Page 345 - 《软件学报》2021年第8期
P. 345

魏欣  等:基于联盟链的物联网跨域认证                                                             2627


                 达‘最后一公里’确保数据可信发布,而设备常以微弱的计算及安全性能暴露在大量攻击下,难以保证上链的数
                 据确实可信.下一步工作将针对网关及设备的信任评估及权限控制进行展开,进一步提高网络的安全性.

                 References:
                 [1]    Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. In: Proc. of the Consulted. 2008. https://bitcoin.org /bitcoin.pdf
                 [2]    Hari A, Lakshman TV. The Internet blockchain: A distributed, tamper-resistant transaction framework for the Internet. In: Proc. of
                     the ACM Workshop on Hot Topics in Networks. 2016. 204−210.
                 [3]    Ali M, Nelson J, Shea R, Freedman M. Blockstack: A global naming and storage system secured by blockchains. In: Proc. of the
                     USENIX Annual Technical Conf. (USENIX ATC 2016). 2016. 181−194.
                 [4]    Fromknecht C, Velicanu D, Yakoubov S. A decentralized public key infrastructure with identity retention. Technical Report, 803,
                     MassachusettsInstitute of Technology, 2014.
                 [5]    Axon L, Goldsmith M. PB-PKI: A privacy-aware blockchain-based PKI. In: Proc. of the Int’l Conf. on Security and Cryptography.
                     2017. 311−318. [doi: 10.5220/0006419203110318]
                 [6]    Christidis K, Devetsikiotis M. Blockchains and smart contracts for the Internet of things. IEEE Access, 2016,4:2292−2303. [doi:
                     10.1109/access.2016.2566339]
                 [7]    Kshetri  N.  Can blockchain  strengthen the  Internet of things? IT Professional,  2017,19(4):68−72. [doi: 10.1109/MITP.2017.
                     3051335]
                 [8]    Tseng L, Wong LW, Otoum S, Aloqaily M, Othman JB. Blockchain for managing heterogeneous Internet of things: A perspective
                     architecture. IEEE Network, 2020,34(1):16−23. [doi: 10.1109/MNET.001.1900103]
                 [9]    Huh S,  Cho S,  Kim S.  Managing IoT devices using blockchain platform. In: Proc. of  the  2017 19th Int’l  Conf. on  Advanced
                     Communication Technology (ICACT). IEEE, 2017. [doi: 10.23919/ICACT.2017.7890132]
                [10]    Alphand O, Amoretti M, Claeys T, Dall’Asta S, Duda A, Ferrari G, Rousseau F, Tourancheau B, Veltri L, Zanichelli F. IoTChain:
                     A blockchain security architecture for the Internet of things. In: Proc. of the 2018 IEEE Wireless Communications and Networking
                     Conf. (WCNC). IEEE, 2018. [doi: 10.1109/WCNC.2018.8377385]
                [11]    Sharma PK, Chen MY, Park JH. A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access,
                     2017,6:115−124. [doi: 10.1109/ACCESS.2017.2757955]
                [12]    Oscar N. Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE Internet of Things Journal, 2018,5(2):
                     1184−1195. [doi: 10.1109/JIOT.2018.2812239]
                [13]    Song WB. The system of IoT identity authentication based on blockchain [MS. Thesis]. Xi’an: Xidian University, 2018 (in Chinese
                     with English abstract).
                [14]    He Y. The research and design of blockchain support platform for the Internet of things applications [MS. Thesis]. Beijing: Beijing
                     University of Posts and Telecommunications, 2018 (in Chinese with English abstract).
                [15]    Mei C. The design and implementation of IoT security platform based on blockchain [MS. Thesis]. Beijing: Beijing University of
                     Posts and Telecommunications, 2018 (in Chinese with English abstract).
                [16]    Wan YW. Research on the cross-domain authentication under the environment of the Internet of things [MS. Thesis]. Nanchang:
                     Nanchang University, 2018 (in Chinese with English abstract).
                [17]    Wang W, Hu N, Liu X. BlockCAM: A blockchain-based cross-domain authentication model. In: Proc. of the 2018 IEEE 3rd Int’l
                     Conf. on Data Science in Cyberspace (DSC). IEEE, 2018. [doi: 10.1109/DSC.2018.00143]
                [18]    Zhou ZC, Li LX, Li ZH. Efficient cross-domain authentication  scheme  based  on  blockchain technology. Journal  of Computer
                     Applications, 2018,38(2):316−320, 326 (in Chinese with English abstract). [doi: 10.11772/j.issn.1001-9081.2017082170]
                [19]    Ma XT, Ma WP, Liu XX. A cross domain authentication scheme based on blockchain technology. Acta Electronica Sinica, 2018,
                     46(11):2571−2579 (in Chinese with English abstract). [doi: 10.3969/j.issn.0372-2112.2018.11.002]
                [20]    Lei A, Cruickshank H, Cao Y, Asuquo  P, Ogah CPA,  Sun ZL. Blockchain-based dynamic key management  for  heterogeneous
                     intelligent transportation systems. IEEE Internet of Things Journal, 2017,4(6):1832−1843. [doi: 10.1109/JIOT.2017.2740569]
                [21]    Thomas H, Alex  P. Verifiable anonymous  identities and access control  in  permissioned  blockchains. Technical Report,
                     Massachusetts Institute of Technology, 2016. https://arxiv.org/pdf/1903.04584.pdf
   340   341   342   343   344   345   346   347   348