
Research Article
IoT Security Access Authentication Method Based on Blockchain
@INPROCEEDINGS{10.1007/978-3-030-36405-2_24, author={Yang Cheng and Min Lei and Shiyou Chen and Zigang Fang and Shuaipeng Yang}, title={IoT Security Access Authentication Method Based on Blockchain}, proceedings={Advanced Hybrid Information Processing. Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21--22, 2019, Proceedings, Part II}, proceedings_a={ADHIP PART 2}, year={2019}, month={11}, keywords={IoT Access authentication Blockchain}, doi={10.1007/978-3-030-36405-2_24} }
- Yang Cheng
Min Lei
Shiyou Chen
Zigang Fang
Shuaipeng Yang
Year: 2019
IoT Security Access Authentication Method Based on Blockchain
ADHIP PART 2
Springer
DOI: 10.1007/978-3-030-36405-2_24
Abstract
With the rapid development of Internet of Things (IoT), The IoT terminal are diversified, and the attack points available to attackers are also diversified, and most IoT terminal are more vulnerable to attacks because they are less secure. In order to achieve secure access of IoT terminal, ensure the legality of IoT terminal accessing the network, improve the security of terminal entering the network and reduce the security risks that IoT terminal may be exposed to when accessing the platform. This paper proposes a secure method to access to the IoT, which is to use the blockchain to store and verify the fingerprint information of the terminal, thereby improving the security of the IoT terminal accessing the cloud. And this paper also proposes a method to store the fingerprint blockchain of the terminal in the IoT terminal, and then verify the collected fingerprint information through the data in the blockchain to ensure the credibility of the fingerprint information.