Journal of King Saud University: Computer and Information Sciences (Nov 2022)

Research on identity authentication system of Internet of Things based on blockchain technology

  • Liu Yanhui,
  • Zhang Jianbiao,
  • Muhammad Salman Pathan,
  • Yuan Yijian,
  • Zhang Puzhe,
  • Sarah Maroc,
  • Avishek Nag

Journal volume & issue
Vol. 34, no. 10
pp. 10365 – 10377

Abstract

Read online

With the development of the Internet of Things (IoT) and its applications, a large amount of data is generated regularly. If this information is used by malicious attackers, it will be a great disaster for the relevant users. In this regard, this article focuses on the user’s identity privacy issues involved in the IoT. By protecting the user’s identity privacy, the attacker cannot associate the obtained data with the user’s real identity, and so achieve the purpose of protecting the user. This article uses the features of blockchain that cannot be tampered with nor forged to strengthen the reliability of the system. The proposed scheme saves the transaction information of user information through the Hyperledger and uses the ring signature method to obscure the real identity. A key generator is used to generate system public parameters and ring membership information required for signature. Users can use this information to hide their identity in a ring group of n users so that other users can only guess the true identity of the user with a probability of 1/n. Additionally, the method of aggregated signature is used to shorten the time and space required for k signature verification to 1/k, which greatly improves the efficiency. Finally, this article also uses an accountability mechanism to punish some attackers who attempt to waste system resources by revealing the real identity of the attacker and refusing to serve him. In this paper, GO language is used to write chain code to realize the proposed algorithm, and a prototype system is built through HyperLeger Fabric blockchain network, and the prototype system is verified by experiment. The correctness and efficiency of the above scheme are also proved through theoretical analysis and experiments.

Keywords