ABSTRACT
The real-name registration management of the Internet of Things (IoT) card is of great significance to the security development of the Internet of Things and the security construction of Cyberspace. However, IoT cards are decoupled from people in the circulation process, are often "re-sold", data sharing is difficult in cross-departmental circulation, and data quality is low. But the IoT card is the key for things to connect to the Cyberspace. The traceable management of the IoT card can ensure the identity analysis of Machines, Things, and People in the Cyberspace. This paper gives us a solution based on blockchain and secure terminals. With this solution, we can promote the data on the chain of each transaction chain effectively, improves the accuracy and effectiveness of the collected information, realizes the joint participation and system co-governance of different responsible entities, and improves the IoT card Real-name registration rate, the management ability to the network, etc. Experiments have fully proved the effectiveness, reliability, and advancement of the system, which has a massive role in accelerating the improvement of the comprehensive level of network security technology and helping the construction of a cyberspace integrity system.
- H. Wu, H. Han, X. Wang and S. Sun, "Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey," in IEEE Access, vol. 8, pp. 153826-153848, 2020, doi: 10.1109/ACCESS.2020.3018170.Google ScholarCross Ref
- Brown, Jason. "Multiple subscription subscriber identity module (SIM) card." U.S. Patent No. 7,613,480. 3 Nov. 2009.Google Scholar
- Ahmed, Syed Ishtiaque, "Privacy, security, and surveillance in the Global South: A study of biometric mobile SIM registration in Bangladesh." Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2017.Google Scholar
- Ramachandran, Gowri Sankar, Kwame-Lante Wright, and Bhaskar Krishnamachari. "Trinity: A Distributed Publish/Subscribe Broker with Blockchain-based Immutability." arXiv preprint arXiv:1807.03110 (2018).Google Scholar
- Shi Jinshan, Li Ru, Song Tingting. The Internet of Things Access Control Architecture Based on Blockchain[J/OL]. Computer Application:1-13[2019-12-18].Google Scholar
- Zhou Jiafa, Ma Tao, Li Yifa. Analysis of PKI, CPKI, BC performance [J]. Journal of Information Engineering University, 2005(03): 26-31.Google Scholar
- Wang Haibo, Ma Jinwei. A new model of financial technology supervision: a study on the development path of the "law chain" model [J]. Finance and Economy, 2019(09): 39-43.Google Scholar
- Huang Zeyuan, Kong Yongping, Zhang Huiyan. Research on the security technology of the Internet of Things based on blockchain[J]. Mobile Communications, 2018, 42(12): 8-13.Google Scholar
- Min Xurong, Du Kui, Dai Yicong. Design of electronic certificate sharing platform based on blockchain technology[J]. Command Information System and Technology, 2017, 8(02): 47-51.Google Scholar
- The encryption industry responds to the social media ban-a revolution in the advertising industry based on blockchain https://36kr.com/p/5131783Google Scholar
- Efanov, Dmitry, and Pavel Roschin. "The all-pervasiveness of the blockchain technology." Procedia Computer Science 123 (2018): 116-121.Google ScholarCross Ref
- Iliya Zaki (2019, January 3rd) . Do Companies Actually Need Blockchain? https://hackernoon.com/do-companies-actually-need-blockchain-df8aea80d98dGoogle Scholar
- Stathakopoulou, Chrysoula, Tudor David, and Marko Vukolić. "Mir-bft: High-throughput BFT for blockchains." arXiv preprint arXiv:1906.05552 (2019).Google Scholar
- Sukhwani, Harish, "Performance modeling of PBFT consensus process for permissioned blockchain network (hyperledger fabric)." 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS). IEEE, 2017.Google Scholar
- Han Xuan, Liu Yamin. Research on consensus mechanism in blockchain technology[J]. Information Network Security, 2017(09):147-152.Google Scholar
- Suda, Hiroshi. "Point-of-sale terminal." U.S. Patent No. 5,481,094. 2 Jan. 1996. .Google Scholar
Recommendations
IOT Security Issues Via Blockchain: A Review Paper
ICBCT '19: Proceedings of the 2019 International Conference on Blockchain TechnologyIn the past few years block chain has gained lot of popularity because blockchain is the core technology of bitcoin. Its utilization cases are growing in number of fields such as security of Internet of Things (IoT), banking sector, industries and ...
IoT and Blockchain combined: for decentralized security
AbstractBlockchain technology, a version of distributed ledger technology, has been grabbing a huge amount of attention in fields beyond its roots in crypto-currencies: blockchain and finance, blockchain and logistics, blockchain and the Internet of ...
IoT-Gov: an IoT governance framework using the blockchain
AbstractInternet of Things (IoT) has become an essential technology in different daily life domains including health, industry and finance among many others. The implementation of IoT systems requires different underlying technologies such as applications,...
Comments