A Multi-User Collaborative Access Control Scheme Based on New Hash Chain

被引:0
|
作者
Wang, Zetian [1 ]
Li, Yunfa [2 ]
Liu, Guanxu [2 ]
Zhang, Di [2 ]
机构
[1] Hangzhou Dianzi Univ, HDU ITMO Joint Inst, Key Lab Complex Syst Modeling & Simulat, Hangzhou 310018, Peoples R China
[2] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Key Lab Complex Syst Modeling & Simulat, Hangzhou 310018, Peoples R China
关键词
blockchain; IoT; hash chain; access control; proof of work; AUTHENTICATION SCHEME;
D O I
10.3390/electronics12081792
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the threats to the Internet of Things (IoT) continue to increase, access control is widely used in various IoT information systems. However, due to the shortcomings of IoT devices such as low computing power, it is impossible to use high-performance methods to control user access. Although the emergence of the blockchain provides another way of thinking for access control, the implementation based on the blockchain requires the device to complete the proof of work (PoW) and requires the device to have high computing power. At the same time, most access control schemes existing today are intended for users to use alone, which cannot be applied to the field of multi-user coordinated access. Therefore, this paper proposes a multi-user collaborative access control scheme based on a new hash chain, which uses the identity information of multiple users as the seed value to construct the hash chain, and uses the hash chain as the PoW of the blockchain. An efficiency analysis showed that this method requires only a small amount of hash value calculation and can be applied to IoT systems with low computing power. The security analysis shows that the scheme can resist a variety of attack methods and has high security.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Privacy-preserving Multi-user Encrypted Access Control Scheme for Cloud-assisted IoT applications
    Kaaniche, Nesrine
    Laurent, Maryline
    PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, : 590 - 597
  • [32] A new look at multi-user power control games
    Su, Yi
    van der Schaar, Mihaela
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1072 - 1076
  • [33] Multi-user Efficacy of Collaborative Virtual Environments
    Erfanian, Aida
    Hu, Yaoping
    2016 IEEE 20TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2016, : 389 - 394
  • [34] Multi-User Medium Access Control in Wireless Local Area Network
    Li, Haoming
    Attar, Alireza
    Leung, Victor C. M.
    2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [35] Multi-User Searchable Encryption with Efficient Access Control for Cloud Storage
    Lv, Zhiquan
    Zhang, Min
    Feng, Dengguo
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 366 - 373
  • [36] Deep Reinforcement Learning for Multi-User Access Control in UAV Networks
    Cao, Yang
    Zhang, Lin
    Liang, Ying-Chang
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [37] Collaborative learning in multi-user virtual environments
    Blanca Ibanez, Maria
    Garcia Rueda, Jose J.
    Maroto, David
    Delgado Kloos, Carlos
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (06) : 1566 - 1576
  • [38] Multi-user collaborative visual program development
    Campbell, JD
    IEEE 2002 SYMPOSIA ON HUMAN CENTRIC COMPUTING LANGUAGES AND ENVIRONMENTS, PROCEEDINGS, 2002, : 122 - 130
  • [39] Multi-user collaborative WWW knowledge acquisition
    Wang, Chao
    Huang, Jianhai
    Li, Jun
    Pan, Jingui
    Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence, 2002, 15 (03):
  • [40] Pricing Scheme based Nash Q-Learning Flow Control for Multi-user Network
    Li, Xin
    Yu, Haibin
    MATERIALS, MECHATRONICS AND AUTOMATION, PTS 1-3, 2011, 467-469 : 847 - 852