首页 | 本学科首页   官方微博 | 高级检索  
     

物联网下的区块链访问控制综述
引用本文:史锦山,李茹.物联网下的区块链访问控制综述[J].软件学报,2019,30(6):1632-1648.
作者姓名:史锦山  李茹
作者单位:内蒙古大学 计算机学院, 内蒙古 呼和浩特 010021;内蒙古自治区无线网络与移动计算重点实验室(内蒙古大学), 内蒙古 呼和浩特 010021,内蒙古大学 计算机学院, 内蒙古 呼和浩特 010021;内蒙古自治区无线网络与移动计算重点实验室(内蒙古大学), 内蒙古 呼和浩特 010021
基金项目:国家自然科学基金(61862046,61363079)
摘    要:随着物联网的不断发展,物联网的隐私保护问题引起了人们的重视,而访问控制技术是保护隐私的重要方法之一.物联网访问控制模型多基于中央可信实体的概念构建.去中心化的区块链技术解决了中心化模型带来的安全隐患.从物联网自身环境特点出发,提出物联网终端节点设备轻量级、物联网海量终端节点和物联网动态性这3个物联网下访问控制必须要解决的问题.然后,以这3个问题为核心,分析、总结了现有物联网中主流访问控制模型以及使用区块链后的访问控制模型分别是怎么解决这些问题的.最后总结出两类区块链访问控制模型以及将区块链用于物联网访问控制中的优势,并对基于区块链的物联网访问控制在未来需要解决的问题进行了展望.

关 键 词:区块链  物联网  访问控制  智能合约  隐私保护
收稿时间:2018/6/25 0:00:00
修稿时间:2018/10/12 0:00:00

Survey of Blockchain Access Control in Internet of Things
SHI Jin-Shan and LI Ru.Survey of Blockchain Access Control in Internet of Things[J].Journal of Software,2019,30(6):1632-1648.
Authors:SHI Jin-Shan and LI Ru
Affiliation:College of Computer Science, Inner Mongolia University, Hohhot 010021, China;Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing (Inner Mongolia University), Hohhot 010021, China and College of Computer Science, Inner Mongolia University, Hohhot 010021, China;Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing (Inner Mongolia University), Hohhot 010021, China
Abstract:With the development of the Internet of things, the privacy protection of the IoT has attracted people''s attention, and access control technology is one of the important methods of privacy protection. The IoT access control model is based on the concept of a central trusted entity. The decentralized blockchain technology solves the security risks brought by the centralized model. This study proposes three issues that must be resolved according to the characteristics of the IoT environment. These three issues are:(1) IoT terminal device lightweight; (2) IoT has a large number of terminal nodes; and (3) dynamic issues under the IoT. Then, using these three issues as the core, it is analyzed and summarized that how the mainstream access control model in the existing IoT and blockchain-based access control model solves these problems. Finally, two types of blockchain access control models and the advantages of using blockchain for IoT access control are summarized, as well as the problems that need to be solved in the future for blockchain and IoT access control.
Keywords:blockchain  Internet of things  access control  smart contract  privacy protection
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号