Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (6): 1922-1931.DOI: 10.11772/j.issn.1001-9081.2021040553
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Yang LI1, Long XU1, Yanqiang LI1,2(), Shaopeng LI1
Received:
2021-04-12
Revised:
2021-07-08
Accepted:
2021-07-08
Online:
2022-06-22
Published:
2022-06-10
Contact:
Yanqiang LI
About author:
LI Yang,born in 1980,M. S.,associate research fellow. Her research interests include internet of things security,blockchain.Supported by:
通讯作者:
李研强
作者简介:
李杨(1980—),女,山东济宁人,副研究员,硕士,主要研究方向:物联网安全、区块链基金资助:
CLC Number:
Yang LI, Long XU, Yanqiang LI, Shaopeng LI. Smart contract-based access control architecture and verification for internet of things[J]. Journal of Computer Applications, 2022, 42(6): 1922-1931.
李杨, 徐龙, 李研强, 李绍鹏. 基于智能合约的物联网访问控制架构与验证[J]. 《计算机应用》唯一官方网站, 2022, 42(6): 1922-1931.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021040553
代码 | 描述 | 代码 | 描述 |
---|---|---|---|
Start process | Send sensor access request | ||
Register manager | Query the ledger through the unique address | ||
Manger registration write into the ledger | Ledger query consensus | ||
Manager registration consensus | Query failed, request failed | ||
Send sensor registration request | Query success through sensor request | ||
Check whether it is the only identifier | Ledger query consensus | ||
Ledger query consensus | Identity authentication failed, request failed | ||
Query failed, request failed | Identity authentication success, request failed | ||
Sensor registration write into the ledger | Authentication failure be written in the ledger | ||
Sensor Registration consensus | Authentication failure consensus | ||
Add the initial access policy | Monitor abnormal access | ||
Query the ledger through the unique address | Write the abnormal access message into the ledger if any | ||
Ledger query consensus | Abnormal access consensus | ||
Query failed, request failed | Authentication success, get the access credit value | ||
Write the access policy into the ledger | Get the final access result | ||
Policy registration consensus |
Tab. 1 System transaction description of operation flow
代码 | 描述 | 代码 | 描述 |
---|---|---|---|
Start process | Send sensor access request | ||
Register manager | Query the ledger through the unique address | ||
Manger registration write into the ledger | Ledger query consensus | ||
Manager registration consensus | Query failed, request failed | ||
Send sensor registration request | Query success through sensor request | ||
Check whether it is the only identifier | Ledger query consensus | ||
Ledger query consensus | Identity authentication failed, request failed | ||
Query failed, request failed | Identity authentication success, request failed | ||
Sensor registration write into the ledger | Authentication failure be written in the ledger | ||
Sensor Registration consensus | Authentication failure consensus | ||
Add the initial access policy | Monitor abnormal access | ||
Query the ledger through the unique address | Write the abnormal access message into the ledger if any | ||
Ledger query consensus | Abnormal access consensus | ||
Query failed, request failed | Authentication success, get the access credit value | ||
Write the access policy into the ledger | Get the final access result | ||
Policy registration consensus |
1 | MANYIKA J, CHUI M. By 2025, Internet of things applications could have $11 trillion impact [EB/OL]. (2015-07-22) [2020-12-25].. |
2 | FERRAIOLO D, CUGINI J, KUHN D R. Role-Based Access Control (RBAC): features and motivations[C/OL]// Proceedings of 11th Annual Computer Security Application Conference. [2020-12-25].. |
3 | YUAN E, TONG J. Attributed Based Access Control (ABAC) for web services[C]// Proceedings of the 2005 IEEE International Conference on Web Services. Piscataway: IEEE, 2005: 561-569. 10.1109/icws.2005.25 |
4 | GUSMEROLI S, PICCIONE S, ROTONDI D. IoT access control issues: a capability based approach[C]// Proceedings of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Piscataway: IEEE, 2012: 787-792. 10.1109/imis.2012.38 |
5 | PARK J, SANDHU R. Towards usage control models: beyond traditional access control[C]// Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2002: 57-64. 10.1145/507711.507722 |
6 | KHAN M A, SALAH K. IoT security: review, blockchain solutions, and open challenges[J]. Future Generation Computer Systems, 2018, 82: 395-411. 10.1016/j.future.2017.11.022 |
7 | HAMMI M T, HAMMI B, BELLOT P, et al. Bubbles of Trust: a decentralized blockchain-based authentication system for IoT[J]. Computers and Security, 2018, 78: 126-142. 10.1016/j.cose.2018.06.004 |
8 | XU R H, CHEN Y, BLASCH E, et al. BlendCAC: a smart contract enabled decentralized capability-based access control mechanism for the IoT[J]. Computers, 2018, 7(3): No.39. 10.3390/computers7030039 |
9 | OUADDAH A, ABOU ELKALAM A, OUAHMAN A AIT. FairAccess: a new Blockchain‐based access control framework for the Internet of Things[J]. Security and Communication Networks, 2016, 9(18): 5943-5964. 10.1002/sec.1748 |
10 | OUADDAH A, ABOU ELKALAM A, OUAHMAN A AIT. Towards a novel privacy-preserving access control model based on blockchain technology in IoT[M]// ROCHA Á, SERRHINI M, FELGUEIRAS C. Europe and MENA Cooperation Advances in Information and Communication Technologies, AISC 520. Cham: Springer, 2017: 523-533. |
11 | EKBLAW A, AZARIA A, HALAMKA J D, et al. A case study for blockchain in healthcare: “MedRec” prototype for electronic health records and medical research data[R/OL]. (2016-08) [2020-12-25].. |
12 | HAMMI M T, BELLOT P, SERHROUCHNI A. BCTrust: a decentralized authentication blockchain-based mechanism[C]// Proceedings of the 2018 IEEE Wireless Communications and Networking Conference. Piscataway: IEEE, 2018: 1-6. 10.1109/wcnc.2018.8376948 |
13 | CUI Z, FEI X U E, ZHANG S, et al. A hybrid BlockChain-based identity authentication scheme for multi-WSN[J]. IEEE Transactions on Services Computing, 2020, 13(2): 241-251. 10.1109/tsc.2020.2964537 |
14 | NOVO O. Blockchain meets IoT: an architecture for scalable access management in IoT[J]. IEEE Internet of Things Journal, 2018, 5(2): 1184-1195. 10.1109/jiot.2018.2812239 |
15 | LADIA A. Privacy centric collaborative machine learning model training via blockchain[C]// Proceedings of the 2019 International Congress on Blockchain and Applications, AISC 1010. Cham: Springer, 2020: 62-70. |
16 | NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL]. [2020-12-25].. 10.2139/ssrn.3440802 |
17 | 曹傧,林亮,李云,等. 区块链研究综述[J]. 重庆邮电大学学报(自然科学版), 2020, 32(1):1-14. |
CAO B, LIN L, LI Y, et al. Review of blockchain research[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2020, 32(1): 1-14. | |
18 | KING S, NADAL S. PPcoin: peer-to-peer crypto-currency with proof-of-stake[EB/OL]. (2012-08-19) [2020-12-25].. |
19 | CASTRO M, LISKOV B. Practical Byzantine fault tolerance[C]// Proceedings of the 3rd Symposium on Operating Systems Design and Implementation. Berkeley: USENIX Association, 1999: 173-186. 10.1109/dsn.2001.941437 |
20 | SUN Y, ZHANG L, FENG G, et al. Blockchain-enabled wireless Internet of Things: performance analysis and optimal communication node deployment[J]. IEEE Internet of Things Journal, 2019, 6(3): 5791-5802. 10.1109/jiot.2019.2905743 |
21 | LUU L, CHU D H, OLICKEL H, et al. Making smart contracts smarter[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2016: 254-269. 10.1145/2976749.2978309 |
22 | 欧阳丽炜,王帅,袁勇,等. 智能合约:架构及进展[J]. 自动化学报, 2019, 45(3): 445-457. |
OUYANG L W, WANG S, YUAN Y, et al. Smart contracts: architecture and research progresses[J]. Acta Automatica Sinica, 2019, 45(3): 445-457. | |
23 | WOOD G. Ethereum: a secure decentralised generalised transaction ledger[EB/OL]. [2020-12-25].. |
24 | ANDROULAKI E, BARGER A, BORTNIKOV V, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains[C]// Proceedings of the 13th EuroSys Conference. New York: ACM, 2018: No.30. 10.1145/3190508.3190538 |
25 | LÓPEZ VIVAR A, CASTEDO A T, SANDOVAL OROZCO A L, et al. An analysis of smart contracts security threats alongside existing solutions[J]. Entropy, 2020, 22(2): No.203. 10.3390/e22020203 |
26 | PINNO O J A, GREGIO A R A, DE BONA L C E. ControlChain: blockchain as a central enabler for access control authorizations in the IoT[C]// Proceedings of the 2017 IEEE Global Communications Conference. Piscataway: IEEE, 2017: 1-6. 10.1109/glocom.2017.8254521 |
27 | ZHANG Y Y, KASAHARA S, SHEN Y L, et al. Smart contract-based access control for the Internet of Things[J]. IEEE Internet of Things Journal, 2019, 6(2): 1594-1605. 10.1109/jiot.2018.2847705 |
28 | 杜义峰,郭渊博. 一种基于信任值的雾计算动态访问控制方法[J]. 信息网络安全, 2020, 20(4):65-72. 10.3969/j.issn.1671-1122.2020.04.008 |
DU Y F, GUO Y B. A dynamic access control method for fog computing based on trust value[J]. Netinfo Security, 2020, 20(4):65-72. 10.3969/j.issn.1671-1122.2020.04.008 | |
29 | 王海勇,潘启青,郭凯璇. 基于区块链和用户信用度的访问控制模型[J]. 计算机应用, 2020, 40(6): 1674-1679. 10.11772/j.issn.1001-9081.2019101780 |
WANG H Y, PAN Q Q, GUO K X. Access control model based on blockchain and user credit[J]. Journal of Computer Applications, 2020, 40(6):1674-1679. 10.11772/j.issn.1001-9081.2019101780 | |
30 | OUTCHAKOUCHT A, ES-SAMAALI H, LEROY J P. Dynamic access control policy based on blockchain and machine learning for the Internet of Things[J]. International Journal of Advanced Computer Science and Applications, 2017, 8(7): 417-424. 10.14569/ijacsa.2017.080757 |
31 | POGGIO T, EDELMAN S. A network that learns to recognize three-dimensional objects[J]. Nature, 1990, 343(6255): 263-266. 10.1038/343263a0 |
32 | YICK J, MUKHERJEE B, GHOSAL D. Wireless sensor network survey[J]. Computer Networks, 2008, 52(12): 2292-2330. 10.1016/j.comnet.2008.04.002 |
33 | SHELBY Z, HARTKE K, BORMANN C. The Constrained Application Protocol (CoAP): RFC 7252 [S]. Fremont, CA: Internet Engineering Task Force, 2014-06. |
34 | MURATA T. Petri nets: properties, analysis and applications[J]. Proceedings of the IEEE, 1989, 77(4): 541-580. 10.1109/5.24143 |
35 | BORMANN C, CASTELLANI A P, SHELBY Z. CoAP: an application protocol for billions of tiny internet nodes[J]. IEEE Internet Computing, 2012, 16(2): 62-67. 10.1109/mic.2012.29 |
[1] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. |
[2] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. |
[3] | Le YANG, Damin ZHANG, Qing HE, Jiaxin DENG, Fengqin ZUO. Application of improved hunter-prey optimization algorithm in WSN coverage [J]. Journal of Computer Applications, 2024, 44(8): 2506-2513. |
[4] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
[5] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. Consortium blockchain modification method based on chameleon hash and verifiable secret sharing [J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. |
[6] | Jiao LI, Xiushan ZHANG, Yuanhang NING. Blockchain sharding method for reducing cross-shard transaction proportion [J]. Journal of Computer Applications, 2024, 44(6): 1889-1896. |
[7] | Han SHEN, Zhongsheng WANG, Zhou ZHOU, Changyuan WANG. Improved DV-Hop localization model based on multi-scenario [J]. Journal of Computer Applications, 2024, 44(4): 1219-1227. |
[8] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. |
[9] | Xin LI, Liyong BAO, Hongwei DING, Zheng GUAN. MAC layer scheduling strategy of roadside units based on MEC server priority service [J]. Journal of Computer Applications, 2024, 44(4): 1227-1235. |
[10] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[11] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[12] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[13] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[14] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. |
[15] | Keshuo SUN, Haiying GAO, Yang SONG. Multi-authority attribute-based encryption scheme for private blockchain over public blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3699-3708. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||