Service architecture of IoT terminal connection based on blockchain identity authentication system

被引:18
|
作者
Huang, Jui-Chan [1 ]
Shu, Ming-Hung [2 ,3 ]
Hsu, Bi-Min [4 ]
Hu, Chien-Ming [2 ]
机构
[1] Yango Univ, Fuzhou 350015, Peoples R China
[2] Natl Kaohsiung Univ Sci & Technol, Dept Ind Engn & Management, Kaohsiung 80778, Taiwan
[3] Kaohsiung Med Univ, Dept Healthcare Adm & Med Informat, Kaohsiung 80708, Taiwan
[4] Cheng Shiu Univ, Dept Ind Engn & Management, Kaohsiung 83347, Taiwan
关键词
Internet of Things; Regional block; Service architecture; Identity authentication;
D O I
10.1016/j.comcom.2020.06.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is a highly integrated and integrated application of information technology that can better meet the needs of people's development. With the popularity of the Internet of Things, the number of Internet of Things devices has increased, and the communication between devices and devices has become more complicated. Because the Internet of Things has some common problems with the Internet, a more effective, secure and trusted IoT platform has become the focus of many research scholars. Blockchain, as a decentralized, non-tamperable and highly credible technology, fits well with the development trend of networking. Identity authentication is an important part of the service architecture and can effectively solve the security in the Internet of Things. Hidden dangers. Therefore, in view of the low efficiency and lack of security in the traditional IoT server architecture, this paper proposes a blockchain-based networked identity authentication system. Firstly, according to the characteristics of the blockchain, the key technologies of the blockchain are briefly explained. Then, the overall design scheme design, the user end system design and the equipment end system design of the identity authentication system. Finally, the experimental platform is built, and the functional testing of the blockchain platform, device and client is carried out respectively The throughput of the system is obtained by the block rate and the outbound time of the blockchain under the condition of the privacy blockchain. The memory usage and the corresponding traffic consumption during the process of creating the wallet and data upload are analyzed to verify the stability of the system and to verify the rationality of the IoT identity authentication system based on the blockchain.
引用
收藏
页码:411 / 422
页数:12
相关论文
共 50 条
  • [21] A Security Framework for IoT Authentication and Authorization based on Blockchain Technology
    Pajooh, Houshyar Honar
    Rashid, M. A.
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 264 - 271
  • [22] A Blockchain based Authentication Scheme for Mobile Data Collector in IoT
    Jerbi, Wassim
    Cheikhrouhou, Omar
    Guermazi, Abderrahmen
    Hamam, Habib
    Trabelsi, Hafedh
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 929 - 934
  • [23] Towards a Smart Healthcare System: An Architecture Based on IoT, Blockchain, and Fog Computing
    Fetjah, Laila
    Azbeg, Kebira
    Ouchetto, Ouail
    Andaloussi, Said Jai
    INTERNATIONAL JOURNAL OF HEALTHCARE INFORMATION SYSTEMS AND INFORMATICS, 2021, 16 (04)
  • [24] RESEARCH OF IDENTITY AUTHENTICATION OF THE MOBILE TERMINAL VOTING SYSTEM
    Hu Meida
    Wang Chunshan
    Teng Guifa
    Gao Guandong
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 198 - 201
  • [25] A CPK-Based Identity Authentication Scheme for IoT
    Zhang, Mingming
    Mao, Jiaming
    Ma, Yuanyuan
    Xu, Liangjie
    Wang, Chuanjun
    Zhao, Ran
    Li, Zhihao
    Chen, Lu
    Zhao, Wenbing
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (03): : 1217 - 1231
  • [26] A CPK-Based Identity Authentication Scheme for IoT
    Zhang M.
    Mao J.
    Ma Y.
    Xu L.
    Wang C.
    Zhao R.
    Li Z.
    Chen L.
    Zhao W.
    Computer Systems Science and Engineering, 2021, 40 (03): : 1217 - 1231
  • [27] Non-transferable blockchain-based identity authentication
    Yuxia Fu
    Jun Shao
    Qingjia Huang
    Qihang Zhou
    Huamin Feng
    Xiaoqi Jia
    Ruiyi Wang
    Wenzhi Feng
    Peer-to-Peer Networking and Applications, 2023, 16 : 1354 - 1364
  • [28] A Framework for a Multisensory IoT System Based on Service-oriented Architecture
    Poluan, Sevendi Eldrige Rifki
    Chen, Yan-Ann
    APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2020, : 369 - 372
  • [29] IoT Device Identity Authentication Method Based on rPPG and CNN Facial Recognition
    Wu, Liwan
    Yang, Chong
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 154 - 162
  • [30] Identity Authentication Protocol of Smart Home IoT based on Chebyshev Chaotic Mapping
    Sun, Jingjing
    Zhang, Peng
    Kong, Xiaohong
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (04) : 557 - 565