基于联盟链的物联网动态数据溯源机制
作者:
作者单位:

作者简介:

乔蕊(1983-),女,河南周口人,副教授,CCF学生会员,主要研究领域为信息安全;曹琰(1983-),男,博士,讲师,CCF专业会员,主要研究领域为信息安全;王清贤(1960-),男,教授,博士生导师,CCF高级会员,主要研究领域为信息安全.

通讯作者:

乔蕊,E-mail:18033023@qq.com

中图分类号:

基金项目:

国家重点研发计划(2016YFB0800203);河南省高校科技创新团队支持计划(17IRTSTHN009)


Traceability Mechanism of Dynamic Data in Internet of Things Based on Consortium Blockchain
Author:
Affiliation:

Fund Project:

National Key R&D Project of China (2016YFB0800203); Program for Innovative Research Team (in Science and Technology) in University of Henan Province (17IRTSTHN009)

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    物联网动态数据安全保护的重点是拒绝非授权用户的篡改,实现对物联网动态数据操作的过程留痕和追踪溯源.为解决大量物联网设备产生的动态数据安全存储与共享问题,建立了物联网动态数据存储安全问题的数学模型,提出了用于实现操作实体多维授权与动态数据存储的双联盟链结构,设计了基于验证节点列表的共识算法,给出了一种基于联盟链的动态数据溯源机制优化方案.进行了分析及实验,物联网操作实体个数小于106,操作实体授权特征值位数取64时,攻击者篡改授权的概率几乎为0,验证了所提方案具有较强的抵抗双重输出攻击、重放攻击及隐藏攻击的能力,能够有效杜绝攻击者对物联网动态数据的篡改、伪造等非授权访问操作,具有较好的应用价值.

    Abstract:

    The focus of dynamic data security protection of IoT (Internet of things) is to reject tampering of unauthorized users, meanwhile, to realize the process in evidence and track tracing of the dynamic data operation of IoT. In order to solve the problems such as secure storage and sharing of dynamic data generated by a large number of IoT devices, firstly, a mathematical model for the security of dynamic data storage was established, as well as dual consortium chain structure is proposed to realize multidimensional authorization and dynamic data storage of operational entities. Then, a consensus algorithm based on VNL (verification nodes list) was proposed. After that, an optimization scheme of dynamic data traceability mechanism based on consortium block chain was put forward. Finally, through open experiments and performance analysis, it shows that when the eigenvalue of the operation entity authorization is 64 and the number of IoT operation entities is less than 106, the succeed probability of the attacker is almost 0. Meanwhile the proposed scheme can effectively avoid potential attacks on dynamic data, such as double output attacks, replay attacks and hidden attacks and so on. Thus it can effectively prevent the attackers from unauthorized manipulation of the IoT, such as tampering or counterfeiting under approved accession mode. The scheme has good application value while ensuring the dynamic data storage security.

    参考文献
    相似文献
    引证文献
引用本文

乔蕊,曹琰,王清贤.基于联盟链的物联网动态数据溯源机制.软件学报,2019,30(6):1614-1631

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2018-06-25
  • 最后修改日期:2018-10-12
  • 录用日期:
  • 在线发布日期: 2019-03-28
  • 出版日期:
您是第位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号