编辑: 鱼饵虫 2013-04-22
软件学报 ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscas.

ac.cn Journal of Software,2019,30(6):1632?1648 [doi: 10.13328/j.cnki.jos.005740] http://www.jos.org.cn ?中国科学院软件研究所版权所有. Tel: +86-10-62562563 物联网下的区块链访问控制综述 ? 史锦山 1,2 , 李茹1,2

1 (内蒙古大学 计算机学院,内蒙古 呼和浩特 010021)

2 (内蒙古自治区无线网络与移动计算重点实验室(内蒙古大学),内蒙古 呼和浩特 010021) 通讯作者: 李茹, E-mail: csliru@imu.edu.cn 摘要: 随着物联网的不断发展,物联网的隐私保护问题引起了人们的重视,而访问控制技术是保护隐私的重要 方法之一.物联网访问控制模型多基于中央可信实体的概念构建.去中心化的区块链技术解决了中心化模型带来的 安全隐患.从物联网自身环境特点出发,提出物联网终端节点设备轻量级、 物联网海量终端节点和物联网动态性这

3 个物联网下访问控制必须要解决的问题.然后,以这

3 个问题为核心,分析、总结了现有物联网中主流访问控制模型 以及使用区块链后的访问控制模型分别是怎么解决这些问题的.最后总结出两类区块链访问控制模型以及将区块 链用于物联网访问控制中的优势,并对基于区块链的物联网访问控制在未来需要解决的问题进行了展望. 关键词: 区块链;

物联网;

访问控制;

智能合约;

隐私保护 中图法分类号: TP309 中文引用格式: 史锦山,李茹.物联网下的区块链访问控制综述.软件学报,2019,30(6):1632?1648. http://www.jos.org.cn/1000- 9825/5740.htm 英文引用格式: Shi JS, Li R. Survey of blockchain access control in Internet of things. Ruan Jian Xue Bao/Journal of Software, 2019,30(6):1632?1648 (in Chinese). http://www.jos.org.cn/1000-9825/5740.htm Survey of Blockchain Access Control in Internet of Things SHI Jin-Shan1,2 , LI Ru1,2

1 (College of Computer Science, Inner Mongolia University, Hohhot 010021, China)

2 (Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing (Inner Mongolia University), Hohhot 010021, China) Abstract: With the development of the Internet of things, the privacy protection of the IoT has attracted people'

s attention, and access control technology is one of the important methods of privacy protection. The IoT access control model is based on the concept of a central trusted entity. The decentralized blockchain technology solves the security risks brought by the centralized model. This study proposes three issues that must be resolved according to the characteristics of the IoT environment. These three issues are: (1) IoT terminal device lightweight;

(2) IoT has a large number of terminal nodes;

and (3) dynamic issues under the IoT. Then, using these three issues as the core, it is analyzed and summarized that how the mainstream access control model in the existing IoT and blockchain-based access control model solves these problems. Finally, two types of blockchain access control models and the advantages of using blockchain for IoT access control are summarized, as well as the problems that need to be solved in the future for blockchain and IoT access control. Key words: blockchain;

Internet of things;

access control;

smart contract;

privacy protection 自1999 年麻省理工学院 Ashton 教授首次提出物联网概念发展至今,物联网已经可以实现物与物、 物与人、 ? 基金项目: 国家自然科学基金(61862046, 61363079) Foundation item: National Natural Science Foundation of China (61862046, 61363079) 本文由区块链与数字货币技术专题特约编辑斯雪明教授和陈文光教授推荐. 收稿时间: 2018-06-25;

下载(注:源文件不在本站服务器,都将跳转到源网站下载)
备用下载
发帖评论
相关话题
发布一个新话题