Abstract
With the rapid development of Internet of Things (IoT), The IoT terminal are diversified, and the attack points available to attackers are also diversified, and most IoT terminal are more vulnerable to attacks because they are less secure. In order to achieve secure access of IoT terminal, ensure the legality of IoT terminal accessing the network, improve the security of terminal entering the network and reduce the security risks that IoT terminal may be exposed to when accessing the platform. This paper proposes a secure method to access to the IoT, which is to use the blockchain to store and verify the fingerprint information of the terminal, thereby improving the security of the IoT terminal accessing the cloud. And this paper also proposes a method to store the fingerprint blockchain of the terminal in the IoT terminal, and then verify the collected fingerprint information through the data in the blockchain to ensure the credibility of the fingerprint information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, pp. 839–858. IEEE (2016)
Ouaddah, A., Elkalam, A.A., Ouahman, A.A.: Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Rocha, Á., Serrhini, M., Felgueiras, C. (eds.) Europe and MENA Cooperation Advances in Information and Communication Technologies. AISC, vol. 520, pp. 523–533. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46568-5_53
Ouaddah, A., Elkalam, A.A., Ouahman, A.A.: A new blockchain-based access control framework for the internet of things. Secur. Commun. Netw. 9(18), 5943–5964 (2016)
Di Francesco Maesa, D., Mori, P., Ricci, L.: Blockchain based access control. In: Chen, L.Y., Reiser, H.P. (eds.) DAIS 2017. LNCS, vol. 10320, pp. 206–220. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59665-5_15
Le, T., Mutka, M.W: CapChain: a privacy preserving access control framework based on blockchain for pervasive environments. In: 2018 IEEE International Conference on Smart Computing (2018)
Pinno, O.J.A., Gregio, A.R.A., De Bona, L.C.E.: ControlChain: blockchain as a central enabler for access control authorizations in the IoT. In: 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, pp. 1–6. IEEE (2017)
Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized BlockChain for IoT. In: 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), Pittsburgh, PA, pp. 173–178. IEEE (2017)
Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)
Lunardi, R.C., Michelin, R.A., Neu, C.V., Zorzo, A.F.: Distributed access control on IoT ledger-based architecture. In: 2018 IEEE/IFIP Network Operations and Management Symposium, NOMS 2018, Taipei, pp. 1–7. IEEE (2018)
Ourad, A.Z., Belgacem, B., Salah, K.: Using blockchain for IOT access control and authentication management. In: Georgakopoulos, D., Zhang, L.-J. (eds.) ICIOT 2018. LNCS, vol. 10972, pp. 150–164. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94370-1_11
Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., Wan, J.: Smart contract-based access control for the internet of things. IEEE Internet Things J. 6(2), 1594–1605 (2019)
Bao, Z., Shi, W., He, D., Chood, K.K.R.: A three-tier blockchain-based IoT security architecture (2018)
Acknowledgments
This work is supported by the National Key R&D Program of China (2017YFB0802703), National Natural Science Foundation of China grant (U1836205), Major Scientific and Technological Special Project of Guizhou Province (20183001), Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data (2018BDKFJJ014), Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data (2018BDKFJJ019) and Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data (2018BDKFJJ022).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Cheng, Y., Lei, M., Chen, S., Fang, Z., Yang, S. (2019). IoT Security Access Authentication Method Based on Blockchain. In: Gui, G., Yun, L. (eds) Advanced Hybrid Information Processing. ADHIP 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 302. Springer, Cham. https://doi.org/10.1007/978-3-030-36405-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-36405-2_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36404-5
Online ISBN: 978-3-030-36405-2
eBook Packages: Computer ScienceComputer Science (R0)