A user terminal in which the terminal block hash value and user information identical to the hash value of the N-1 block, which is the last block constituting the block chain, are stored; A server connected to the user terminal through a network; And a plurality of IoT devices connected to the server through a network and storing IoT block hash values and IoT device information equal to the hash value of the N-1 block, which is the last block constituting the block chain. The user terminal generates control data and a first random number for controlling any one of the plurality of IoT devices by a user's manipulation, and the terminal block hash value, user information, and any one of the IoT devices The first sub-block including the IoT device information, the first random number, and the control data of is generated and transmitted to the server, and the server is the user through the terminal block hash value included in the first sub-block. After verifying the validity of the terminal, a request for generation of a second sub-block is requested from one of the IoT devices, and the one of the IoT devices generates a second random number when requested to generate a second sub-block from the server. , A second sub-block including the IoT block hash value, IoT device information, and a second random number is generated and transmitted to the server, and the server is configured to use the IoT block hash value included in the second sub-block. After verifying the validity of the one IoT device, the control data is transmitted to the one IoT device, and the IoT device performs an operation according to the contents of the control data when the control data is received. By providing a remote control system for IoT devices and a method for remote control of IoT devices, the hash value of the last block stored in the user terminal and the IoT device and the hash value of the last block calculated from the block chain stored in the block chain storage are stored in the IoT device control process. By making a comparison, the validity of the user terminal and the IoT device can be verified. Through this, it is possible to ensure safety from external attacks such as hacking that may occur in the process of remote control of IoT devices, thereby enhancing security.
展开▼