首页 | 本学科首页   官方微博 | 高级检索  
     

基于区块链的物联网认证机制综述
引用本文:程冠杰,邓水光,温盈盈,严学强,赵明宇. 基于区块链的物联网认证机制综述[J]. 软件学报, 2023, 34(3): 1470-1490
作者姓名:程冠杰  邓水光  温盈盈  严学强  赵明宇
作者单位:浙江大学 计算机科学与技术学院, 浙江 杭州 310027;华为技术有限公司, 上海 201206
基金项目:浙江省重点研发项目(2022C01145);国家自然科学基金(U20A20173,62125206)
摘    要:随着物联网(Internet of Things, IoT)技术的高速发展,各类智能设备数量激增,身份认证成为保障IoT安全的首要需求.区块链作为一种分布式账本技术,提供了去信任的协作环境和安全的数据管理平台,使用区块链技术驱动IoT认证成为学术界和工业界关注的热点.基于云计算和云边协同两种架构分析IoT身份认证机制设计的主要需求,总结区块链技术应用于IoT场景面临的挑战;梳理现有IoT身份认证机制的工作,并将其归结为基于密钥的认证、基于证书的认证和基于身份的认证;分析应用区块链技术的IoT认证工作,并根据认证对象和附加属性对相关文献进行归纳和总结.从形式化和非形式化两个方向总结基于区块链的IoT认证机制的安全性分析方法.最后展望了未来研究方向.

关 键 词:物联网  区块链  身份认证  多层认证  边缘计算
收稿时间:2021-08-02
修稿时间:2021-11-12

Survey on Blockchain-based Internet of Things Authentication Mechanisms
CHENG Guan-Jie,DENG Shui-Guang,WEN Ying-Ying,YAN Xue-Qiang,ZHAO Ming-Yu. Survey on Blockchain-based Internet of Things Authentication Mechanisms[J]. Journal of Software, 2023, 34(3): 1470-1490
Authors:CHENG Guan-Jie  DENG Shui-Guang  WEN Ying-Ying  YAN Xue-Qiang  ZHAO Ming-Yu
Affiliation:College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China;Huawei Technologies Co. Ltd., Shanghai 201206, China
Abstract:With the rapid development of the Internet of Things (IoT), the number of smart devices has increased sharply, and identity authentication becomes the primary requirement for ensuring IoT security. Blockchain, as a distributed ledger technology, provides a trusted collaboration environment and a secure data management platform. The utilization of blockchain technology to drive IoT authentication has been a hotspot in academia and industry. This study analyzes the main requirements of authentication mechanism design based on cloud computing and cloud-edge collaboration and summarizes the challenges in applying blockchain technology to IoT scenarios. Relevant research on IoT authentication mechanisms is presented and classified into three categories of key-based authentication, certificate-based authentication, and identity-based authentication. Moreover, the existing IoT authentication studies using blockchain technology are analyzed, and related literature is reviewed according to authentication objects and additional attributes. This study also summarizes the security analysis method for the blockchain-based IoT authentication mechanism from formal and informal perspectives and finally points out the prospect of the technology.
Keywords:Internet of Things (IoT)  blockchain  identity authentication  multi-layer authentication  edge computing
本文献已被 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号