Online citations, reference lists, and bibliographies.

IoT Security Access Authentication Method Based On Blockchain

Y. Cheng, Min Lei, S. Chen, Zigang Fang, S. Yang
Published 2019 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
With the rapid development of Internet of Things (IoT), The IoT terminal are diversified, and the attack points available to attackers are also diversified, and most IoT terminal are more vulnerable to attacks because they are less secure. In order to achieve secure access of IoT terminal, ensure the legality of IoT terminal accessing the network, improve the security of terminal entering the network and reduce the security risks that IoT terminal may be exposed to when accessing the platform. This paper proposes a secure method to access to the IoT, which is to use the blockchain to store and verify the fingerprint information of the terminal, thereby improving the security of the IoT terminal accessing the cloud. And this paper also proposes a method to store the fingerprint blockchain of the terminal in the IoT terminal, and then verify the collected fingerprint information through the data in the blockchain to ensure the credibility of the fingerprint information.
This paper references



Semantic Scholar Logo Some data provided by SemanticScholar