Service architecture of IoT terminal connection based on blockchain identity authentication system

被引:18
作者
Huang, Jui-Chan [1 ]
Shu, Ming-Hung [2 ,3 ]
Hsu, Bi-Min [4 ]
Hu, Chien-Ming [2 ]
机构
[1] Yango Univ, Fuzhou 350015, Peoples R China
[2] Natl Kaohsiung Univ Sci & Technol, Dept Ind Engn & Management, Kaohsiung 80778, Taiwan
[3] Kaohsiung Med Univ, Dept Healthcare Adm & Med Informat, Kaohsiung 80708, Taiwan
[4] Cheng Shiu Univ, Dept Ind Engn & Management, Kaohsiung 83347, Taiwan
关键词
Internet of Things; Regional block; Service architecture; Identity authentication;
D O I
10.1016/j.comcom.2020.06.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is a highly integrated and integrated application of information technology that can better meet the needs of people's development. With the popularity of the Internet of Things, the number of Internet of Things devices has increased, and the communication between devices and devices has become more complicated. Because the Internet of Things has some common problems with the Internet, a more effective, secure and trusted IoT platform has become the focus of many research scholars. Blockchain, as a decentralized, non-tamperable and highly credible technology, fits well with the development trend of networking. Identity authentication is an important part of the service architecture and can effectively solve the security in the Internet of Things. Hidden dangers. Therefore, in view of the low efficiency and lack of security in the traditional IoT server architecture, this paper proposes a blockchain-based networked identity authentication system. Firstly, according to the characteristics of the blockchain, the key technologies of the blockchain are briefly explained. Then, the overall design scheme design, the user end system design and the equipment end system design of the identity authentication system. Finally, the experimental platform is built, and the functional testing of the blockchain platform, device and client is carried out respectively The throughput of the system is obtained by the block rate and the outbound time of the blockchain under the condition of the privacy blockchain. The memory usage and the corresponding traffic consumption during the process of creating the wallet and data upload are analyzed to verify the stability of the system and to verify the rationality of the IoT identity authentication system based on the blockchain.
引用
收藏
页码:411 / 422
页数:12
相关论文
共 50 条
  • [41] DAG blockchain-based lightweight authentication and authorization schemefor IoT devices
    Wang, Shangping
    Li, Huan
    Chen, Juanjuan
    Wang, Jifang
    Deng, Yingjuan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [42] A Blockchain-Based Authentication Scheme for 5G-Enabled IoT
    Bidisha Goswami
    Hiten Choudhury
    Journal of Network and Systems Management, 2022, 30
  • [43] Blockchain-Based Decentralized Authentication Modeling Scheme in Edge and IoT Environment
    Zhaofeng, Ma
    Jialin, Meng
    Jihui, Wang
    Zhiguang, Shan
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04) : 2116 - 2123
  • [44] Blockchain-Based Authentication and Explainable AI for Securing Consumer IoT Applications
    Kumar, Randhir
    Javeed, Danish
    Aljuhani, Ahamed
    Jolfaei, Alireza
    Kumar, Prabhat
    Islam, A. K. M. Najmul
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 1145 - 1154
  • [45] A Blockchain-Based Authentication Scheme for 5G-Enabled IoT
    Goswami, Bidisha
    Choudhury, Hiten
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (04)
  • [46] A Blockchain-based Three-factor Mutual Authentication System for IoT using PUFs and Group Signatures
    Fariss, Meriam
    Toumanari, Ahmed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (03) : 71 - 79
  • [47] Design and Implementation of Internet of Things in Electricity Terminal Identity Authentication System
    Chen, Guanlan
    Wang, Zhuxiao
    Chen, Fei
    Gao, Xue
    2020 IEEE 6TH INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2019, : 223 - 227
  • [48] Research on Identity Authentication Method Based on Negative Logic System
    Cheng, Yexia
    Du, Yuejin
    Peng, Jin
    Fu, Jun
    Liu, Baoxu
    CYBER SECURITY, CNCERT 2018, 2019, 970 : 3 - 15
  • [49] A Blockchain-Based Authentication and Service Provision Scheme for Internet of Things
    Chen, Meijuan
    Tan, Chen
    Zhu, Xiaorong
    Zhang, Xiuxian
    2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2020,
  • [50] A Trusted Authentication Scheme Using Semantic LSTM and Blockchain in IoT Access Control System
    Zhao, Ge
    Li, Xiangrong
    Li, Hao
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2024, 20 (01)