检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:吴斌 严建峰[1] WU Bin;YAN Jian-feng(School of Computer Science and Technology,Soochow University,Jiangsu Suzhou 215006,China)
机构地区:[1]苏州大学计算机科学与技术学院,江苏苏州215006
出 处:《计算机仿真》2021年第1期277-281,共5页Computer Simulation
基 金:国家自然科学基金资助项目(61572339)。
摘 要:针对网络接入终端自身安全性较差,易被攻击等问题,提出基于区块链技术的分布式可信网络接入认证方法。根据区块链技术,采用数据层、网络层、共识层以及合约层架构分布式网络框架,整合全部树结构特征的树形数据结构、P2P拓扑结构、有向无环图共识结构以及设定自动执行脚本的智能合约,构建物联网分布式网络框架;将网络运营商设定分布式网络节点,采用哈希函数将终端编号与密钥信息存储于本地文件中,利用树形结构遍历搜索,判别终端可信度,采用创建的匿名接入算法,双向验证可信网络状态。仿真结果表明,所提方法可有效提升接入终端的安全性能,且接入时延较短。Due to low security of network access terminals,this paper presented a distributed trustworthy network access authentication method based on blockchain technology.According to the blockchain technology,the distributed network framework was constructed by data layer,network layer,consensus layer and contract layer.Firstly,the tree-shaped data structure,P2 P topology,consensus structure of directed acyclic graph in all tree structure features were integrated with the smart contracts with automatic script to build the IoT distributed network framework.Secondly,the network operators were set as the distributed network nodes,and Hash functions were adopted to store the terminal number and key information in the local file.Moreover,the traversal search of tree structure was used to judge the credibility of the terminal.Finally,the anonymous access algorithm was used to verify the trusted network state in two ways.The simulation results prove that the proposed method can effectively improve the security of access terminals,and the access delay is short.
关 键 词:区块链技术 物联网 有向无环图 智能合约 分布式网络
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222