首页> 外文会议>IEEE International Conference on Trust, Security and Privacy in Computing and Communications >Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts
【24h】

Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts

机译:SMART HOME中的安全和隐私实现:基于属性的访问控制和智能合同

获取原文

摘要

There has been wide range of applications involving smart home systems for user comfort and accessibility to essential commodities. Users enjoy featured home services supported by the IoT smart devices. These IoT devices are resourceconstrained, incapable of securing themselves and can be easily hacked. Edge computing can provide localized computations and storage which can augment such capacity limitations for IoT devices. Furthermore, blockchain has emerged as technology with capabilities to provide secure access and authentication for IoT devices in decentralized manner. In this paper, we propose an authentication scheme which integrate attribute based access control using smart contracts with ERC-20 Token (Ethereum Request For Comments) and edge computing to construct a secure framework for IoT devices in Smart home system. The edge server provide scalability to the system by offloading heavier computation tasks to edge servers. We present system architecture and design and discuss various aspects related to testing and implementation of the smart contracts. We show that our proposed scheme is secure by thoroughly analysing its security goals with respect to confidentiality, integrity and availability. Finally, we conduct a performance evaluation to demonstrate the feasibility and efficiency of the proposed scheme.
机译:有广泛的应用涉及智能家居系统,以满足面向必要商品的用户舒适和可访问性。用户享受IOT Smart设备支持的特色家庭服务。这些物联网设备是resourcoonstrow,无法保护自己,并且可以容易地被攻击。边缘计算可以提供本地化计算和存储,这可能会增加IOT设备的这种容量限制。此外,BloctChain已成为具有能力的技术,以便以分散的方式为IOT设备提供安全访问和认证。在本文中,我们提出了一种认证方案,使用智能合同与ERC-20令牌(Ethereum请求进行评论)和边缘计算来构建基于属性的访问控制,以构建智能家居系统中的IOT设备的安全框架。边缘服务器通过将更重的计算任务卸载到边缘服务器来为系统提供可扩展性。我们呈现系统架构和设计,讨论与测试和实施相关的智能合同的各个方面。我们表明,我们的拟议计划是通过彻底分析其安全目标以及保密,完整性和可用性来确保。最后,我们进行绩效评估,以证明拟议计划的可行性和效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号