摘要
针对物联网系统中存在的信息传输安全和信息记录保护问题,结合区块链和容器技术提出一个物联网节点接入、信息记录安全存储方案,该方案利用区块链技术来保护物联网节点接入、信息记录存储,使物联网节点间信息交互的记录的真实数据保存在链下存储结构中,有效的实现了物联网节点的安全性的提升和降低了恶意攻击后取证溯源的难度.
Aimed at the problem of information transmission security and information record protection in the Internet of Things system, combined with blockchain and container technology, an IoT node access and information record security storage scheme are proposed. This scheme uses blockchain technology to protect the Internet of Things, node access, information record storage, so that the real data recorded by the information exchange between IoT nodes are stored in the chain storage structure, effectively improving the security of the IoT node and reducing the difficulty of tracing the source after malicious attack.
引文
[1]吴功宜,吴英.IoT工程导论[M],北京:高等教育出版社,2012.
[2] GIRAU R,MARTIS S,ATZORIL.Lysis:a platform for IoT distributed applications over socially connected objects[J].IEEE Internet of Things Journal,2017,4(1):40-51.
[3] 汪京培.物联网量化信任管理模型研究[J].网络安全技术与应用,2014(12):89-90,92.
[4] 刘永丹.基于区块链的网络空间安全技术[J].电子技术与软件工程,2017(20):215-217.
[5]ZYSKIND G,NATHAN O.Decentralizing privacy:using blockchain to protect personal data [C].Security and Privacy Workshops( SPW) ,IEEE,2015:180-184.
[6] 王飞.基于Docker的研发部署管理平台的设计与实现[D].北京:北京交通大学,2015.
[7] 云安全联盟(CSA).用区块链技术保障IoT安全[EB/OL].[2018-03-01].https://www.ccsa.cn/i/file/20180320/20180320204512151215.pdf
[8] 林小驰,胡叶倩雯.关于区块链技术的研究综述[J].金融市场研究,2016,45(2):97-109.
[9]程丽辰,刘吉强.区块链技术及其安全问题[J].信息通信技术,2017,3(11):39-45.
[10]THE ECONOMIST.The promise of the blockchain:the trust machine[EB/OL].(2015-10-31)[2017-08-20].http://www.economist.com/news/leaders/21677198-technologybehind-bitcoin-could-tr ansform how-economy-works-trust-machine.
[11] 梅海涛,刘洁.区块链的产业现状、存在问题和政策建议[J].电信科学,2016,32(11):134-138.
[12] 李董,魏进武.区块链技术原理、应用领域及挑战[J].电信科学,2016,32(12):20-25.
[13] 张龚,刘德.区块链中的安全问题研究[J].数字技术与应用,2017(8):199-200.
[14]ATZORI L,IERA A,MORABITO G,et al.The social internet of things (SIoT)-when social networks meet the internet of things:concept,architecture and network characterization[J].Computer Networks,2012,56(16):3594-3608.
[15]ZHANG J,XUE N,HUANG X.A secure system for pervasive social network-based healthcare[J].IEEE Access,2016(4):9239-9250