Loading…
Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System
As the great prevalence of various Internet of Things (IoT) terminals, how to solve the problem of isolated information among different IoT platforms attracts attention from both academia and industry. It is necessary to establish a trusted access system to achieve secure authentication and collabor...
Saved in:
Published in: | IEEE transactions on industrial informatics 2020-03, Vol.16 (3), p.1972-1983 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | As the great prevalence of various Internet of Things (IoT) terminals, how to solve the problem of isolated information among different IoT platforms attracts attention from both academia and industry. It is necessary to establish a trusted access system to achieve secure authentication and collaborative sharing. Therefore, this article proposes a distributed and trusted authentication system based on blockchain and edge computing, aiming to improve authentication efficiency. This system consists of physical network layer, blockchain edge layer and blockchain network layer. Through the blockchain network, an optimized practical Byzantine fault tolerance consensus algorithm is designed to construct a consortium blockchain for storing authentication data and logs. It guarantees trusted authentication and achieves activity traceability of terminals. Furthermore, edge computing is applied in blockchain edge nodes, to provide name resolution and edge authentication service based on smart contracts. Meanwhile, an asymmetric cryptography is designed, to prevent connection between nodes and terminals from being attacked. And a caching strategy based on edge computing is proposed to improve hit ratio. Our proposed authentication mechanism is evaluated with respect to communication and computation costs. Simulation results show that the caching strategy outperforms existing edge computing strategies by 6%-12% in terms of average delay, and 8%-14% in hit ratio. |
---|---|
ISSN: | 1551-3203 1941-0050 |
DOI: | 10.1109/TII.2019.2938001 |