Abstract
With the development of 5G and the Internet of things (IoT), the multi-domain access of massive devices brings serious data security and privacy issues. At the same time, most access systems lack the ability to identify network attacks and cannot adopt dynamic and timely defenses against various security threats. To this end, we propose a blockchain-based access control and behavior regulation system for IoT. Relying on the attribute-based access control model, this system deploys smart contracts on the blockchain to achieve distributed and fine-grained access control and ensures that the identity and authority of access users can be trusted. At the same time, an inter-domain communication mechanism is designed based on the locator/identifier separation protocol and ensures the traffic of access users are authorized. A feedback module that combines traffic detection and credit evaluation is proposed, ensuring real-time detection and fast, proactive responses against malicious behavior. Ultimately, all modules are linked together through workflows to form an integrated security model. Experiments and analysis show that the system can effectively provide comprehensive security protection in IoT scenarios.
Funder
the Fundamental Research Funds for the Central Universities
National Key R&D Program of China
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference34 articles.
1. Efficient Cache Consistency Management for Transient IoT Data in Content-Centric Networking;Feng;IEEE Internet Things J.,2022
2. Kumar, S., Rathore, R.S., Mahmud, M., Kaiwartya, O., and Lloret, J. (2022). BEST—Blockchain-Enabled Secure and Trusted Public Emergency Services for Smart Cities Environment. Sensors, 22.
3. Enabling Machine Learning with Service Function Chaining for Security Enhancement at 5G Edges;Feng;IEEE Netw.,2021
4. Liu, M., Yang, C., Li, H., and Zhang, Y. (2020). An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks. Sensors, 20.
5. Lindqvist, H. (2006). Mandatory Access Control. [Master’s Thesis, Umea University].
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献