Abstract
With the rapid development of the IoTs, the distributed access of a large number of terminals poses a serious challenge to the credibility of the system. To solve the above problems, based on the decentralized block chain technology, a terminal authentication scheme suitable for the IoT is proposed. The scheme uses block chain node to record information of terminals, the consensus mechanism is improved through key sharing algorithm, and efficient distributed authentication is realized. The simulation results show that the proposed scheme is feasible.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kan, L., Wei, Y., Hafiz Muhammad, A., Siyuan, W., Linchao, G., Kai, H.: A multiple blockchains architecture on inter-blockchain communication. In: 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Lisbon, Portugal, pp. 139–145 (2018)
Li, H.G., Tian, H.B., Zhang, F.G., He, J.J.: Blockchain-based searchable symmetric encryption scheme. Comput. Electr. Eng. 73, 32–45 (2019)
Andoni, M., Robu, V., Flynn, D., Abram, S., Geach, D., Jenkins, D., McCallum, P., Peacock, A.: Blockchain technology in the energy sector: a systematic review of challenges and opportunities. Renew. Sustain. Energy Rev. 100, 143–174 (2019)
Sun, J., Yan, J., Zhang, K.Z.K.: Blockchain-based sharing services: what blockchain technology can contribute to smart cities. Financ. Innov. 2(1), 1–9 (2016). https://doi.org/10.1186/s40854-016-0040-y
Lou, J., Zhang, Q., Qi, Z., Lei, K.: A blockchain-based key management scheme for named data networking. In: 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), Shenzhen, China, pp. 141–146 (2018)
Chang, Q., Zhang, Y.G., Qin, L.L.: A node authentication protocol based on ECC in WSN. In: International Conference on Computer Design and Applications, ICCDA 2010, vol. 2, pp. 606–609. IEEE Computer Society, Piscataway (2010)
Zou, C.Z.: Based on node ID confirmation defend DoS attacks in wireless sensor networks. J. Chin. Comput. Syst. 33(3), 486–491 (2012)
Haimabati, D., Raja, D.: Monitoring threshold cryptography based wireless sensor networks with projective plane. In: 5th International Conference on Computers and Devices for Communication (CO-DEC), Kanyakumari, India, pp. 1–4. IEEE Computer Society, Washington DC (2012)
Fromknecht, C., Velicanu, D.: CertCoin: a NameCoin based decentralized authentication system. Technical Report, 6.857 Class Project, Massachusetts Institute of Technology (2014)
Matsumoto, S., Reischuk, R.M.: IKP: turning a PKI around with decentralized automated incentives. In: Security and Privacy, pp. 410–426 (2017). https://doi.org/10.1109/sp.2017.57
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, D., Gao, X. (2020). A Blockchain Based Terminal Security of IoT. In: Tian, Y., Ma, T., Khan, M. (eds) Big Data and Security. ICBDS 2019. Communications in Computer and Information Science, vol 1210. Springer, Singapore. https://doi.org/10.1007/978-981-15-7530-3_34
Download citation
DOI: https://doi.org/10.1007/978-981-15-7530-3_34
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7529-7
Online ISBN: 978-981-15-7530-3
eBook Packages: Computer ScienceComputer Science (R0)