educ, Jining, Peoples R China
来源
UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE | 2025年 / 87卷 / 02期
关键词
IoTs; access control; identity authentication; Blockchain;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
At present, Internet of Things (IoT) is widely used, which requires high security of network communication and data transmission. The terminal devices of IoT need mutual identification and identity authentication to ensure network security and data security. Identity authentication is the first line of defense ofIoT security. The existing traditional public key infrastructure (PKI) is cumbersome and computationally intensive and cannot meet the needs of the open and distributed IoT environment with limited resources. In this paper, a two-way identity authentication mechanism of IoT terminal based on Blockchain is designed by using SM9 ID cipher algorithm. The scheme uses device ID as the public key, which simplifies the key distribution management process. In addition, based on the assumptions of computational Diffie-Hellman difficulty, q-Diffie-Hellman inverse problem and bilinear Diffie-Hellman difficulty problem, it can greatly meet the confidentiality and unforgeability, and thus is more in line with the practical application environment of IoT. Through simulation experiments to verify and analyze, and comparing several mainstream authentication methods at present, the identity authentication scheme based on SM9 identity cryptographic algorithm and blockchain technology in the IoTs environment can meet the requirements of time, performance and security.
引用
收藏
页码:289 / 308
页数:20
相关论文
共 24 条
[1]   Secure Identity Authentication of Community Medical Internet of Things [J].
Cheng, Xu ;
Zhang, Ziyang ;
Chen, Fulong ;
Zhao, Chuanxin ;
Wang, Taochun ;
Sun, Hui ;
Huang, Cheng .
IEEE ACCESS, 2019, 7 :115966-115977
[2]   A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN [J].
Cui, Zhihua ;
Xue, Fei ;
Zhang, Shiqiang ;
Cai, Xingjuan ;
Cao, Yang ;
Zhang, Wensheng ;
Chen, Jinjun .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (02) :241-251
[3]  
Feng Yuan, 2016, J. Inf. Secur. Res., V2, P1008
[4]   Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing [J].
Fugkeaw, Somchart ;
Wirz, Leon ;
Hak, Lyhour .
IEEE ACCESS, 2023, 11 :62998-63012
[5]   Key-Private Identity-Based Proxy Re-Encryption [J].
Ge, Chunpeng ;
Xia, Jinyue ;
Fang, Liming .
CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02) :633-647
[6]  
Gu P., 2020, 2020 IEEE 6 INT C CO
[7]   A novel secure key paring protocol for RF4CE ubiquitous smart home systems [J].
Han, Kyusuk ;
Kim, Jangseong ;
Shon, Taeshik ;
Ko, Daesik .
PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) :945-949
[8]  
Hossain M, 2017, 2017 5 IEEE INT C MO
[9]  
Khalid M, 2023, Computer communications, P206
[10]   Anonymous Secure Framework in Connected Smart Home Environments [J].
Kumar, Pardeep ;
Braeken, An ;
Gurtov, Andrei ;
Iinatti, Jari ;
Ha, Phuong Hoai .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) :968-979