Page 345 - 《软件学报》2021年第8期
P. 345
魏欣 等:基于联盟链的物联网跨域认证 2627
达‘最后一公里’确保数据可信发布,而设备常以微弱的计算及安全性能暴露在大量攻击下,难以保证上链的数
据确实可信.下一步工作将针对网关及设备的信任评估及权限控制进行展开,进一步提高网络的安全性.
References:
[1] Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. In: Proc. of the Consulted. 2008. https://bitcoin.org /bitcoin.pdf
[2] Hari A, Lakshman TV. The Internet blockchain: A distributed, tamper-resistant transaction framework for the Internet. In: Proc. of
the ACM Workshop on Hot Topics in Networks. 2016. 204−210.
[3] Ali M, Nelson J, Shea R, Freedman M. Blockstack: A global naming and storage system secured by blockchains. In: Proc. of the
USENIX Annual Technical Conf. (USENIX ATC 2016). 2016. 181−194.
[4] Fromknecht C, Velicanu D, Yakoubov S. A decentralized public key infrastructure with identity retention. Technical Report, 803,
MassachusettsInstitute of Technology, 2014.
[5] Axon L, Goldsmith M. PB-PKI: A privacy-aware blockchain-based PKI. In: Proc. of the Int’l Conf. on Security and Cryptography.
2017. 311−318. [doi: 10.5220/0006419203110318]
[6] Christidis K, Devetsikiotis M. Blockchains and smart contracts for the Internet of things. IEEE Access, 2016,4:2292−2303. [doi:
10.1109/access.2016.2566339]
[7] Kshetri N. Can blockchain strengthen the Internet of things? IT Professional, 2017,19(4):68−72. [doi: 10.1109/MITP.2017.
3051335]
[8] Tseng L, Wong LW, Otoum S, Aloqaily M, Othman JB. Blockchain for managing heterogeneous Internet of things: A perspective
architecture. IEEE Network, 2020,34(1):16−23. [doi: 10.1109/MNET.001.1900103]
[9] Huh S, Cho S, Kim S. Managing IoT devices using blockchain platform. In: Proc. of the 2017 19th Int’l Conf. on Advanced
Communication Technology (ICACT). IEEE, 2017. [doi: 10.23919/ICACT.2017.7890132]
[10] Alphand O, Amoretti M, Claeys T, Dall’Asta S, Duda A, Ferrari G, Rousseau F, Tourancheau B, Veltri L, Zanichelli F. IoTChain:
A blockchain security architecture for the Internet of things. In: Proc. of the 2018 IEEE Wireless Communications and Networking
Conf. (WCNC). IEEE, 2018. [doi: 10.1109/WCNC.2018.8377385]
[11] Sharma PK, Chen MY, Park JH. A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access,
2017,6:115−124. [doi: 10.1109/ACCESS.2017.2757955]
[12] Oscar N. Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE Internet of Things Journal, 2018,5(2):
1184−1195. [doi: 10.1109/JIOT.2018.2812239]
[13] Song WB. The system of IoT identity authentication based on blockchain [MS. Thesis]. Xi’an: Xidian University, 2018 (in Chinese
with English abstract).
[14] He Y. The research and design of blockchain support platform for the Internet of things applications [MS. Thesis]. Beijing: Beijing
University of Posts and Telecommunications, 2018 (in Chinese with English abstract).
[15] Mei C. The design and implementation of IoT security platform based on blockchain [MS. Thesis]. Beijing: Beijing University of
Posts and Telecommunications, 2018 (in Chinese with English abstract).
[16] Wan YW. Research on the cross-domain authentication under the environment of the Internet of things [MS. Thesis]. Nanchang:
Nanchang University, 2018 (in Chinese with English abstract).
[17] Wang W, Hu N, Liu X. BlockCAM: A blockchain-based cross-domain authentication model. In: Proc. of the 2018 IEEE 3rd Int’l
Conf. on Data Science in Cyberspace (DSC). IEEE, 2018. [doi: 10.1109/DSC.2018.00143]
[18] Zhou ZC, Li LX, Li ZH. Efficient cross-domain authentication scheme based on blockchain technology. Journal of Computer
Applications, 2018,38(2):316−320, 326 (in Chinese with English abstract). [doi: 10.11772/j.issn.1001-9081.2017082170]
[19] Ma XT, Ma WP, Liu XX. A cross domain authentication scheme based on blockchain technology. Acta Electronica Sinica, 2018,
46(11):2571−2579 (in Chinese with English abstract). [doi: 10.3969/j.issn.0372-2112.2018.11.002]
[20] Lei A, Cruickshank H, Cao Y, Asuquo P, Ogah CPA, Sun ZL. Blockchain-based dynamic key management for heterogeneous
intelligent transportation systems. IEEE Internet of Things Journal, 2017,4(6):1832−1843. [doi: 10.1109/JIOT.2017.2740569]
[21] Thomas H, Alex P. Verifiable anonymous identities and access control in permissioned blockchains. Technical Report,
Massachusetts Institute of Technology, 2016. https://arxiv.org/pdf/1903.04584.pdf