期刊文献+

一种基于区块链技术的多阶段级联无线安全认证方案 被引量:10

Multi-stage Cascade Wireless Security Authentication Scheme Based on Blockchain Technology
在线阅读 下载PDF
导出
摘要 区块链技术具有去中心化、去信任、匿名、数据不可篡改等优势。为了更有效地保证用户能够安全识别并连接无线网络,文中提出了一种基于区块链技术的多阶段级联无线安全认证方案(MWSASB)。MWSASB方案设计多阶段级联协议过程,即注册阶段、登录与认证阶段以及交易阶段,并利用工作量证明机制PoW算法和延长最长链的方法,将用户信息产生交易记录在不可篡改且去中心化的区块链账本中。首先,在注册阶段,用户输入注册信息,在去中心化网络中利用密码学技术以及共识机制使得注册信息存储在区块链的每一个节点上;同时,在登录与认证阶段,用户输入登录信息,用户与区块链服务器进行登录与认证,在认证成功后以同样的方式将登录信息存储在区块链的每一个节点上。其次,在交易阶段,利用共识机制确保注册信息和登录与认证信息以交易形式安全记录在区块链中。最后,对MWSASB方案进行安全性和运算量分析。实验结果表明,在安全性方面,MWSASB方案具有无线安全认证等安全属性,有效避免了各种常见的网络攻击,如中间人攻击、DDoS攻击等;在运算量方面,利用区块链不可篡改机制,使用密码学算法和共识机制进行加密认证,能有效减少运算次数,提升安全认证效率。 Blockchain technology has the advantages of decentralization,trust removal,anonymity and non-tamperable.In order to more effectively ensure that users can safely identify and connect to the wireless network,this paper proposed a multi-stage cascade wireless security authentication scheme(MWSASB)based on blockchain technology.The MWSASB program designs a multi-stage cascade protocol process:registration phase,login and certification phase,and transaction phase.And it records the transaction of users’information in the non-tamper and decentralized blockchain ledger by using workload proof and the extension of the longest chain.Firstly,during the registration phase,the user enters the registration information Then the cryptographic technology and the consensus mechanism are used to store the registration information on each node of the blockchain in the decentralized network.At the same time,during the login and authentication phase,the user inputs the login information,then login and authenticate with the blockchain server.After successful authentication the login information is also stored on each node of the blockchain.Secondly,in the transaction phase,the registration information and the login and authentication information are used to ensure that their information are securely recorded in the blockchain in the form of transactions.Finally,the security and computation of the MWSASB are analyzed.The results show that the MWSASB has security attributes such as wireless security authentication and can effectively avoid various common network attacks such as man-in-the-middle attacks,DDoS attacks,etc.In terms of computation,blockchain cannot be tampered with and cryptographic algorithm and consensus mechanism can be used for encryption verification,which can effectively reduce the number of calculations and improve the efficiency of security authentication.
作者 胡兆鹏 丁卫平 高瞻 朱晓辉 王杰华 HU Zhao-peng;DING Wei-ping;GAO Zhan;ZHU Xiao-hui;WANG Jie-hua(College of Computer Science and Technology,Nantong University,Nantong,Jiangsu 226019,China)
出处 《计算机科学》 CSCD 北大核心 2019年第12期180-185,共6页 Computer Science
基金 江苏省六大人才高峰项目(XYDXXJS-048) 南通市应用基础研究计划项目(GY12016015)资助
关键词 区块链 去中心化 无线安全认证 多阶段级联 共识机制 Blockchain Decentralization Wireless security authentication Multi-stage cascade Consensus mechanism
  • 相关文献

参考文献9

二级参考文献55

  • 1高岩,程胜利.构筑网络安全通道—虚拟专用网技术[J].交通与计算机,2001,19(z1):30-32. 被引量:2
  • 2李晓瑾,童恒庆.一次性口令认证技术的改进[J].电脑开发与应用,2004,17(9):28-29. 被引量:12
  • 3Diffie W,Hellman M.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22 (6):644-654.
  • 4Sahai A,Waters B.Fuzzy identity-based encryption[M] //Advances in Cryptology-EUROCRYPT2005.Springer Berlin Heidelberg,2005:457-473.
  • 5Bethencourt J,Sabai A,Waters B.Ciphertext-policy attributebased encryption[C] //Proceedings-IEEE Symposium on Security and Privacy.Berkeley,CA,United states,2007:321-334.
  • 6Cheung L,Newpor C.Provably secure ciphertext policy ABE[C] // Proceedings of the ACM Conference on Computer and Communications Security.Alexandria,VA,United states,2007:456-465.
  • 7Waters B.Ciphertext-policy attribute-based encryption:An expressive,effident,and provably secure realization[C] //14th International Conference on Practice and Theory in Public Key Cryptography,PKC 2011.Taormina,Italy,2011:53-70.
  • 8Ge Ai-jun,Zhang Rui,Chen Cheng,et al.Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts[C] //17th Australasian Conference on Information Security and Privacy,ACI SP2012.Wollongong,NSW,Australia,2012,7372:336-349.
  • 9Attrapadung N,Herranz J,Laguillaumie F,et al.Attributebased encryption schemes with constant size ciphertexts[J].Theoretical Computer Science,2012,422:15-38.
  • 10Hohenberger S,Waters B.Attribute-Based Encryption with Fast Decryption[M] //Public-Key Cryptography PKC2013.Springer Berlin Heidelberg,2013:162-179.

共引文献314

同被引文献117

引证文献10

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部