About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Advanced Hybrid Information Processing. Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21–22, 2019, Proceedings, Part II

Research Article

IoT Security Access Authentication Method Based on Blockchain

Download(Requires a free EAI acccount)
2 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-36405-2_24,
        author={Yang Cheng and Min Lei and Shiyou Chen and Zigang Fang and Shuaipeng Yang},
        title={IoT Security Access Authentication Method Based on Blockchain},
        proceedings={Advanced Hybrid Information Processing. Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21--22, 2019, Proceedings, Part II},
        proceedings_a={ADHIP PART 2},
        year={2019},
        month={11},
        keywords={IoT Access authentication Blockchain},
        doi={10.1007/978-3-030-36405-2_24}
    }
    
  • Yang Cheng
    Min Lei
    Shiyou Chen
    Zigang Fang
    Shuaipeng Yang
    Year: 2019
    IoT Security Access Authentication Method Based on Blockchain
    ADHIP PART 2
    Springer
    DOI: 10.1007/978-3-030-36405-2_24
Yang Cheng1,*, Min Lei1, Shiyou Chen1, Zigang Fang1, Shuaipeng Yang1
  • 1: Information Security Center
*Contact email: chengyangmc@bupt.edu.cn

Abstract

With the rapid development of Internet of Things (IoT), The IoT terminal are diversified, and the attack points available to attackers are also diversified, and most IoT terminal are more vulnerable to attacks because they are less secure. In order to achieve secure access of IoT terminal, ensure the legality of IoT terminal accessing the network, improve the security of terminal entering the network and reduce the security risks that IoT terminal may be exposed to when accessing the platform. This paper proposes a secure method to access to the IoT, which is to use the blockchain to store and verify the fingerprint information of the terminal, thereby improving the security of the IoT terminal accessing the cloud. And this paper also proposes a method to store the fingerprint blockchain of the terminal in the IoT terminal, and then verify the collected fingerprint information through the data in the blockchain to ensure the credibility of the fingerprint information.

Keywords
IoT Access authentication Blockchain
Published
2019-11-29
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-36405-2_24
Copyright © 2019–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL