DAG blockchain-based lightweight authentication and authorization schemefor IoT devices br
【Author】 Wang, Shangping; Li, Huan; Chen, Juanjuan; Wang, Jifang; Deng, Yingjuan
【Source】JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
【影响因子】4.960
【Abstract】As the extension and expansion of the Internet, the Internet of things (IoT) connects things with thenetwork through information sensing equipment to achieve intelligent identification, positioning, monitoring,management and other functions. With the increasing number of IoT users and devices, the demands forsecure communication and data confidentiality are getting higher and higher, and the identity authenticationand access control of IoT devices has become a huge challenge. In the IoT environment, the traditional deviceidentity and access management methods based on public key infrastructure (PKI) and blockchain bring theproblems of single point failure and scalability. The emergence of decentralized storage system and distributedledger technology directed acyclic graph (DAG) provide new ideas to solve these problems. In the paper, we usedistributed ledger technology IOTA with low energy demand to design a lightweight and scalable mechanism tomanage the identity of IoT devices and access control of large-scale IoT data, so as to ensure source reliabilityand sharing security of IoT data. In the new scheme, IOTA technology is used to realize the functions ofregistration, update, revocation and retrieval of the identity of IoT devices, which solves the defects caused bycentralized management. Inter planetary file system (IPFS) is used to store a large amount of data generated bydevices in the IoT, which not only reduces the burden on devices and systems of IoT, but also solves the singlepoint of failure, delay and other problems caused by traditional cloud storage. At the same time, the fog nodeis used to provide localized computing for a group of IoT devices to solve the problem of limited computingresources of IoT devices. In addition, in order to prevent data abuse caused by unauthorized devices accessingnetwork resources, a trusted access control mechanism is designed to achieve fine-grained access control, accesspolicy update and other functions, so as to better maintain the IoT environment and network security. Finally,the performance of the proposed scheme is evaluated through simulation experiments, and the security andfunctions of the scheme are analyzed, which proves that the scheme meets the security demands of the IoTenvironment.
【Keywords】Internet of Things; IOTA; IPFS; Fog computing; Identity management; Access control; Security
【发表时间】2022 MAY
【收录时间】2022-05-27
【文献类型】理论性文章
【主题类别】
区块链技术-协同技术-物联网
评论