期刊文献+

边缘硬件数字签名及智能合约技术在物联网数据安全领域的应用研究

Application Research of Edge Hardware Digital Signature and Smart Contract Technology in the Field of IoT Data Security
下载PDF
导出
摘要 通过分析物联网(Internet of Things,IoT)数据采集与应用过程中存在的漏洞,提出了一种基于区块链软硬件的新技术方案。新方案主要是在物联网边缘采集设备一侧引入区块链硬件签名技术和智能合约技术,保证源头数据的真实性,同时在物联网数据应用端以区块链上数据为基准,与应用软件进行信息交叉验证,利用区块链的技术优势,达到末端数据保真的目的,为物联网行业的大数据应用提供新的安全保障。 Through the analysis of the vulnerabilities existing in the process of Internet of Things(IoT)data collection and application,this paper proposes a new technology scheme based on blockchain software and hardware,the new scheme is mainly to introduce blockchain hardware signature technology and smart contract technology on the side of the IoT edge collection device to ensure the authenticity of the source data.At the same time,the data on the blockchain data is used as the benchmark at the data application end of the IoT,and the application software is cross-verified with the application software,and the advantages of blockchain technology are used to achieve the It can purpose of terminal data fidelity.Provide new security for the application of big data in the IoT industry.
作者 张少魁 ZHANG Shaokui(Shanghai Dongpeng Technology Co.,Ltd.,Shanghai 201203,China)
出处 《通信电源技术》 2022年第6期11-14,共4页 Telecom Power Technology
关键词 智能合约 区块链 物联网 数字签名 数据安全 应用软件 大数据应用 交叉验证 Internet of Things(IoT) data security smart contract blockchain
  • 相关文献

参考文献5

二级参考文献28

  • 1Gershenfeld N,,Krikorian R,Cohen D.The Internet of things. Scientific American . 2004
  • 2Zhang Baoquan,Zou Zongfeng,Liu Mingzheng.Evaluation on Security System of Internet of Things Based on Fuzzy-AHP Method. E-Business and E-Government(ICEE),2011International Conference . 2011
  • 3ETSI.M2M communications. ETSI TS102689V1.1.1 . 2010
  • 4Ganame A K,Bourgeois J,Bidou R,Spies F.A global security architecture for intrusion detection on computer networks. Computers and Security . 2008
  • 5IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks specific requirements, Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for lo. IEEE Std.802.15.4 . 2003
  • 6LEUSSE P,PERIORELLIS P,DIM ITRAKOST,et al.Self Managed Security Cell,a security model for the Internet of Things and Services. Proc of the 2009 First International Conference on Advances in Future Internet . 2009
  • 7HAMAD F,SMALOV L,JAMES A.Energy-aw are security in commerce and the Internet of Things. IETE,Technical review . 2009
  • 8聂晓培.ZigBee标准的安全服务体系结构分析[J].网络安全技术与应用,2009(1):43-45. 被引量:5
  • 9武传坤.物联网安全架构初探[J].中国科学院院刊,2010,25(4):411-419. 被引量:76
  • 10姚丽娟.网络入侵检测技术综述[J].软件导刊,2010,9(6):160-162. 被引量:13

共引文献454

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部