A Multi-User Collaborative Access Control Scheme Based on New Hash Chain

被引:0
|
作者
Wang, Zetian [1 ]
Li, Yunfa [2 ]
Liu, Guanxu [2 ]
Zhang, Di [2 ]
机构
[1] Hangzhou Dianzi Univ, HDU ITMO Joint Inst, Key Lab Complex Syst Modeling & Simulat, Hangzhou 310018, Peoples R China
[2] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Key Lab Complex Syst Modeling & Simulat, Hangzhou 310018, Peoples R China
关键词
blockchain; IoT; hash chain; access control; proof of work; AUTHENTICATION SCHEME;
D O I
10.3390/electronics12081792
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the threats to the Internet of Things (IoT) continue to increase, access control is widely used in various IoT information systems. However, due to the shortcomings of IoT devices such as low computing power, it is impossible to use high-performance methods to control user access. Although the emergence of the blockchain provides another way of thinking for access control, the implementation based on the blockchain requires the device to complete the proof of work (PoW) and requires the device to have high computing power. At the same time, most access control schemes existing today are intended for users to use alone, which cannot be applied to the field of multi-user coordinated access. Therefore, this paper proposes a multi-user collaborative access control scheme based on a new hash chain, which uses the identity information of multiple users as the seed value to construct the hash chain, and uses the hash chain as the PoW of the blockchain. An efficiency analysis showed that this method requires only a small amount of hash value calculation and can be applied to IoT systems with low computing power. The security analysis shows that the scheme can resist a variety of attack methods and has high security.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions
    Chuang, Yu-Hao
    Hsu, Chien-Lung
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (02): : 197 - 201
  • [22] Collaborative educational environment based on a multi-user virtual space
    Hosoya, Katsumi
    Kato, Yasuhisa
    Kawanobe, Akihisa
    Kakuta, Susumu
    Fukuhara, Yoshimi
    1997, Scripta Technica Inc, New York, NY, United States (28)
  • [23] Hash-Function Based PRFs: AMAC and Its Multi-User Security
    Bellare, Mihir
    Bernstein, Daniel J.
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 566 - 595
  • [24] Signature scheme in multi-user setting
    Tan, Chik-How
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (05) : 1339 - 1345
  • [25] A Multi-User Quantum Access Network
    Froehlich, B.
    Dynes, J. F.
    Lucamarini, M.
    Sharpe, A. W.
    Yuan, Z. L.
    Shields, A. J.
    2013 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO), 2013,
  • [26] A Rate Allocation Scheme for Multi-user over Heterogeneous Wireless Access Networks
    Chen, Huifang
    Ding, Xudong
    Wang, Zheng
    Xie, Lei
    2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [27] Performance Comparison of Multi-User Shared Multiple Access Scheme in Uplink Channels
    Okamoto, Eiji
    Mikami, Manabu
    Yoshino, Hitoshi
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2019, E102B (08) : 1458 - 1466
  • [28] Multi-user and Keyword-based Searchable Encryption Scheme
    Zhang, Ya-ling
    Liu, Li-jun
    Wang, Shang-ping
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 223 - 227
  • [29] A Reverse Hash Chain Path-Based Access Control Scheme for a Connected Smart Home System
    Kim, DaeYoub
    Lee, Jihoon
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2021, 10 (01) : 93 - 100
  • [30] Multi-user Dynamic Spectrum Access Based on Reinforcement Learning
    Xu, Jinming
    Dou, Zheng
    Qi, Lin
    ELEVENTH INTERNATIONAL CONFERENCE ON GRAPHICS AND IMAGE PROCESSING (ICGIP 2019), 2020, 11373