Blockchain Based Credibility Verification Method for IoT Entities

被引:41
作者
Qu, Chao [1 ]
Tao, Ming [1 ]
Zhang, Jie [1 ]
Hong, Xiaoyu [1 ]
Yuan, Ruifen [1 ]
机构
[1] Dongguan Univ Technol, Sch Comp Sci & Network Secur, Dongguan 523808, Peoples R China
基金
国家重点研发计划;
关键词
ACCESS-CONTROL; SMART HOMES; SECURITY; INTERNET; THINGS; CLOUD; NETWORKS; FRAMEWORK; PRIVACY; SCHEME;
D O I
10.1155/2018/7817614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the fast development of mobile Internet, Internet of Things (IoT) has been found in many important applications recently. However, it still faces many challenges in security and privacy. Blockchain (BC) technology, which underpins the cryptocurrency Bitcoin, has played an important role in the development of decentralized and data intensive applications running on millions of devices. In this paper, to establish the relationship between IoT and BC for device credibility verification, we propose a framework with layers, intersect, and self-organization Blockchain Structures (BCS). In this new framework, each BCS is organized by Blockchain technology. We describe the credibility verification method and show how it provide the verification. The efficiency and security analysis are also given in this paper, including its response time, storage efficiency, and verification. The conducted experiments have been shown to demonstrate the validity of the proposed method in satisfying the credible requirement achieved by Blockchain technology and certain advantages in storage space and response time.
引用
收藏
页数:11
相关论文
共 41 条
[1]  
[Anonymous], 2018, 2018 IEEE MTT S INT
[2]  
[Anonymous], 2016, PROC ACM SIGSAC C CO
[3]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[4]   Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks [J].
Chen, Jing ;
He, Kun ;
Yuan, Quan ;
Xue, Guoliang ;
Du, Ruiying ;
Wang, Lina .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (06) :1530-1543
[5]   Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks [J].
Chen, Jing ;
He, Kun ;
Du, Ruiying ;
Zheng, Minghui ;
Xiang, Yang ;
Yuan, Quan .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (02) :423-433
[6]   Lattice-based linearly homomorphic signatures in the standard model [J].
Chen, Wenbin ;
Lei, Hao ;
Qi, Ke .
THEORETICAL COMPUTER SCIENCE, 2016, 634 :47-54
[7]   Blockchains and Smart Contracts for the Internet of Things [J].
Christidis, Konstantinos ;
Devetsikiotis, Michael .
IEEE ACCESS, 2016, 4 :2292-2303
[8]  
Dorri Ali, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P618, DOI 10.1109/PERCOMW.2017.7917634
[9]   Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels [J].
Fan, Lisheng ;
Lei, Xianfu ;
Yang, Nan ;
Duong, Trung Q. ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (08) :7599-7603
[10]   Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference [J].
Fan, Lisheng ;
Lei, Xianfu ;
Yang, Nan ;
Duong, Trung Q. ;
Karagiannidis, George K. .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) :1494-1505