《计算机应用》唯一官方网站 ›› 2022, Vol. 42 ›› Issue (6): 1922-1931.DOI: 10.11772/j.issn.1001-9081.2021040553
所属专题: 网络空间安全
收稿日期:2021-04-12
									
				
											修回日期:2021-07-08
									
				
											接受日期:2021-07-08
									
				
											发布日期:2022-06-22
									
				
											出版日期:2022-06-10
									
				
			通讯作者:
					李研强
							作者简介:李杨(1980—),女,山东济宁人,副研究员,硕士,主要研究方向:物联网安全、区块链基金资助:
        
                                                                                                                            Yang LI1, Long XU1, Yanqiang LI1,2( ), Shaopeng LI1
), Shaopeng LI1
			  
			
			
			
                
        
    
Received:2021-04-12
									
				
											Revised:2021-07-08
									
				
											Accepted:2021-07-08
									
				
											Online:2022-06-22
									
				
											Published:2022-06-10
									
			Contact:
					Yanqiang LI   
							About author:LI Yang,born in 1980,M. S.,associate research fellow. Her research interests include internet of things security,blockchain.Supported by:摘要:
针对传统的访问控制方法存在单点故障,不能提供可信、安全、动态化权限管理的问题,提出了一种面向无线传感器网(WSN)的基于区块链和智能合约的新型访问控制方法,以解决现有的基于区块链的访问控制方法存在的访问动态化、智能化水平不高等问题。首先,提出一种基于区块链的新型访问控制管理架构,降低网络运算开销;其次,搭建多层次智能合约体系,设计代理合约(AC)、权限管理合约(AMC)和访问控制合约(ACC),以实现对WSN的可信化、动态化的权限管理;最后,采用基于径向基函数(RBF)神经网络的动态权限生成算法,并结合访问政策动态生成访问节点的信用度阈值,实现面向WSN海量传感器的智能化、动态化的访问控制管理。实验结果表明,所提模型在WSN安全访问控制应用上具有可行性、安全性和有效性。
中图分类号:
李杨, 徐龙, 李研强, 李绍鹏. 基于智能合约的物联网访问控制架构与验证[J]. 计算机应用, 2022, 42(6): 1922-1931.
Yang LI, Long XU, Yanqiang LI, Shaopeng LI. Smart contract-based access control architecture and verification for internet of things[J]. Journal of Computer Applications, 2022, 42(6): 1922-1931.
| 代码 | 描述 | 代码 | 描述 | 
|---|---|---|---|
| Start process | Send sensor access request | ||
| Register manager | Query the ledger through the unique address | ||
| Manger registration write into the ledger | Ledger query consensus | ||
| Manager registration consensus | Query failed, request failed | ||
| Send sensor registration request | Query success through sensor request | ||
| Check whether it is the only identifier | Ledger query consensus | ||
| Ledger query consensus | Identity authentication failed, request failed | ||
| Query failed, request failed | Identity authentication success, request failed | ||
| Sensor registration write into the ledger | Authentication failure be written in the ledger | ||
| Sensor Registration consensus | Authentication failure consensus | ||
| Add the initial access policy | Monitor abnormal access | ||
| Query the ledger through the unique address | Write the abnormal access message into the ledger if any | ||
| Ledger query consensus | Abnormal access consensus | ||
| Query failed, request failed | Authentication success, get the access credit value | ||
| Write the access policy into the ledger | Get the final access result | ||
| Policy registration consensus | 
表1 系统业务流程交易描述
Tab. 1 System transaction description of operation flow
| 代码 | 描述 | 代码 | 描述 | 
|---|---|---|---|
| Start process | Send sensor access request | ||
| Register manager | Query the ledger through the unique address | ||
| Manger registration write into the ledger | Ledger query consensus | ||
| Manager registration consensus | Query failed, request failed | ||
| Send sensor registration request | Query success through sensor request | ||
| Check whether it is the only identifier | Ledger query consensus | ||
| Ledger query consensus | Identity authentication failed, request failed | ||
| Query failed, request failed | Identity authentication success, request failed | ||
| Sensor registration write into the ledger | Authentication failure be written in the ledger | ||
| Sensor Registration consensus | Authentication failure consensus | ||
| Add the initial access policy | Monitor abnormal access | ||
| Query the ledger through the unique address | Write the abnormal access message into the ledger if any | ||
| Ledger query consensus | Abnormal access consensus | ||
| Query failed, request failed | Authentication success, get the access credit value | ||
| Write the access policy into the ledger | Get the final access result | ||
| Policy registration consensus | 
| 1 | MANYIKA J, CHUI M. By 2025, Internet of things applications could have $11 trillion impact [EB/OL]. (2015-07-22) [2020-12-25].. | 
| 2 | FERRAIOLO D, CUGINI J, KUHN D R. Role-Based Access Control (RBAC): features and motivations[C/OL]// Proceedings of 11th Annual Computer Security Application Conference. [2020-12-25].. | 
| 3 | YUAN E, TONG J. Attributed Based Access Control (ABAC) for web services[C]// Proceedings of the 2005 IEEE International Conference on Web Services. Piscataway: IEEE, 2005: 561-569. 10.1109/icws.2005.25 | 
| 4 | GUSMEROLI S, PICCIONE S, ROTONDI D. IoT access control issues: a capability based approach[C]// Proceedings of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Piscataway: IEEE, 2012: 787-792. 10.1109/imis.2012.38 | 
| 5 | PARK J, SANDHU R. Towards usage control models: beyond traditional access control[C]// Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2002: 57-64. 10.1145/507711.507722 | 
| 6 | KHAN M A, SALAH K. IoT security: review, blockchain solutions, and open challenges[J]. Future Generation Computer Systems, 2018, 82: 395-411. 10.1016/j.future.2017.11.022 | 
| 7 | HAMMI M T, HAMMI B, BELLOT P, et al. Bubbles of Trust: a decentralized blockchain-based authentication system for IoT[J]. Computers and Security, 2018, 78: 126-142. 10.1016/j.cose.2018.06.004 | 
| 8 | XU R H, CHEN Y, BLASCH E, et al. BlendCAC: a smart contract enabled decentralized capability-based access control mechanism for the IoT[J]. Computers, 2018, 7(3): No.39. 10.3390/computers7030039 | 
| 9 | OUADDAH A, ABOU ELKALAM A, OUAHMAN A AIT. FairAccess: a new Blockchain‐based access control framework for the Internet of Things[J]. Security and Communication Networks, 2016, 9(18): 5943-5964. 10.1002/sec.1748 | 
| 10 | OUADDAH A, ABOU ELKALAM A, OUAHMAN A AIT. Towards a novel privacy-preserving access control model based on blockchain technology in IoT[M]// ROCHA Á, SERRHINI M, FELGUEIRAS C. Europe and MENA Cooperation Advances in Information and Communication Technologies, AISC 520. Cham: Springer, 2017: 523-533. | 
| 11 | EKBLAW A, AZARIA A, HALAMKA J D, et al. A case study for blockchain in healthcare: “MedRec” prototype for electronic health records and medical research data[R/OL]. (2016-08) [2020-12-25].. | 
| 12 | HAMMI M T, BELLOT P, SERHROUCHNI A. BCTrust: a decentralized authentication blockchain-based mechanism[C]// Proceedings of the 2018 IEEE Wireless Communications and Networking Conference. Piscataway: IEEE, 2018: 1-6. 10.1109/wcnc.2018.8376948 | 
| 13 | CUI Z, FEI X U E, ZHANG S, et al. A hybrid BlockChain-based identity authentication scheme for multi-WSN[J]. IEEE Transactions on Services Computing, 2020, 13(2): 241-251. 10.1109/tsc.2020.2964537 | 
| 14 | NOVO O. Blockchain meets IoT: an architecture for scalable access management in IoT[J]. IEEE Internet of Things Journal, 2018, 5(2): 1184-1195. 10.1109/jiot.2018.2812239 | 
| 15 | LADIA A. Privacy centric collaborative machine learning model training via blockchain[C]// Proceedings of the 2019 International Congress on Blockchain and Applications, AISC 1010. Cham: Springer, 2020: 62-70. | 
| 16 | NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL]. [2020-12-25].. 10.2139/ssrn.3440802 | 
| 17 | 曹傧,林亮,李云,等. 区块链研究综述[J]. 重庆邮电大学学报(自然科学版), 2020, 32(1):1-14. | 
| CAO B, LIN L, LI Y, et al. Review of blockchain research[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2020, 32(1): 1-14. | |
| 18 | KING S, NADAL S. PPcoin: peer-to-peer crypto-currency with proof-of-stake[EB/OL]. (2012-08-19) [2020-12-25].. | 
| 19 | CASTRO M, LISKOV B. Practical Byzantine fault tolerance[C]// Proceedings of the 3rd Symposium on Operating Systems Design and Implementation. Berkeley: USENIX Association, 1999: 173-186. 10.1109/dsn.2001.941437 | 
| 20 | SUN Y, ZHANG L, FENG G, et al. Blockchain-enabled wireless Internet of Things: performance analysis and optimal communication node deployment[J]. IEEE Internet of Things Journal, 2019, 6(3): 5791-5802. 10.1109/jiot.2019.2905743 | 
| 21 | LUU L, CHU D H, OLICKEL H, et al. Making smart contracts smarter[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2016: 254-269. 10.1145/2976749.2978309 | 
| 22 | 欧阳丽炜,王帅,袁勇,等. 智能合约:架构及进展[J]. 自动化学报, 2019, 45(3): 445-457. | 
| OUYANG L W, WANG S, YUAN Y, et al. Smart contracts: architecture and research progresses[J]. Acta Automatica Sinica, 2019, 45(3): 445-457. | |
| 23 | WOOD G. Ethereum: a secure decentralised generalised transaction ledger[EB/OL]. [2020-12-25].. | 
| 24 | ANDROULAKI E, BARGER A, BORTNIKOV V, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains[C]// Proceedings of the 13th EuroSys Conference. New York: ACM, 2018: No.30. 10.1145/3190508.3190538 | 
| 25 | LÓPEZ VIVAR A, CASTEDO A T, SANDOVAL OROZCO A L, et al. An analysis of smart contracts security threats alongside existing solutions[J]. Entropy, 2020, 22(2): No.203. 10.3390/e22020203 | 
| 26 | PINNO O J A, GREGIO A R A, DE BONA L C E. ControlChain: blockchain as a central enabler for access control authorizations in the IoT[C]// Proceedings of the 2017 IEEE Global Communications Conference. Piscataway: IEEE, 2017: 1-6. 10.1109/glocom.2017.8254521 | 
| 27 | ZHANG Y Y, KASAHARA S, SHEN Y L, et al. Smart contract-based access control for the Internet of Things[J]. IEEE Internet of Things Journal, 2019, 6(2): 1594-1605. 10.1109/jiot.2018.2847705 | 
| 28 | 杜义峰,郭渊博. 一种基于信任值的雾计算动态访问控制方法[J]. 信息网络安全, 2020, 20(4):65-72. 10.3969/j.issn.1671-1122.2020.04.008 | 
| DU Y F, GUO Y B. A dynamic access control method for fog computing based on trust value[J]. Netinfo Security, 2020, 20(4):65-72. 10.3969/j.issn.1671-1122.2020.04.008 | |
| 29 | 王海勇,潘启青,郭凯璇. 基于区块链和用户信用度的访问控制模型[J]. 计算机应用, 2020, 40(6): 1674-1679. 10.11772/j.issn.1001-9081.2019101780 | 
| WANG H Y, PAN Q Q, GUO K X. Access control model based on blockchain and user credit[J]. Journal of Computer Applications, 2020, 40(6):1674-1679. 10.11772/j.issn.1001-9081.2019101780 | |
| 30 | OUTCHAKOUCHT A, ES-SAMAALI H, LEROY J P. Dynamic access control policy based on blockchain and machine learning for the Internet of Things[J]. International Journal of Advanced Computer Science and Applications, 2017, 8(7): 417-424. 10.14569/ijacsa.2017.080757 | 
| 31 | POGGIO T, EDELMAN S. A network that learns to recognize three-dimensional objects[J]. Nature, 1990, 343(6255): 263-266. 10.1038/343263a0 | 
| 32 | YICK J, MUKHERJEE B, GHOSAL D. Wireless sensor network survey[J]. Computer Networks, 2008, 52(12): 2292-2330. 10.1016/j.comnet.2008.04.002 | 
| 33 | SHELBY Z, HARTKE K, BORMANN C. The Constrained Application Protocol (CoAP): RFC 7252 [S]. Fremont, CA: Internet Engineering Task Force, 2014-06. | 
| 34 | MURATA T. Petri nets: properties, analysis and applications[J]. Proceedings of the IEEE, 1989, 77(4): 541-580. 10.1109/5.24143 | 
| 35 | BORMANN C, CASTELLANI A P, SHELBY Z. CoAP: an application protocol for billions of tiny internet nodes[J]. IEEE Internet Computing, 2012, 16(2): 62-67. 10.1109/mic.2012.29 | 
| [1] | 陈廷伟, 张嘉诚, 王俊陆. 面向联邦学习的随机验证区块链构建[J]. 《计算机应用》唯一官方网站, 2024, 44(9): 2770-2776. | 
| [2] | 杨乐, 张达敏, 何庆, 邓佳欣, 左锋琴. 改进猎人猎物优化算法在WSN覆盖中的应用[J]. 《计算机应用》唯一官方网站, 2024, 44(8): 2506-2513. | 
| [3] | 孙晓玲, 王丹辉, 李姗姗. 基于区块链的动态密文排序检索方案[J]. 《计算机应用》唯一官方网站, 2024, 44(8): 2500-2505. | 
| [4] | 黄河, 金瑜. 基于投票和以太坊智能合约的云数据审计方案[J]. 《计算机应用》唯一官方网站, 2024, 44(7): 2093-2101. | 
| [5] | 李皎, 张秀山, 宁远航. 降低跨分片交易比例的区块链分片方法[J]. 《计算机应用》唯一官方网站, 2024, 44(6): 1889-1896. | 
| [6] | 沈涵, 王中生, 周舟, 王长元. 基于多应用场景的改进DV-Hop定位模型[J]. 《计算机应用》唯一官方网站, 2024, 44(4): 1219-1227. | 
| [7] | 赵莉朋, 郭兵. 基于BDLS的区块链共识改进算法[J]. 《计算机应用》唯一官方网站, 2024, 44(4): 1139-1147. | 
| [8] | 李欣, 保利勇, 丁洪伟, 官铮. 基于MEC服务器优先服务的路侧单元MAC层调度策略[J]. 《计算机应用》唯一官方网站, 2024, 44(4): 1227-1235. | 
| [9] | 陈美宏, 袁凌云, 夏桐. 基于主从多链的数据分类分级访问控制模型[J]. 《计算机应用》唯一官方网站, 2024, 44(4): 1148-1157. | 
| [10] | 高改梅, 张瑾, 刘春霞, 党伟超, 白尚旺. 基于区块链与CP-ABE策略隐藏的众包测试任务隐私保护方案[J]. 《计算机应用》唯一官方网站, 2024, 44(3): 811-818. | 
| [11] | 马海峰, 李玉霞, 薛庆水, 杨家海, 高永福. 用于实现区块链隐私保护的属性基加密方案[J]. 《计算机应用》唯一官方网站, 2024, 44(2): 485-489. | 
| [12] | 陈姿芊, 牛科迪, 姚中原, 斯雪明. 适用于物联网的区块链轻量化技术综述[J]. 《计算机应用》唯一官方网站, 2024, 44(12): 3688-3698. | 
| [13] | 高婷婷, 姚中原, 贾淼, 斯雪明. 链上链下一致性保护技术综述[J]. 《计算机应用》唯一官方网站, 2024, 44(12): 3658-3668. | 
| [14] | 贾淼, 姚中原, 祝卫华, 高婷婷, 斯雪明, 邓翔. 零知识证明赋能区块链的进展与展望[J]. 《计算机应用》唯一官方网站, 2024, 44(12): 3669-3677. | 
| [15] | 牛科迪, 李敏, 姚中原, 斯雪明. 面向物联网的区块链共识算法综述[J]. 《计算机应用》唯一官方网站, 2024, 44(12): 3678-3687. | 
| 阅读次数 | ||||||
| 全文 |  | |||||
| 摘要 |  | |||||