Font Size: a A A

Design And Implementation Of Network Endogenous Security Authentication System Based On Blockchain

Posted on:2022-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:W C ZhangFull Text:PDF
GTID:2518306341954859Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the advent of 5G communications,the Internet of Things has ushered in rapid development.A variety of sensory IoT devices continuously collect sensing data and transmit it to the cloud server for calculation and processing.This centralized processing mode brings a heavy burden to the cloud server and combines edge network computing capabilities.The fog wireless access network came into being.In the fog wireless access network,the traditional terminal authentication scheme relies too much on a third-party organization.If the third-party organization encounters a malicious attack,the entire network will face collapse.In addition,the sensor nodes of the terminal layer are often placed in unsupervised environments,and there are security problems such as privacy leakage,forged nodes,and data tampering.The improvement of the security performance of the fog wireless access network needs to develop in the direction of connotation and self-generation,that is,"endogenous".Endogenous security emphasizes the security capabilities that continue to grow from the information system.The "credibility enhancement" and "intelligent consensus" of endogenous security are very consistent with the consensus idea of the blockchain.The decentralization and anti-tampering characteristics of the blockchain can also solve the problem of over-reliance on third-party institutions in traditional authentication schemes.Therefore,the blockchain technology provides a new endogenous security authentication scheme for the fog wireless access network.Solutions.Aiming at the problems of insufficient endogenous security capabilities in the current network and excessive reliance on third-party institutions,this article combines the idea of blockchain and uses smart contracts to implement an endogenous network security authentication system.The main research contents are as follows:(1)Propose a "cloud-fog-terminal" system architecture:According to the structure of the fog wireless access network,this paper proposes a three-tier system architecture of "cloud-fog-terminal" based on the blockchain.This architecture has a decentralized feature,which effectively solves the problem of excessive reliance on third-party institutions in traditional authentication schemes.(2)Design a credible registration mechanism and authentication mechanism:Aiming at the problem that the terminal is relatively weak and easy to be attacked,this paper designs an identity registration mechanism and a terminal access authentication mechanism to support the registration and authentication of trusted devices,and realize the connection between different fogging devices.The effect of high-efficiency security authentication at entry point.(3)Design a consensus authentication mechanism based on fog nodes.Aiming at the problem of excessive cloud server load,this paper uses the fog nodes of the fog layer to form a blockchain network,and realizes the consensus and storage of perception data through a consensus authentication mechanism.This mechanism not only reduces the dependence on cloud servers but also enhances the system’s endogenous security capabilities.(4)Design and implement an endogenous security authentication system based on blockchain:This paper combines the identity registration mechanism,terminal access authentication mechanism and consensus authentication mechanism to construct an endogenous security authentication system.At the same time,the system encrypts the attribute base Combined with IPFS,it realizes the safe sharing of information while protecting the private information of the equipment.Tests show that the system meets the requirements of endogenous safety.
Keywords/Search Tags:identity authentication, blockchain, f-ran, endogenous safety, privacy protection
PDF Full Text Request
Related items