84,884 research outputs found
Optimisation of Automation Devices Based on IOT Big Data Algorithms
With the continuous development of communication, sensor and caching technologies, IoT technology has gained rapid opportunities for growth and a huge digital revolution has taken place at all levels of society. Blockchain technology has emerged rapidly in recent years and can be seen as a distributed, time-based ledger of distributed data. It utilises technologies such as consensus protocols, modern cryptography, P2P and smart contracts, which can provide a secure, stable, transparent, auditable and low-consumption system architecture that has a traceable, stable and efficient security management capability, and can provide a new solution to identity security for the Internet of Things. This paper absorbs the existing blockchain-based access management approach and improves it, proposing a new private chain-based security management approach that solves the problems of access dynamics, low intelligence and high overhead in the traditional access management approach. This paper designs a new control management architecture, the Novel-Capability-Based Access Control (NCBAC), which draws on the microkernel and microservice ideas of operating systems. Firstly, this paper abstracts the concept of management node to solve the problem of weak computing power and low storage performance of IoT devices that cannot meet the difficulty of direct communication between IoT devices and blockchain, and at the same time can reduce the network operation overhead; secondly, it constructs a multi-level smart contract system and designs three kinds of smart contracts, AC, ACC and AMC, to build a trusted and reliable access control entity model; finally, it adopts radial basis based (RBF) neural network and combines with access policy to dynamically generate the credit degree threshold of access nodes to build an intelligent access authority management model for IoT mass sensors. The model proposed in this paper designs a token mechanism based on the fact that IoT systems have multiple requests within a short period of time in a real production environment, which, according to experimental results, improves the performance of the system to a certain extent
Recommended from our members
ENABLING IOT AUTHENTICATION, PRIVACY AND SECURITY VIA BLOCKCHAIN
Although low-power and Internet-connected gadgets and sensors are increasingly integrated into our lives, the optimal design of these systems remains an issue. In particular, authentication, privacy, security, and performance are critical success factors. Furthermore, with emerging research areas such as autonomous cars, advanced manufacturing, smart cities, and building, usage of the Internet of Things (IoT) devices is expected to skyrocket. A single compromised node can be turned into a malicious one that brings down whole systems or causes disasters in safety-critical applications. This dissertation addresses the critical problems of (i) device management, (ii) data management, and (iii) service management in IoT systems. In particular, we propose an integrated platform solution for IoT device authentication, data privacy, and service security via blockchain-based smart contracts. We ensure IoT device authentication by blockchain-based IC traceability system, from its fabrication to its end-of-life, allowing both the supplier and a potential customer to verify an IC’s provenance. Results show that our proposed consortium blockchain framework implementation in Hyperledger Fabric for IC traceability achieves a throughput of 35 transactions per second (tps). To corroborate the blockchain information, we authenticate the IC securely and uniquely with an embedded Physically Unclonable Function (PUF). For reliable Weak PUF-based authentication, our proposed accelerated aging technique reduces the cumulative burn-in cost by ∼ 56%. We also propose a blockchain-based solution to integrate the privacy of data generated from the IoT devices by giving users control of their privacy. The smart contract controlled trust-base ensures that the users have private access to their IoT devices and data. We then propose a remote configuration of IC features via smart contracts, where an IC can be programmed repeatedly and securely. This programmability will enable users to upgrade IC features or rent upgraded IC features for a fixed period after users have purchased the IC. We tailor the hardware to meet the blockchain performance. Our on-die hardware module design enforces the hardware configuration’s secure execution and uses only 2,844 slices in the Xilinx Zedboard Zynq Evaluation board. The blockchain framework facilitates decentralized IoT, where interacting devices are empowered to execute digital contracts autonomously
- …