Computer Science ›› 2019, Vol. 46 ›› Issue (12): 180-185.doi: 10.11896/jsjkx.181102170

Special Issue: Block Chain Technology

• Information Security • Previous Articles     Next Articles

Multi-stage Cascade Wireless Security Authentication Scheme Based on Blockchain Technology

HU Zhao-peng, DING Wei-ping, GAO Zhan, ZHU Xiao-hui, WANG Jie-hua   

  1. (College of Computer Science and Technology,Nantong University,Nantong,Jiangsu 226019,China)
  • Received:2018-11-25 Online:2019-12-15 Published:2019-12-17

Abstract: Blockchain technology has the advantages of decentralization,trust removal,anonymity and non-tamperable.In order to more effectively ensure that users can safely identify and connect to the wireless network,this paper proposed a multi-stage cascade wireless security authentication scheme(MWSASB) based on blockchain technology.The MWSASB program designs a multi-stage cascade protocol process:registration phase,login and certification phase,and transaction phase.And it records the transaction of users’ information in the non-tamper and decentralized blockchain ledger by using workload proof and the extension of the longest chain.Firstly,during the registration phase,the user enters the registration information Then the cryptographic technology and the consensus mechanism are used to store the registration information on each node of the blockchain in the decentralized network.At the same time,during the login and authentication phase,the user inputs the login information,then login and authenticate with the blockchain server.After successful authentication the login information is also stored on each node of the blockchain.Secondly,in the transaction phase,the registration information and the login and authentication information are used to ensure that their information are securely recorded in the blockchain in the form of transactions.Finally,the security and computation of the MWSASB are analyzed.The results show that the MWSASB has security attributes such as wireless security authentication and can effectively avoid various common network attacks such as man-in-the-middle attacks,DDoS attacks,etc.In terms of computation,blockchain cannot be tampered with and cryptographic algorithm and consensus mechanism can be used for encryption verification,which can effectively reduce the number of calculations and improve the efficiency of security authentication.

Key words: Blockchain, Consensus mechanism, Decentralization, Multi-stage cascade, Wireless security authentication

CLC Number: 

  • TP309
[1]SARASWATHI S,YOGESH P.Secure and efficient Smart- Card-Based remote user authentication scheme formulti-server environment[J].Canadian Journal of Electrical and Computer Engineering,2015,38(1):20-30.
[2]CHEN Y L,DU Y J,YANG G.Efficient attribute-based authenticated key agreement protocol [J].Computer Science,2014,41(4):150-154.(in Chinese)
陈燕俐,杜英杰,杨庚.一种高效的基于属性的认证密钥协商协议[J].计算机科学,2014,41(4):150-154.
[3]ZHAO Y.Design of Dynamic Password Authentication System [J].Journal of Luoyang Normal University,2012,31(8):36-37.
[4]LAMPORT L.Password authentication with insecure communication[J].Communication of the ACM,1981,24(11):770-772.
[5]ASHISH K,HARI O.An improved and secure multiser- ver authentication scheme based on biometrics and smartcard[J].Digital Communications and Networks,2018,4(1):27-38.
[6]ZHAN L,YAO G X,QIANG H C.Improved mutual authentication scheme based on smartcard for cloud computing[J].Computer Engineering and Design,2014,35(2):440-444.
[7]XIONG L,JUNGUO L,JIAO Z,et al.A secure remote user mutual authentication scheme using smartcards [C]//Computers,Communications and IT Applications Conference.IEEE,2014:89-92.
[8]JAEWOOK J,DONGHOON L,HAKJUN L,et al.Security Enhanced Anonymous User Authenticated Key Agreement Scheme Using Smart Card[J].Journal of Electronic Science and Technology,2018,16(1):45-49.
[9]LI X,NIU J W,MA J,et al.Cryptanalysis and Impro- vement of a Biometric-based Remote UserAuthentication Scheme Using Smart Cards[J].Journal of Network and Computer Applications,2011,34(1):73-79.
[10]QU J,PENG Y,TAN X L,et al.Anonymous Rem- ote User Authentication Scheme Based on Bioligical Features [J].Computer Engineering,2015,41(6):126-129,135.
[11]YIN Q S,CHEN J H.Improved Identity Authentica-tion Protocol Based on Elliptic Curve Cryptography in Multiserver Environment [J].Computer Science,2018,45(6):111-116,150.
[12]NAKAMOTOS.Bitcoin:apeer-to-peerelectron-iccashsystem [EB/OL].https://bitcoin.org/bitcoin.pdf.
[13]工信部.中国区块链技术和应用发展白皮书 [R].北京:工信部,2016:23.
[14]LIU A D,DU X H,WANG N,et al.Research progress of blockchain technology and its application in information security[J].Journal of Software,2018,29(7):2092-2115.
[15]ZHOU Z C,LI L X,GUO S,et al.A biometrics and password two-factor crossdomain authentication scheme based on blockchaintechnology[J].Journal of Computer Applications,2018,38(6):100-107.
[16]FROMKNECHT C,VELICANU D.CertCoin:A NameCoin based decentralized authentication system:Technical Report,6.857[R].Class Project,Massachusetts Institute of Technology,2014.
[17]FROMKNECHT C,VELICANU D.Adecentralizpublic key infrastructure with identity retention:Technical Report,803[R].Massachusetts Institute of Technology,2014.
[18]RAJU S,BODDEPALLI S,GAMPA S,et al.Identitymanagement using blockchain for cognitive cellular networks[C]//IEEE International Conference on Communications.IEEE,2017:1-6.
[1] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[2] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[3] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[4] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[5] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[6] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[7] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[8] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[9] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[10] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[11] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[12] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
[13] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
[14] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
[15] FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!