计算机科学 ›› 2019, Vol. 46 ›› Issue (12): 180-185.doi: 10.11896/jsjkx.181102170

所属专题: 区块链技术

• 信息安全 • 上一篇    下一篇

一种基于区块链技术的多阶段级联无线安全认证方案

胡兆鹏, 丁卫平, 高瞻, 朱晓辉, 王杰华   

  1. (南通大学计算机科学与技术学院 江苏 南通226019)
  • 收稿日期:2018-11-25 出版日期:2019-12-15 发布日期:2019-12-17
  • 通讯作者: 王杰华(1965-),男,教授,硕士生导师,主要研究方向为信息安全、物联网技术、医学信息处理,E-mail:wang.jh@ntu.edu.cn。
  • 作者简介:胡兆鹏(1994-),男,硕士,主要研究方向为信息安全、区块链技术;丁卫平(1979-),男,博士,副教授,主要研究方向为数据挖掘、机器学习和粒运算;高瞻(1972-),男,博士,副教授,主要研究方向为虚拟现实、人机交互和计算机图形学;朱晓辉(1976-),男,硕士,副教授,主要研究方向为计算机软件与理论。
  • 基金资助:
    本文受江苏省六大人才高峰项目(XYDXXJS-048),南通市应用基础研究计划项目(GY12016015)资助。

Multi-stage Cascade Wireless Security Authentication Scheme Based on Blockchain Technology

HU Zhao-peng, DING Wei-ping, GAO Zhan, ZHU Xiao-hui, WANG Jie-hua   

  1. (College of Computer Science and Technology,Nantong University,Nantong,Jiangsu 226019,China)
  • Received:2018-11-25 Online:2019-12-15 Published:2019-12-17

摘要: 区块链技术具有去中心化、去信任、匿名、数据不可篡改等优势。为了更有效地保证用户能够安全识别并连接无线网络,文中提出了一种基于区块链技术的多阶段级联无线安全认证方案(MWSASB)。MWSASB方案设计多阶段级联协议过程,即注册阶段、登录与认证阶段以及交易阶段,并利用工作量证明机制PoW算法和延长最长链的方法,将用户信息产生交易记录在不可篡改且去中心化的区块链账本中。首先,在注册阶段,用户输入注册信息,在去中心化网络中利用密码学技术以及共识机制使得注册信息存储在区块链的每一个节点上;同时,在登录与认证阶段,用户输入登录信息,用户与区块链服务器进行登录与认证,在认证成功后以同样的方式将登录信息存储在区块链的每一个节点上。其次,在交易阶段,利用共识机制确保注册信息和登录与认证信息以交易形式安全记录在区块链中。最后,对MWSASB方案进行安全性和运算量分析。实验结果表明,在安全性方面,MWSASB方案具有无线安全认证等安全属性,有效避免了各种常见的网络攻击,如中间人攻击、DDoS攻击等;在运算量方面,利用区块链不可篡改机制,使用密码学算法和共识机制进行加密认证,能有效减少运算次数,提升安全认证效率。

关键词: 多阶段级联, 共识机制, 区块链, 去中心化, 无线安全认证

Abstract: Blockchain technology has the advantages of decentralization,trust removal,anonymity and non-tamperable.In order to more effectively ensure that users can safely identify and connect to the wireless network,this paper proposed a multi-stage cascade wireless security authentication scheme(MWSASB) based on blockchain technology.The MWSASB program designs a multi-stage cascade protocol process:registration phase,login and certification phase,and transaction phase.And it records the transaction of users’ information in the non-tamper and decentralized blockchain ledger by using workload proof and the extension of the longest chain.Firstly,during the registration phase,the user enters the registration information Then the cryptographic technology and the consensus mechanism are used to store the registration information on each node of the blockchain in the decentralized network.At the same time,during the login and authentication phase,the user inputs the login information,then login and authenticate with the blockchain server.After successful authentication the login information is also stored on each node of the blockchain.Secondly,in the transaction phase,the registration information and the login and authentication information are used to ensure that their information are securely recorded in the blockchain in the form of transactions.Finally,the security and computation of the MWSASB are analyzed.The results show that the MWSASB has security attributes such as wireless security authentication and can effectively avoid various common network attacks such as man-in-the-middle attacks,DDoS attacks,etc.In terms of computation,blockchain cannot be tampered with and cryptographic algorithm and consensus mechanism can be used for encryption verification,which can effectively reduce the number of calculations and improve the efficiency of security authentication.

Key words: Blockchain, Consensus mechanism, Decentralization, Multi-stage cascade, Wireless security authentication

中图分类号: 

  • TP309
[1]SARASWATHI S,YOGESH P.Secure and efficient Smart- Card-Based remote user authentication scheme formulti-server environment[J].Canadian Journal of Electrical and Computer Engineering,2015,38(1):20-30.
[2]CHEN Y L,DU Y J,YANG G.Efficient attribute-based authenticated key agreement protocol [J].Computer Science,2014,41(4):150-154.(in Chinese)
陈燕俐,杜英杰,杨庚.一种高效的基于属性的认证密钥协商协议[J].计算机科学,2014,41(4):150-154.
[3]ZHAO Y.Design of Dynamic Password Authentication System [J].Journal of Luoyang Normal University,2012,31(8):36-37.
[4]LAMPORT L.Password authentication with insecure communication[J].Communication of the ACM,1981,24(11):770-772.
[5]ASHISH K,HARI O.An improved and secure multiser- ver authentication scheme based on biometrics and smartcard[J].Digital Communications and Networks,2018,4(1):27-38.
[6]ZHAN L,YAO G X,QIANG H C.Improved mutual authentication scheme based on smartcard for cloud computing[J].Computer Engineering and Design,2014,35(2):440-444.
[7]XIONG L,JUNGUO L,JIAO Z,et al.A secure remote user mutual authentication scheme using smartcards [C]//Computers,Communications and IT Applications Conference.IEEE,2014:89-92.
[8]JAEWOOK J,DONGHOON L,HAKJUN L,et al.Security Enhanced Anonymous User Authenticated Key Agreement Scheme Using Smart Card[J].Journal of Electronic Science and Technology,2018,16(1):45-49.
[9]LI X,NIU J W,MA J,et al.Cryptanalysis and Impro- vement of a Biometric-based Remote UserAuthentication Scheme Using Smart Cards[J].Journal of Network and Computer Applications,2011,34(1):73-79.
[10]QU J,PENG Y,TAN X L,et al.Anonymous Rem- ote User Authentication Scheme Based on Bioligical Features [J].Computer Engineering,2015,41(6):126-129,135.
[11]YIN Q S,CHEN J H.Improved Identity Authentica-tion Protocol Based on Elliptic Curve Cryptography in Multiserver Environment [J].Computer Science,2018,45(6):111-116,150.
[12]NAKAMOTOS.Bitcoin:apeer-to-peerelectron-iccashsystem [EB/OL].https://bitcoin.org/bitcoin.pdf.
[13]工信部.中国区块链技术和应用发展白皮书 [R].北京:工信部,2016:23.
[14]LIU A D,DU X H,WANG N,et al.Research progress of blockchain technology and its application in information security[J].Journal of Software,2018,29(7):2092-2115.
[15]ZHOU Z C,LI L X,GUO S,et al.A biometrics and password two-factor crossdomain authentication scheme based on blockchaintechnology[J].Journal of Computer Applications,2018,38(6):100-107.
[16]FROMKNECHT C,VELICANU D.CertCoin:A NameCoin based decentralized authentication system:Technical Report,6.857[R].Class Project,Massachusetts Institute of Technology,2014.
[17]FROMKNECHT C,VELICANU D.Adecentralizpublic key infrastructure with identity retention:Technical Report,803[R].Massachusetts Institute of Technology,2014.
[18]RAJU S,BODDEPALLI S,GAMPA S,et al.Identitymanagement using blockchain for cognitive cellular networks[C]//IEEE International Conference on Communications.IEEE,2017:1-6.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[3] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[4] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[5] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[6] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[7] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[8] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[9] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[10] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[11] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[12] 杨昕宇, 彭长根, 杨辉, 丁红发.
基于演化博弈的理性拜占庭容错共识算法
Rational PBFT Consensus Algorithm with Evolutionary Game
计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110
[13] 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云.
一种面向电能量数据的联邦学习可靠性激励机制
Reliable Incentive Mechanism for Federated Learning of Electric Metering Data
计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195
[14] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
以太坊Solidity智能合约漏洞检测方法综述
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
[15] 范家幸, 王志伟.
基于门限环签名的分级匿名表决方案
Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature
计算机科学, 2022, 49(1): 321-327. https://doi.org/10.11896/jsjkx.201000032
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!