CN113381975B - 基于区块链与雾节点信誉的物联网安全访问控制方法 - Google Patents
基于区块链与雾节点信誉的物联网安全访问控制方法 Download PDFInfo
- Publication number
- CN113381975B CN113381975B CN202110506100.1A CN202110506100A CN113381975B CN 113381975 B CN113381975 B CN 113381975B CN 202110506100 A CN202110506100 A CN 202110506100A CN 113381975 B CN113381975 B CN 113381975B
- Authority
- CN
- China
- Prior art keywords
- node
- request
- internet
- cloud
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000001514 detection method Methods 0.000 claims abstract description 17
- 230000006870 function Effects 0.000 claims description 92
- 238000012795 verification Methods 0.000 claims description 18
- 239000003795 chemical substances by application Substances 0.000 claims description 15
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 claims description 14
- 239000003595 mist Substances 0.000 claims description 9
- 238000004891 communication Methods 0.000 claims description 6
- 230000000977 initiatory effect Effects 0.000 claims description 6
- 125000004122 cyclic group Chemical group 0.000 claims description 3
- 235000005039 Brassica rapa var. dichotoma Nutrition 0.000 claims description 2
- LFQSCWFLJHTTHZ-UHFFFAOYSA-N Ethanol Chemical compound CCO LFQSCWFLJHTTHZ-UHFFFAOYSA-N 0.000 claims description 2
- 244000130745 brown sarson Species 0.000 claims description 2
- 230000000694 effects Effects 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 16
- 230000007246 mechanism Effects 0.000 abstract description 10
- 230000006399 behavior Effects 0.000 description 35
- 238000004364 calculation method Methods 0.000 description 8
- 238000007726 management method Methods 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000009956 central mechanism Effects 0.000 description 2
- 238000007728 cost analysis Methods 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Telephonic Communication Services (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
恶意级别 | 恶意行为 | C<sub>i</sub>(C<sub>i</sub>>0) |
Level 1(良好) | 无 | 0 |
Level 2(限制) | DDOS | A |
Level 3(恶意) | Identity Theft | B |
Level 4(严重) | DOS | C |
文献 | 去中心化 | 不可篡改 | 可拓展性 | 不可否认 |
Wang | √ | × | × | × |
Li | × | √ | √ | × |
Miao | √ | × | √ | √ |
Feng | √ | √ | × | √ |
本文 | √ | √ | √ | √ |
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110506100.1A CN113381975B (zh) | 2021-05-10 | 2021-05-10 | 基于区块链与雾节点信誉的物联网安全访问控制方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110506100.1A CN113381975B (zh) | 2021-05-10 | 2021-05-10 | 基于区块链与雾节点信誉的物联网安全访问控制方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113381975A CN113381975A (zh) | 2021-09-10 |
CN113381975B true CN113381975B (zh) | 2022-08-23 |
Family
ID=77572448
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110506100.1A Active CN113381975B (zh) | 2021-05-10 | 2021-05-10 | 基于区块链与雾节点信誉的物联网安全访问控制方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113381975B (zh) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114189381B (zh) * | 2021-12-10 | 2023-08-01 | 哈尔滨工程大学 | 一种Tor匿名通信网络恶意出口中继节点识别方法 |
CN113992721B (zh) * | 2021-12-24 | 2022-04-01 | 中国电力科学研究院有限公司 | 一种智能终端管控方法、***、设备及存储介质 |
CN114679330B (zh) * | 2022-03-31 | 2024-05-17 | 四川链向科技集团有限公司 | 一种基于区块链的万物互联数据访问控制方法 |
CN114826703B (zh) * | 2022-04-11 | 2024-04-05 | 江苏大学 | 基于区块链的数据搜索细粒度访问控制方法及*** |
CN115150132B (zh) * | 2022-06-13 | 2024-04-30 | 桂林电子科技大学 | 一种基于以太坊gas的联盟链抗DDOS攻击方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110377672A (zh) * | 2019-06-04 | 2019-10-25 | 西安邮电大学 | 基于信任管理的实时地图更新***及方法、车联网终端 |
CN111079136A (zh) * | 2019-11-07 | 2020-04-28 | 北京科技大学 | 一种基于区块链技术的雾计算入侵检测特征共享*** |
CN111372243A (zh) * | 2020-03-18 | 2020-07-03 | 南京邮电大学 | 基于雾联盟链的安全分布式聚合与访问***及方法 |
CN112132447A (zh) * | 2020-09-21 | 2020-12-25 | 江苏省未来网络创新研究院 | 一种基于区块链的算力网络信任评估与保障算法 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190281028A1 (en) * | 2018-03-06 | 2019-09-12 | Michael Thomas Gillan | System and method for decentralized authentication using a distributed transaction-based state machine |
CN109918878B (zh) * | 2019-04-24 | 2021-03-02 | 中国科学院信息工程研究所 | 一种基于区块链的工业物联网设备身份认证及安全交互方法 |
US20200374127A1 (en) * | 2019-05-21 | 2020-11-26 | The University Of Akron | Blockchain-powered cloud management system |
CN111147228B (zh) * | 2019-12-28 | 2022-04-01 | 西安电子科技大学 | 基于以太坊IoT实体轻量级认证方法、***、智能终端 |
-
2021
- 2021-05-10 CN CN202110506100.1A patent/CN113381975B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110377672A (zh) * | 2019-06-04 | 2019-10-25 | 西安邮电大学 | 基于信任管理的实时地图更新***及方法、车联网终端 |
CN111079136A (zh) * | 2019-11-07 | 2020-04-28 | 北京科技大学 | 一种基于区块链技术的雾计算入侵检测特征共享*** |
CN111372243A (zh) * | 2020-03-18 | 2020-07-03 | 南京邮电大学 | 基于雾联盟链的安全分布式聚合与访问***及方法 |
CN112132447A (zh) * | 2020-09-21 | 2020-12-25 | 江苏省未来网络创新研究院 | 一种基于区块链的算力网络信任评估与保障算法 |
Non-Patent Citations (3)
Title |
---|
EIDM: A Ethereum-Based Cloud User Identity Management Protocol;S. Wang;《IEEE Access》;20191231;全文 * |
基于区块链与边缘计算的物联网数据管理;程冠杰等;《物联网学报》;20200512(第02期);全文 * |
开放雾计算参考架构安全问题初探;邹晶晶等;《电子产品世界》;20200504(第05期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN113381975A (zh) | 2021-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113381975B (zh) | 基于区块链与雾节点信誉的物联网安全访问控制方法 | |
CN110086822B (zh) | 面向微服务架构的统一身份认证策略的实现方法及*** | |
CN109714173B (zh) | 一种基于区块链的物联网认证方法与装置 | |
CN108471432B (zh) | 防止网络应用程序接口被恶意攻击的方法 | |
WO2019209610A1 (en) | Blockchain-based admission processes for protected entities | |
Wainakh et al. | Enhancing privacy via hierarchical federated learning | |
US20120167210A1 (en) | Method and system for estimating the reliability of blacklists of botnet-infected computers | |
Li et al. | Providing privacy-aware incentives in mobile sensing systems | |
WO2020037781A1 (zh) | 一种实现服务器防攻击方法及装置 | |
CN114143343B (zh) | 雾计算环境中远程访问控制***、控制方法、终端及介质 | |
Aishwarya et al. | Intrusion detection system-An efficient way to thwart against Dos/DDos attack in the cloud environment | |
Huang et al. | An authentication scheme to defend against UDP DrDoS attacks in 5G networks | |
CN115603987A (zh) | 一种云边端融合的电力信息通信***跨域零信任认证*** | |
CN114297304A (zh) | 一种产品信息区块链交易存储方法、服务器及可读介质 | |
CN111611614A (zh) | 基于区块链的抗恶意审计者的云存储公开审计方法及*** | |
CN114781006A (zh) | 基于区块链和sgx的外包数据完整性审计方法及*** | |
CN111260348A (zh) | 一种车联网中基于智能合约的公平支付***及其工作方法 | |
CN110572392A (zh) | 一种基于Hyperledger网络的身份认证方法 | |
Yu et al. | A lightweight mechanism to mitigate application layer DDoS attacks | |
Lai et al. | A survey on security threats and solutions of bitcoin | |
US11818097B2 (en) | Packet watermark with static salt and token validation | |
Raji et al. | Secure forensic data transmission system in cloud database using fuzzy based butterfly optimization and modified ECC | |
CN114915534A (zh) | 面向信任增强的网络部署架构及其网络访问方法 | |
Jog | Data importance and feedback based adaptive level of authorization for the security of Internet of Things | |
CN108494805B (zh) | 一种cc攻击的处理方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220808 Address after: Room 701, No. 65, Chengyi North Street, Phase III, Software Park, Torch High-tech Zone, Xiamen, Fujian 361000 Applicant after: Xiamen jikuai Technology Co.,Ltd. Address before: 710000 No. B49, Xinda Zhongchuang space, 26th Street, block C, No. 2 Trading Plaza, South China City, international port district, Xi'an, Shaanxi Province Applicant before: Xi'an Huaqi Zhongxin Technology Development Co.,Ltd. Effective date of registration: 20220808 Address after: 710000 No. B49, Xinda Zhongchuang space, 26th Street, block C, No. 2 Trading Plaza, South China City, international port district, Xi'an, Shaanxi Province Applicant after: Xi'an Huaqi Zhongxin Technology Development Co.,Ltd. Address before: 710048 Shaanxi province Xi'an Beilin District Jinhua Road No. 5 Applicant before: XI'AN University OF TECHNOLOGY |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A secure access control method for the Internet of Things based on blockchain and fog node reputation Granted publication date: 20220823 Pledgee: Agricultural Bank of China Limited Xiamen Pilot Free Trade Zone Branch Pledgor: Xiamen jikuai Technology Co.,Ltd. Registration number: Y2024980005198 |