Service architecture of IoT terminal connection based on blockchain identity authentication system

被引:18
作者
Huang, Jui-Chan [1 ]
Shu, Ming-Hung [2 ,3 ]
Hsu, Bi-Min [4 ]
Hu, Chien-Ming [2 ]
机构
[1] Yango Univ, Fuzhou 350015, Peoples R China
[2] Natl Kaohsiung Univ Sci & Technol, Dept Ind Engn & Management, Kaohsiung 80778, Taiwan
[3] Kaohsiung Med Univ, Dept Healthcare Adm & Med Informat, Kaohsiung 80708, Taiwan
[4] Cheng Shiu Univ, Dept Ind Engn & Management, Kaohsiung 83347, Taiwan
关键词
Internet of Things; Regional block; Service architecture; Identity authentication;
D O I
10.1016/j.comcom.2020.06.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is a highly integrated and integrated application of information technology that can better meet the needs of people's development. With the popularity of the Internet of Things, the number of Internet of Things devices has increased, and the communication between devices and devices has become more complicated. Because the Internet of Things has some common problems with the Internet, a more effective, secure and trusted IoT platform has become the focus of many research scholars. Blockchain, as a decentralized, non-tamperable and highly credible technology, fits well with the development trend of networking. Identity authentication is an important part of the service architecture and can effectively solve the security in the Internet of Things. Hidden dangers. Therefore, in view of the low efficiency and lack of security in the traditional IoT server architecture, this paper proposes a blockchain-based networked identity authentication system. Firstly, according to the characteristics of the blockchain, the key technologies of the blockchain are briefly explained. Then, the overall design scheme design, the user end system design and the equipment end system design of the identity authentication system. Finally, the experimental platform is built, and the functional testing of the blockchain platform, device and client is carried out respectively The throughput of the system is obtained by the block rate and the outbound time of the blockchain under the condition of the privacy blockchain. The memory usage and the corresponding traffic consumption during the process of creating the wallet and data upload are analyzed to verify the stability of the system and to verify the rationality of the IoT identity authentication system based on the blockchain.
引用
收藏
页码:411 / 422
页数:12
相关论文
共 50 条
  • [31] Non-transferable blockchain-based identity authentication
    Fu, Yuxia
    Shao, Jun
    Huang, Qingjia
    Zhou, Qihang
    Feng, Huamin
    Jia, Xiaoqi
    Wang, Ruiyi
    Feng, Wenzhi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (03) : 1354 - 1364
  • [32] Blockchain-based Privacy Protection Unified Identity Authentication
    Zheng, Yue
    Li, Yarong
    Wang, Zhen
    Deng, Chunhua
    Luo, Yili
    Li, Yixin
    Ding, Jianwei
    2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, : 42 - 49
  • [33] Mobile Terminal Identity Authentication Method Based on IBC
    Chen, Xuqiu
    Wang, Wei
    Gan, Wei
    Yang, Yi
    Yuan, Su
    Li, Meng
    SMART COMPUTING AND COMMUNICATION, 2022, 13202 : 112 - 122
  • [34] A decentralized lightweight blockchain-based authentication mechanism for IoT systems
    Khalid, Umair
    Asim, Muhammad
    Baker, Thar
    Hung, Patrick C. K.
    Tariq, Muhammad Adnan
    Rafferty, Laura
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03): : 2067 - 2087
  • [35] An identity authentication solution based on ECC for mobile terminal
    Deng, Jie
    Li, Juan
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1353 - 1358
  • [36] A decentralized lightweight blockchain-based authentication mechanism for IoT systems
    Umair Khalid
    Muhammad Asim
    Thar Baker
    Patrick C. K. Hung
    Muhammad Adnan Tariq
    Laura Rafferty
    Cluster Computing, 2020, 23 : 2067 - 2087
  • [37] A Lightweight Blockchain-Based IoT Identity Management Approach
    Bouras, Mohammed Amine
    Lu, Qinghua
    Dhelim, Sahraoui
    Ning, Huansheng
    FUTURE INTERNET, 2021, 13 (02): : 1 - 14
  • [38] A Two-Layer-Consensus Based Blockchain Architecture for IoT
    Bai, He
    Xia, Geming
    Fu, Shaojing
    PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 277 - 282
  • [39] IoT infrastructure secured by TLS level authentication and PKI identity system
    Oniga, Bogdan
    Farr, Stefan Harsan
    Munteanu, Adrian
    Dadarlat, Vasile
    PROCEEDINGS OF THE 2018 SECOND WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4), 2018, : 78 - 83
  • [40] Multiple Leader PBFT Based Blockchain Architecture for IoT Domains
    Qushtom, Haytham
    Misic, Jelena
    Misic, Vojislav B.
    2021 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2021,