首页> 外文会议>IEEE Conference on Industrial Electronics and Applications >Latency Estimation of Blockchain-Based Distributed Access Control for Cyber Infrastructure in the IoT Environment
【24h】

Latency Estimation of Blockchain-Based Distributed Access Control for Cyber Infrastructure in the IoT Environment

机译:IOT环境中网络基础架构基于区块链的分布式访问控制的延迟估算

获取原文

摘要

We adopt a permissioned blockchain framework to enable the Internet of Things (IoT) device access control, primarily to protect cyber infrastructure (cloud, fog, web servers, application servers, routers, switches, gateways, remote sensors, computers, controllers, actuators, radio transceivers, storage, including computing grid and data grid) of the IoT networks. The connected smart devices or critical cyber infrastructures continuously contribute to collect and transfer a vast amount of data using the internet. Unauthorized access and unauthenticated control of these devices would generate severe catastrophes. Despite the risk of having single-point-of-failure that occurs due to the centralized nature, Certificate Authorities (CAs) contribute to the security when devices hold CA-signed certificates. This study develops a comprehensive latency model on blockchain-based distributed critical infrastructure access control in the IoT networks. Decentralized Security Access Administrators (SAAs) are used instead of centralized CA to provide blockchain-based distributed access control to protect critical infrastructure. For our estimation, we consider (i) communication latency, (ii) digest computation latency, (iii) message authentication codes (MACs) computation latency, (iv) latency for device access query via SAA, (v) latency for authorization and device access, and (vi) latency for adding a transaction to the blockchain. Additionally, we compare the estimated time consumption of our model with a prior study. Our results indicate that the existing model underestimates latency by 75.5%. We estimate accurate time to access a target object using blockchain securely. This model is practical (i) to observe the scalability performance of a network and (ii) to detect malicious traffic by observing time. Adding a new block to blockchain incurs more delays than it claims, especially in the blockchain-based IoT environment. Understanding the accurate delay, theoretically, is essential to such systems. Our study moves a step forward towards this direction.
机译:我们采用一个权限的区块链框架来实现事物互联网(物联网)设备访问控制,主要是保护网络基础架构(云,雾,Web服务器,应用服务器,路由器,交换机,网关,远程传感器,计算机,控制器,执行器,无线电收发器,存储,包括IOT网络的计算网格和数据网格)。连接的智能设备或关键网络基础架构不断有助于使用Internet收集和传输大量数据。未经授权的访问和未经身份验证的这些设备的控制会产生严重的灾难。尽管具有由于集中性而导致的单点故障发生的风险,但在设备持有CA签名证书时,证书颁发机构(CAS)会有助于安全性。本研究在IOT网络中开发了基于区块链的分布式关键基础架构访问控制的综合延迟模型。使用分散的安全访问管理员(SAAS)代替集中式CA,以提供基于区块链的分布式访问控制,以保护关键基础架构。对于我们的估计,我们考虑(i)通信延迟,(ii)摘要计算延迟,(iii)通过SAA,(v)授权和设备延迟的设备访问查询的消息认证代码(Mac)延迟在BlockChain中添加事务的访问和(vi)延迟。此外,我们将模型的估计时间消耗与先前的研究进行比较。我们的结果表明,现有模式低估了延迟75.5%。我们估计安全地使用BlockChain访问目标对象的准确时间。该模型是实用的(i)观察网络的可扩展性性能和(ii)通过观察时间来检测恶意流量。将新块添加到区块链扰动的延迟超过其索赔,特别是在基于区块链的IOT环境中。了解准确的延迟,理论上,对这些系统至关重要。我们的研究向前迈向这个方向。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号