物联网学报 ›› 2020, Vol. 4 ›› Issue (2): 70-77.doi: 10.11959/j.issn.2096-3750.2020.00167

所属专题: 区块链

• 专题:区块链赋能物联网 • 上一篇    下一篇

基于区块链的分布式物联网设备身份认证机制研究

谭琛,陈美娟(),Amuah Ebenezer Ackah   

  1. 南京邮电大学通信与信息工程学院,江苏 南京 210003
  • 修回日期:2020-05-09 出版日期:2020-06-30 发布日期:2020-06-12
  • 作者简介:谭琛(1995- ),男,江苏徐州人,南京邮电大学硕士生,主要研究方向为区块链技术和物联网等|陈美娟(1971- ),女,陕西咸阳人,博士,南京邮电大学副教授,主要研究方向为异构无线网络资源管理、区块链技术以及SDN/NFV技术等|Amuah Ebenezer Ackah(1987- ),男,加纳人,南京邮电大学博士生,主要研究方向为物联网、区块链以及MIMO等
  • 基金资助:
    国家自然科学基金资助项目(61871237);江苏省重点研发计划(BE2019017)

Research on distributed identity authentication mechanism of IoT device based on blockchain

Chen TAN,Meijuan CHEN(),Ebenezer ACKAH Amuah   

  1. College of Telecommunications and Information Engineering,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
  • Revised:2020-05-09 Online:2020-06-30 Published:2020-06-12
  • Supported by:
    The National Natural Science Foundation of China(61871237);The Key R&D Plan of Jiangsu Province(BE2019017)

摘要:

为了解决物联网集中式平台在设备身份认证过程中兼容性低、抗攻击能力弱等问题,提出了一种基于区块链的分布式物联网设备身份认证架构。将数字身份等信息存入新型区块数据结构中,并根据密码学相关知识提出了分布式物联网设备身份认证机制,设计了设备数字证书颁发和身份认证的详细流程。从各实体间的权力约束、设备隐私性保护、抵御攻击能力等方面对所提机制进行了安全性分析,并对比分析了安全属性、计算开销和存储开销3个方面的性能。结果表明,所提出的身份认证机制可以抵御多种恶意攻击,能够实现高度安全的分布式物联网身份认证,并且在性能方面具有一定优势。

关键词: 区块链, 物联网, 分布式, 身份认证, 密码学

Abstract:

Aiming to solve problems of the low compatibility and weak anti-attack ability of the Internet of things (IoT) centralized platform in the device identity authentication process,a blockchain-based distributed IoT device identity authentication architecture was proposed.The digital identity and related information were stored in the new block data structure,and a distributed IoT device identity authentication mechanism was proposed based on the cryptography related knowledge.At the same time,a device digital certificate issuance process and a detailed process of the identity authentication were designed.The security analysis of the proposed mechanism were carried out from the aspects of power constraints,device privacy protection,and ability to resist attacks among various entities.The performance of three aspects,which were security attributes,computational overhead and storage overhead,were compared and analyzed.The results show that the proposed identity authentication mechanism can resist a variety of malicious attacks,achieve highly secure distributed IoT identity authentication,and has certain advantages in the performance.

Key words: blockchain, Internet of things, distributed, identity authentication, cryptography

中图分类号: 

No Suggested Reading articles found!