Internet of Things security access control method based on blockchain and fog node reputation

A security access control, blockchain technology, applied in the field of IoT security access control

Active Publication Date: 2021-09-10
厦门吉快科技有限公司
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the Internet of Things environment, there is almost no research on cloud computing access control based on blockchain and fog computing. meaning and practical value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things security access control method based on blockchain and fog node reputation
  • Internet of Things security access control method based on blockchain and fog node reputation
  • Internet of Things security access control method based on blockchain and fog node reputation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The present invention will be described in detail below in combination with specific embodiments.

[0058] The technical solution adopted in the present invention is a secure access control method for the Internet of Things based on blockchain and fog node reputation, which is specifically implemented according to the following steps:

[0059] Step 1, perform fog node registration, cloud node registration, cloud node registration cloud service, IoT device registration;

[0060] The details of fog node registration are:

[0061] The fog node calls the fogRegister() function to register the fog node. The function of the fogRegister() function is to add the Ethereum address, reputation value, and the Ethereum addresses of all IoT devices managed by the fog node to the fog node. The registered fog node is :fogRegister(E FN ,C FN , L IoTD ), where E FN is the Ethereum address of the fog node, and is the unique identifier of the fog node in the access control system; C ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Things security access control method based on a blockchain and fog node reputation. The method specifically comprises the following steps: carrying out fog node and cloud node registration, cloud service and Internet of Things equipment registration; enabling the Internet of Things equipment to initiate a request signal for accessing the cloud service to the proxy fog node; enabling the fog node to verify the identities of the Internet of Things equipment, the cloud node and the fog node after receiving the request signal of the Internet of Things equipment; detecting whether the reputation value of the fog node is qualified or not and whether the request behavior is legal or not, and if yes, sending a request of the fog node with a digital signature to the cloud node; enabling the cloud node to transmit the cloud service data to the server of the proxy fog node after verification; and enabling the server of the proxy fog node to transmit the data to the Internet of Things equipment. According to the invention, the Ethereum intelligent contract technology realizes decentration and expandable Internet of Things access control in a blockchain network, and the security of access control of Internet of Things equipment is ensured through a reputation mechanism and a behavior detection mechanism.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to an Internet of Things security access control method based on blockchain and fog node reputation. Background technique [0002] With the rapid development of IoT technology, the number of IoT devices is increasing exponentially. Although the Internet of Things technology has brought many conveniences to people's lives, the massive growth of Internet of Things devices has brought great challenges to the security and scalability of cloud computing. Traditional cloud computing access control is mostly based on centralized authorization methods, which are not only difficult to manage a large number of growing IoT devices, but also resource-constrained IoT devices are easily controlled by hackers and attack cloud servers (such as : distributed denial-of-service attack) causes a single point of failure and privacy disclosure of the system. [0003] Since the inherent new f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L63/08H04L63/1416H04L63/1458H04L63/10H04L9/3252H04L67/12
Inventor 王尚平高宇波张亚玲
Owner 厦门吉快科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products