检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李井涵 沈国华[1,2,3] 杨阳 卞书钰[1] 张小玉 LI Jing-han;SHEN Guo-hua;YANG Yang;BIAN Shu-yu;ZHANG Xiao-yu(College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China;Key Laboratory of Safety-Critical Software,Ministry of Industry and Information Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China;Collaborative Innovation Center of Novel Software Technology and Industrialization,Nanjing 210093,China)
机构地区:[1]南京航空航天大学计算机科学与技术学院,南京211106 [2]南京航空航天大学高安全系统的软件开发与验证技术工业和信息化部重点实验室,南京211106 [3]软件新技术与产业化协同创新中心,南京210093
出 处:《小型微型计算机系统》2023年第8期1812-1818,共7页Journal of Chinese Computer Systems
基 金:国家自然科学基金项目(61772270)资助。
摘 要:随着物联网技术的发展,物联网呈现出分布式、动态性的特点,设备间的数据交换愈发频繁.传统的数据共享机制往往需要可信第三方实体,但这种方案存在单点故障隐患,对数据提交者不透明,数据可能遭到泄露、篡改.如何保证设备间的安全的数据共享变成一个巨大的挑战.本文提出了一种基于区块链的物联网数据安全共享机制.该机制管理设备间的访问权限和通信.利用区块链不可篡改、去中心化的特性,将设备的权限管理规则和通信管理信息存入区块中,以防恶意用户未经授权访问设备,滥用通信资源.最后,通过在本地搭建测试区块链网络,测试了在调用函数的成本消耗和在不同网络规模下的时间消耗,结果表明该机制实现对设备细粒度的访问控制,实现了安全的数据通信,通过性能测试证明了该方法的可行性。With the development of Internet of things technology,the Internet of things presents the characteristics of distribution and dynamicity,and the data exchange between devices becomes more and more frequent.Traditional data sharing mechanisms are often dependent on trusted third-party entities,but this kind of scheme may cause a single point of failure,is not transparent to the data sub-mitter,and the data may be leaked or tampered with.How to ensure the safe data sharing between devices has become a huge chal-lenge.This paper proposes a secure sharing mechanism of Internet of things data based on blockchain,which manages the access rights and communication between devices.Taking advantage of the tamper proof and decentralized characteristics of the blockchain,the au-thority management rules and communication management information of the device are stored in the block to prevent malicious users from accessing the device without authorization and abusing communication resources.Finally,by building a test blockchain network locally,the cost consumption of calling functions and the time consumption under different network scales are tested.The results show that the mechanism realizes fine-grained access control of devices and secure data communication.The feasibility of this method is proved by performance test.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7