Master-slave chain based trusted cross-domain authentication mechanism in IoT

被引:40
作者
Guo, Shaoyong [1 ]
Wang, Fengning [1 ]
Zhang, Neng [1 ]
Qi, Feng [1 ]
Qiu, Xuesong [1 ]
机构
[1] BUPT, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Trusted authentication; IoT; Blockchain; Master-slave chain; Cross domain;
D O I
10.1016/j.jnca.2020.102812
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Internet of Thing (IoT), more and more IoT devices have accessed to the IoT system, and the IoT architecture has evolved from vertical integration to horizontal structure, which causes the devices from different systems or different IoT domains can not trust each other in process of interacting. How to ensure the authentication between different system and domain in IoT has become an urgent problem to be solved. This paper proposes a master-slave chain based trusted cross-domain authentication mechanism in IoT to improve the efficiency and credibility of authentication. In this system, a master-slave blockchain architecture supporting distributed cross-domain authentication is designed. Then, an improved Byzantine Fault Tolerance based on reputation value model (RIBFT)is proposed for trusted authentication and data traceability. The se-curity and performance analysis show that our scheme could effectively improve the efficiency and credibility of authentication for IoT devices. In addition, the model is also used in practical applications.
引用
收藏
页数:11
相关论文
共 20 条
[1]  
Almadhoun R, 2018, I C COMP SYST APPLIC
[2]  
Biswas AR, 2014, 2014 IEEE WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P375, DOI 10.1109/WF-IoT.2014.6803194
[3]   Two-Tier Permission-ed and Permission-less Blockchain for Secure Data Sharing [J].
Cash, Michael ;
Bassiouni, Mostafa .
2018 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2018, :138-144
[4]  
Fotiou Nikos, 2019, INTERACTING INTERNET
[5]   A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [J].
Hassija, Vikas ;
Chamola, Vinay ;
Saxena, Vikas ;
Jain, Divyansh ;
Goyal, Pranav ;
Sikdar, Biplab .
IEEE ACCESS, 2019, 7 :82721-82743
[6]   Towards A Novel Architecture for Enabling Interoperability Amongst Multiple Blockchains [J].
Jin, Hai ;
Dai, Xiaohai ;
Xiao, Jiang .
2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, :1203-1211
[7]  
Lau CS, 2018, IEEE CPMT SYMP JAP, P1, DOI 10.1109/ICSJ.2018.8602610
[8]  
Liang XF, 2019, 2019 34RD YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), P464, DOI [10.1109/YAC.2019.8787720, 10.1109/yac.2019.8787720]
[9]   A Multiple Blockchains Architecture On Inter-Blockchain Communication [J].
Luo, Kan ;
Yu, Wei ;
Amjad, Hafiz Muhammad ;
Wang, Siyuan ;
Gao, LingChao ;
Hu, Kai .
2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, :139-145
[10]   Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario [J].
Ma, Mingxin ;
Shi, Guozhen ;
Li, Fenghua .
IEEE ACCESS, 2019, 7 :34045-34059