Check patentability & draft patents in minutes with Patsnap Eureka AI!

Internet-of-Things-oriented access control system and method based on smart contract

An access control and smart contract technology, applied in the field of Internet of Things, can solve problems such as information leakage, low cost, sensor network damage, etc., and achieve the effect of dynamic authority management and intelligent management

Active Publication Date: 2021-03-02
山东山科安全科技有限公司
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The inventors of the present disclosure found that the wireless sensor network is a multi-hop, self-organized network that organizes and combines massive sensor nodes in a free manner through wireless communication technology, and can coordinate real-time sensing, collection and processing of perception of network coverage. Object information is transmitted wirelessly after information processing, and sent to users in a multi-hop self-organizing manner; usually, sensors in wireless sensor networks have the characteristics of limited computing and storage capacity, low cost, and low security, so sensor nodes are easily affected by the outside world. Intrusion, leading to information leakage or sensor network damage, traditional access control methods can no longer fully meet the security access requirements of a large number of IoT sensors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-of-Things-oriented access control system and method based on smart contract
  • Internet-of-Things-oriented access control system and method based on smart contract
  • Internet-of-Things-oriented access control system and method based on smart contract

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] Such as figure 1 As shown, Embodiment 1 of the present disclosure provides an access control system for wireless sensor networks based on smart contracts, including: wireless sensor networks WSNs (Wireless sensor networks), management module (Manager), block chain (Blockchain network ) and Smart Contract (Smart Contract) four modules.

[0058] Wireless Sensor Networks (WSNs): WSNs organize and combine massive sensor nodes into a multi-hop, self-organizing network in a free manner through wireless communication technology, which can coordinate real-time sensing, collection and processing of sensing objects in the network coverage area. Information is transmitted wirelessly after information processing, and sent to users in a multi-hop self-organizing manner. Generally, WSN sensors have the characteristics of limited computing and storage capacity, low cost, and low security, so sensor nodes are vulnerable to external intrusion, resulting in information leakage or sensor...

Embodiment 2

[0080] Such as figure 2 As shown, Embodiment 2 of the present disclosure provides an access control method based on smart contracts for the Internet of Things. AC, AMC, and ACC represent proxy contracts, authority management contracts, and access control contracts, respectively, and are deployed in adjacent blocks , including the following steps:

[0081] The proxy contract (AC) sends an access policy request to the access control contract (ACC);

[0082] After the access control contract obtains the request, obtain from the authority management contract (AMC) whether there is an abnormal access event (such as frequent access, wrong address, etc.), and if it is normal, it will feed back to the proxy contract access policy;

[0083] If it is abnormal, the access control contract sends a credit value request to the rights management contract, and the rights management contract invokes the RBF algorithm to self-learn the access record, generate an access threshold (credit), and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an Internet-of-Things-oriented intelligent contract-based access control system and method. The system comprises a management module and a plurality of intelligent contracts deployed on a block chain, wherein each intelligent contract comprises: a proxy contract for managing registration information and obtaining access permission from an access control contract; an access control contract which is used for managing an access policy, obtaining an authority threshold of the authority management contract, and feeding back an access authority result to the agent contract; an authority management contract which is used for identifying an access exception event and calling a machine learning algorithm to obtain an access authority threshold value of the target sensing equipment; and a management module which is used for constructing an information link between the sensor and the block chain, allocating an address to the sensor and configuring an initial access policyof an access object for the access control contract. According to the invention, malicious nodes or abnormal access requests can be effectively identified through an access object credit evaluation mode based on the RBF neural network, and dynamic authority management is realized.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet of Things, and in particular to an access control system and method based on smart contracts for the Internet of Things. Background technique [0002] The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art. [0003] With the rapid development of the Internet of Things technology, the number of sensors connected to the Internet of Things has increased exponentially. However, a large number of Internet of Things devices have bottlenecks such as limited resources, massive connections, and poor security performance, which have brought great security risks to the Internet of Things. In recent years, In the past, security attacks on the Internet of Things occurred frequently, which seriously threatened the security and privacy of users and the security of the basic network environment. For example...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/122H04W12/06H04W84/18H04L9/32H04L29/06H04L29/08G06Q40/04G06N20/00G16Y40/50
CPCH04W12/06H04W84/18H04L63/10H04L9/3247H04L67/1095H04L63/1441H04L63/1458H04L63/145G06Q40/04G06N20/00G16Y40/50H04L67/133
Inventor 李杨刘建翔李绍鹏薛莹殷艳华
Owner 山东山科安全科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More