期刊文献+

基于区块链技术的网络终端鉴权认证方法研究 被引量:2

Research on Authentication Method of Network TerminalsBased on Block Chain Technology
下载PDF
导出
摘要 随着部队作战任务的需要变化,原有的基于有线网络固定终端的网络终端安全认证机制的性能瓶颈逐渐显现,针对存在有线无线网络终端并存、授权认证节点设备易损毁等近似实战情况下入网终端的安全认证要求无法提供低成本、高可靠性的解决方案;为解决上述问题,基于区块链技术的去中心化、防篡改、自动协商的特性,提出高兼容、自适应、抗损毁的网络终端安全认证方法;利用区块链对终端信息进行分布式存储并记录,通过ASE对区块信息进行加密,防止敏感信息泄漏,并利用终端信息对终端进行基于身份的安全认证的方法,经实际应用满足网络终端的权限认证及安全管理需求。 With the development of battle requirements,traditional client authentication based on central station authentication system by wired network can’t meet the need of current demands,which are authentication of both wired clients and wireless clients by internal network having some destroyed network devices.In order to overcome these problems,a new authentication solution is designed based on block chain technology which has features including decentration,consensus mechanism,tamper-proofing and so on.And AES is used to encrypt classified information.Final the result is proved to be valid.
作者 叶海明 徐晓东 Ye Haiming;Xu Xiaodong(95910th Unit of PLA,Jiuquan 735000,China;94456th Unit of PLA,Weihai 264200,China)
出处 《计算机测量与控制》 2020年第12期248-252,257,共6页 Computer Measurement &Control
关键词 网络终端 安全认证 区块链 对等网络 network client authentication blockchain P2P
  • 相关文献

参考文献6

二级参考文献65

  • 1Zhang Z,Lin S,Lian Q,Jin C.RepStore:A self-managing and self-tuning storage backend with smart bricks.In:Proc.of the Int'l Conf.on Autonomic Computing.2004.122-129.http://ieeexplore.ieee.org/xpl/freeabs_all.jsp-arnumber=1301355&fromcon
  • 2Stoica I,Morris R,Karger D,Kaashoek M,Balakrishnan H.Chord:A scalable peer-to-peer lookup service for internet applications.Proc.of the 2001 SIGCOMM Conf.,2001,31(4):149-160.
  • 3Zhao B,Kubiatowicz J,Joseph A.Tapestry:An infrastructure for fault-tolerant wide-area location and routing.Technical Report,UCB//CSD-01-1141,Berkeley Computer Science Division,University of California,2001.
  • 4Ratnasamy S,Francis P,Handley M,Karp R,Schenker S.A scalable content-addressable network.In:Proc.of the ACM SIGCOMM Symp.on Communication,Architecture,and Protocols.ACM SIGCOMM,2001.161-172.http://www.acm.org/sigs/ sigcomm/sigcomm/sigcomm2001/p13-ratnasamy.pdf
  • 5Rowstron A,Druschel P.Pastry:Scalable,distributed object location and routing for large-scale peer-to-peer systems.In:Proc.of the IFIP/ACM Int'l Conf.on Distributed Systems Platforms (Middleware).2001.329-350.http://citeseer.ist.psu.edu/ rowstron01pastry.html
  • 6Maymounkov P,Mazieres D.Kademlia:A peer-to-peer information system based on the XOR metric.In:Proc.of the 1st Int'l Workshop on Peer-to-Peer Systems.2002.258-263.http://citeseer.ist.psu.edu/maymounkov02kademlia.html
  • 7Schlosser M,Sintek M,Decker S,Nejdl W.HyperCuP-Hypercubes,ontologies and efficient search on P2P networks.In:Proc.of the Int'l Workshop on Agents and Peer-to-Peer Computing.2002.112-124.http://citeseer.ist.psu.edu/532386.html
  • 8Mitzenmacher M.Digital fountains:A survey and look forward.In:Proc.of the Information Theory Workshop.2004.271-276.http://ieeexplore.ieee.org/xpls/abs_all.jsp-arnumber=1405313
  • 9Plank J.A tutorial on reed-solomon coding for fault-tolerance in RAID-like systems.Software Practice and Experience,1997,27(9):995-1012.
  • 10Chun B,Dabek F,Haeberlen A,Sit E,Weatherspoon H,Kaashoek M,Kubiatowicz J,Morris R.Efficient replica maintenance for distributed storage systems.In:Proc.of the 3rd Symp.on Networked Systems Design and Implementation.2006.45-58.http://oceanstore.cs.berkeley.edu/publications/papers/pdf/carbonite06.pdf

共引文献821

同被引文献25

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部