CN109639646B - Block chain-based Internet of things safety detection method and system - Google Patents
Block chain-based Internet of things safety detection method and system Download PDFInfo
- Publication number
- CN109639646B CN109639646B CN201811364378.4A CN201811364378A CN109639646B CN 109639646 B CN109639646 B CN 109639646B CN 201811364378 A CN201811364378 A CN 201811364378A CN 109639646 B CN109639646 B CN 109639646B
- Authority
- CN
- China
- Prior art keywords
- internet
- things
- detection
- service provider
- report
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a block chain-based Internet of things safety detection method and system, wherein the method comprises the following steps: the service provider of the Internet of things generates a system release statement and broadcasts the system release statement to the Internet of things in the form of an intelligent contract, and the intelligent contract comprises a guarantee fund paid by the provider; the Internet of things safety detection equipment verifies whether the system issued statement is true, and if true, the system issued statement is recorded in a block chain; the detection equipment acquires and detects a corresponding Internet of things system, and generates a first detection report when detecting a bug; the provider verifies the report, records the report in the blockchain if the report is true and generates a second detection report, verifies the authenticity and correctness of the report, and records the report in the blockchain if the report is true and correct; triggering an intelligent contract and distributing the deposit to corresponding detection equipment; and selecting the system for installation and use by inquiring the detection report. The detection method improves the integrity of vulnerability detection, enhances the ecological security of the Internet of things, and has strong detection capability and high fault tolerance rate.
Description
Technical Field
The invention relates to the technical field of Internet of things safety, in particular to a block chain-based Internet of things safety detection method and system.
Background
With the development of the technology of the internet of things, the scale of the internet of things is continuously enlarged, and the quantity of the equipment of the internet of things is expected to reach 281 billions in 2020. However, the internet of things system has vulnerability, the potential safety hazard of the internet of things system is an important factor for restricting the development of the internet of things technology, and the distributed denial of service attack caused by the devices has strong destructive power due to the huge number of the devices of the internet of things.
Aiming at the potential safety hazard of the Internet of things, the security detection technology of the Internet of things system is continuously developed, and the security detection mainly has the following defects: firstly, centralized security detection cannot well detect all vulnerabilities due to the differentiation of detection capabilities of each detection service; and distributed security detection improves the vulnerability detection capability, but cannot guarantee that the detection result has better fault tolerance, and meanwhile, an incentive mechanism for attracting vulnerability detectors to participate is also lacked. In summary, although the development of system vulnerability detection technology continuously improves vulnerability detection capability, it still cannot inhibit malicious attackers from publishing unsafe systems.
The blockchain technology is proposed in a paper of the chinese scholars in 2008, a decentralization distributed ledger is realized by adopting a consensus mechanism, distributed data storage and a point-to-point transmission technology, and the blockchain technology has a characteristic of being not falsifiable after introducing a cryptography related technology. The Etheng expands the technology of the block chain in the bit currency, and introduces an intelligent contract development language with complete pictures, so that the block chain technology jumps out of the currency circle and enters various technical fields. The application research of the blockchain technology in the aspect of the internet of things is gradually developed and made a certain progress, but the blockchain technology is not used for the research in the aspect of distributed detection of vulnerabilities of the internet of things system.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, one object of the present invention is to provide a block chain-based security detection method for the internet of things, which solves the problem of incomplete vulnerability detection in the internet of things, constrains behaviors of service providers of the internet of things, improves the integrity of vulnerability detection, enhances the ecological security of the internet of things, and has strong detection capability and high fault tolerance rate.
The invention also aims to provide a block chain-based Internet of things security detection system.
In order to achieve the above object, an embodiment of the invention provides a block chain-based security detection method for an internet of things, including: s1, the service provider of the Internet of things generates a system issuing statement, the system issuing statement is broadcasted to the whole Internet of things in the form of an intelligent contract, and the intelligent contract comprises a guarantee paid by the service provider of the Internet of things for issuing the system issuing statement; s2, the Internet of things safety detection equipment verifies whether the system release statement is true, and when the system release statement is verified to be true, the system release statement is recorded in a block chain; s3, the Internet of things safety detection equipment acquires a corresponding Internet of things system according to the system release statement in the block chain, detects the Internet of things system, and generates a first detection report when detecting that the Internet of things system has a leak; s4, the service provider of internet of things verifies whether the first detection report is true, when the first detection report is verified to be true, the first detection report is recorded in the blockchain, the security detection device of internet of things generates and submits a second detection report, the service provider of internet of things verifies the authenticity and correctness of the second detection report, and when the second detection report is verified to be true and correct, the service provider of internet of things records the second detection report in the blockchain; s5, triggering the intelligent contract, and distributing the guarantee fund paid by the service provider of the Internet of things for issuing the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has a vulnerability in the form of the reward fund; and S6, the user of the Internet of things selects the safe and credible Internet of things system to install and use by inquiring the second detection report recorded in the block chain.
According to the block chain-based Internet of things security detection method, an automatic incentive mechanism is established, and Internet of things security detection equipment is attracted to participate in security detection of an Internet of things system, so that the problem of incomplete vulnerability detection in the Internet of things is solved, the behavior of an Internet of things service provider is further restrained, the completeness of vulnerability detection is improved, the ecological security of the Internet of things is enhanced, and the detection capability and the fault tolerance rate are high.
In addition, the block chain-based internet of things security detection method according to the embodiment of the present invention may further have the following additional technical features:
further, in an embodiment of the present invention, S2 further includes: s21, the Internet of things safety detection equipment detects the integrity of the system release statement, calculates the identifier in the system release statement, compares the identifier with the received identifier in the system release statement, and executes S22 if the identifiers are equal to each other; s22, the Internet of things safety detection device detects the authenticity of the system release statement, the public key of the Internet of things service provider is utilized to verify the signature of the Internet of things service provider, if the signature of the Internet of things service provider passes more than half of the verification of the Internet of things safety detection device, the system release statement is true, and the system release statement is recorded in the block chain.
Further, in an embodiment of the present invention, S3 further includes: s31, the Internet of things safety detection equipment downloads the corresponding Internet of things system according to the download link in the system release statement, and carries out safety scanning and detection on the Internet of things system; s32, when a vulnerability is detected in the Internet of things system, the Internet of things safety detection equipment generates the first detection report containing the hash value of the detection result and submits the first detection report to the Internet of things service provider.
Further, in an embodiment of the present invention, S4 further includes: s41, the service provider of the Internet of things verifies the authenticity of the first detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, and if the signature passes the verification, S42 is executed; s42, the service provider of the Internet of things calculates the identification of the safety detection equipment of the Internet of things, compares the identification with the identification of the safety detection equipment of the Internet of things in the received first detection report, and if the identification is equal, executes S43; s43, recording the first detection report in the block chain and generating a second detection report containing a detailed detection result hash value; s44, the service provider of the Internet of things verifies the authenticity of the second detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, and if the signature passes the verification, S45 is executed; s45, the service provider of the Internet of things calculates the hash value of the second detection report and compares the hash value with the hash value in the received second detection report, if the hash value is equal to the hash value in the second detection report, the service provider of the Internet of things executes S46; s46, the service provider of the Internet of things verifies the correctness of the second detection report, and if the verification is passed, S47 is executed; s47, recording the second detection report in the block chain.
Further, in an embodiment of the present invention, S5 further includes: s51, the second detection report is recorded in the block chain, and the intelligent contract is triggered; and S52, the intelligent contract distributes the guarantee fund in the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has a vulnerability, and the service provider of the Internet of things takes the loss of the guarantee fund as a penalty for issuing the Internet of things system with the vulnerability.
In order to achieve the above object, an embodiment of another aspect of the present invention provides a block chain-based security detection system for internet of things, including: the issuing module is used for generating a system issuing statement by an Internet of things service provider, wherein the system issuing statement is broadcasted to the whole Internet of things in the form of an intelligent contract, and the intelligent contract comprises a guarantee paid by the Internet of things service provider for issuing the system issuing statement; the first detection module is used for verifying whether the system issuing statement is true by the Internet of things safety detection equipment and recording the system issuing statement in a block chain when the system issuing statement is verified to be true; the second detection module is used for acquiring a corresponding Internet of things system by the Internet of things safety detection equipment according to the system release statement in the block chain, detecting the Internet of things system and generating a first detection report when detecting that the Internet of things system has a bug; a third detection module, configured to verify, by the service provider of the internet of things, whether the first detection report is true, record the first detection report in the blockchain when the first detection report is verified to be true, generate and submit a second detection report by the security detection device of the internet of things, verify, by the service provider of the internet of things, authenticity and correctness of the second detection report, and record the second detection report in the blockchain when the second detection report is verified to be true and correct; the reward module is used for triggering the intelligent contract and distributing the guarantee fund paid by the service provider of the Internet of things for issuing the system issuing statement to the Internet of things safety detection equipment for detecting that the Internet of things system has a leak in the form of reward fund; and the application module is used for the Internet of things user to select the safe and credible Internet of things system for installation and use by inquiring the second detection report recorded in the block chain.
According to the block chain-based Internet of things security detection system, an automatic incentive mechanism is established, so that the Internet of things security detection equipment is attracted to participate in security detection of the Internet of things system, the problem of incomplete vulnerability detection in the Internet of things is solved, the behavior of an Internet of things service provider is further restrained, the completeness of vulnerability detection is improved, the ecological security of the Internet of things is enhanced, and the detection capability and the fault tolerance rate are high.
In addition, the block chain based internet of things security detection system according to the above embodiment of the present invention may further have the following additional technical features:
further, in an embodiment of the present invention, the first detection module is further configured to detect integrity of the system release declaration by the internet of things security detection device, calculate an identifier in the system release declaration, compare the identifier with the received identifier in the system release declaration, detect authenticity of the system release declaration by the internet of things security detection device if the identifiers are equal to each other, verify a signature of the internet of things service provider by using a public key of the internet of things service provider, and record the system release declaration in the block chain if the signature of the internet of things service provider passes verification of more than half of the internet of things security detection devices.
Further, in an embodiment of the present invention, the second detection module is further configured to, the internet-of-things security detection device downloads the corresponding internet-of-things system according to a download link in the system issuance statement, and performs security scanning and detection on the internet-of-things system; when a vulnerability is detected in the IOT system, the IOT safety detection equipment generates a first detection report containing a detection result hash value and submits the first detection report to the IOT service provider.
Further, in an embodiment of the present invention, the third detection module is further configured to verify, by the service provider of the internet of things, the authenticity of the first detection report, verify, using a public key of the security detection device of the internet of things, a signature calculated by the security detection device of the internet of things using a private key, if the signature passes the verification, calculate the identifier of the security detection device of the internet of things, compare the identifier with the identifier of the security detection device of the internet of things in the received first detection report, and if the identifiers are equal to each other, record the first detection report in the block chain and generate a second detection report containing a hash value of a detailed detection result; the service provider of the Internet of things checks the authenticity of the second detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, if the signature passes the verification, the service provider of the Internet of things calculates the hash value of the second detection report and compares the hash value with the received hash value in the second detection report, if the signature is equal to the hash value, the service provider of the Internet of things verifies the correctness of the second detection report, and if the signature passes the verification, the service provider of the Internet of things records the second detection report in the block chain.
Further, in an embodiment of the present invention, the reward module is further configured to record that the second detection report is in the blockchain, and trigger the smart contract; and the intelligent contract distributes the guarantee fund in the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has the vulnerability, and the service provider of the Internet of things takes the loss of the guarantee fund as a penalty for issuing the Internet of things system with the vulnerability.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a block chain-based security detection method for the internet of things according to an embodiment of the present invention;
fig. 2 is a flowchart of a block chain-based security detection method for the internet of things according to an embodiment of the present invention;
FIG. 3 is an IOT service provider system layout according to one embodiment of the present invention;
fig. 4 is a diagram of a detection report submitted by a security detection device of the internet of things according to an embodiment of the invention;
FIG. 5 is a block chain structure with detection reports according to an embodiment of the present invention;
fig. 6 is a flowchart of a block chain-based security detection method for the internet of things according to an embodiment of the present invention;
fig. 7 is a flowchart illustrating key steps of a block chain-based security detection method for the internet of things according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a block chain-based security detection system of the internet of things according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
The method and system for detecting the security of the internet of things based on the block chain according to the embodiment of the invention are described below with reference to the accompanying drawings, and first, the method for detecting the security of the internet of things based on the block chain according to the embodiment of the invention is described with reference to the accompanying drawings.
As shown in fig. 1, the security detection method of the internet of things includes three roles: (1) the service provider of the Internet of things comprises an Internet of things manufacturer, a third-party software and hardware market and the like, and is mainly responsible for creating and maintaining an Internet of things system and a block chain account book; (2) the Internet of things safety detection equipment comprises a plurality of Internet of things safety detection manufacturers, Internet of things safety detectors, Internet of things equipment with safety detection capability and the like; (3) the internet of things equipment and the user are mainly responsible for installing the published internet of things system and hope to obtain corresponding security feedback (such as a security detection result aiming at a certain internet of things system).
Fig. 2 is a flowchart of a block chain-based security detection method for the internet of things according to an embodiment of the present invention.
As shown in fig. 2, the block chain-based internet of things security detection method includes the following steps:
in step S1, the service provider of the internet of things generates a system issuance statement, which is broadcast to the entire internet of things in the form of an intelligent contract, and the intelligent contract contains the deposit paid by the service provider of the internet of things for issuing the issuance statement.
Specifically, the service provider generation system of the internet of things issues a statement Δ, Δ is broadcast to the whole internet of things in the form of an intelligent contract, and the format of Δ is ═ Δid,Pi,Un,Uv,Uh,Ul,Ii,PsignIn which P isiIs the only identification, U, of each service provider of the Internet of thingsn、Uv、Uh、UlName, version, hash value and download link, I, of the system of the Internet of thingsiThe system is characterized in that an Internet of things service provider submits a guarantee fund while releasing the system, and when a vulnerability of the released Internet of things system is detected, the guarantee fund is distributed to corresponding detection equipment in an incentive mode to be used as a reward; deltaidIssuing a unique identifier of a declaration delta for the system, the value of which is a six-element group Pi,Un,Uv,Uh,Ul,IiHash value of, i.e. deltaid=H(Pi||Un||Uv||Uh||Ul||Ii),PsignTo issue a signature of the IOT service provider of the system, the signature is signed by the IOT service provider private key skPiIs obtained by calculation, i.e.
In step S2, the internet of things security detection device verifies whether the system issuance statement is true, and records the system issuance statement in the blockchain when the system issuance statement is true.
Further, in an embodiment of the present invention, the method may further include:
s21, the Internet of things safety detection equipment detects the integrity of the system issued declaration, calculates the identification in the system issued declaration, compares the identification with the identification in the received system issued declaration, and executes S22 if the identification is equal to the identification;
and S22, detecting the authenticity of the system release statement by the Internet of things safety detection equipment, verifying the signature of the Internet of things service provider by using the public key of the Internet of things service provider, and if the signature of the Internet of things service provider passes the verification of more than half of the Internet of things safety detection equipment, judging that the system release statement is true, and recording the system release statement in a block chain.
Specifically, after receiving the system release statement Δ, the internet of things detection device detects the integrity of Δ, i.e., recalculates Δid=(Pi||Un||Uv||Uh||Ul||Ii) And is related to a of the received deltasidComparing, if they are not equal, discarding the received delta, and if they are equal, detecting the authenticity of delta, i.e. using the public key pkP of the service provider of the internet of thingsiFor signature PsignPerforming verification when signing PsignWhen the verification of more than half of detection devices is carried out, the system issuing declaration delta is true, the occurrence of a spoofing attack is avoided, and meanwhile, the delta is recorded in a block chain.
As shown in fig. 3, it can be appreciated that the system issues the specific value Δ ═ { Δ ═ Δ @id,Pi,Un,Uv,Uh,Ul,Ii,PsignBroadcasting is carried out in the form of, after receiving delta, the Internet of things safety detection equipment firstly broadcasts the deltaidAnd PsignPerforming authenticity verification, if the verification is passed, the verification will beThe verification results are submitted to a plurality of IOT service providers, and the IOT service providers determine whether to write the system release into the block chain according to the number of the received verification results. Fig. 1 includes 6 internet of things detection devices, if Δ exceeds the verification of 3 detection devices, the internet of things service provider writes the system release Δ into the blockchain, otherwise, the system release Δ is invalid.
In step S3, the internet of things security detection device obtains a corresponding internet of things system according to the system issuance statement in the block chain, detects the internet of things system, and generates a first detection report when detecting that a vulnerability exists in the internet of things system.
Further, in an embodiment of the present invention, the method may further include:
s31, the Internet of things safety detection equipment downloads the corresponding Internet of things system according to the download link in the system release statement, and carries out safety scanning and detection on the Internet of things system;
s32, when a vulnerability is detected in the Internet of things system, the Internet of things safety detection equipment generates a first detection report containing a detection result hash value and submits the first detection report to the Internet of things service provider.
Specifically, after the release statement Δ of the internet of things system is recorded in the blockchain, the detection device of the internet of things detects U in the ΔlDownloading a corresponding Internet of things system, and carrying out security scanning and detection on the system, wherein when a bug is detected in the Internet of things system, detection equipment needs to submit a detection report containing a detection result, but in order to prevent the detection result from being plagiarized, the detection equipment needs to submit an initial detection reportThe report only contains the hash value of the detection result, and does not contain the detailed detection result, and the specific format is as follows:wherein D isiIs the identification of the safety detection equipment of the Internet of things,is the second detection reportThe hash value of (a) of (b),is the wallet address of the security detection equipment of the internet of things,is composed ofCan be identified by a quadruplet of delta, Di,Obtained by a hash calculation, i.e. Using its private key skD for a detection deviceiThe calculated signature is specifically calculated by the following formula:when in useAfter being recorded in the block chain, the detection equipment submits a second detection reportWhere Des is the detailed result of the detection,is composed ofCan be identified by a quadruplet of delta, Di,Des is obtained by Hash calculation, i.e. Using its private key skD for a detection deviceiCalculated signatures, i.e.
In step S4, the service provider of the internet of things verifies whether the first detection report is true, records the first detection report in the blockchain when the first detection report is verified to be true, generates and submits a second detection report, verifies the authenticity and correctness of the second detection report, and records the second detection report in the blockchain when the second detection report is verified to be true and correct.
Further, in an embodiment of the present invention, the method may further include:
s41, the Internet of things service provider checks the authenticity of the first detection report, the public key of the Internet of things safety detection equipment is used for verifying the signature calculated by the Internet of things safety detection equipment by using the private key, and if the signature passes the verification, S42 is executed;
s42, the service provider of the Internet of things calculates the identification of the safety detection equipment of the Internet of things, compares the identification with the identification of the safety detection equipment of the Internet of things in the received first detection report, and if the identification is equal, executes S43;
s43, recording the first detection report in the block chain and generating a second detection report containing the hash value of the detailed detection result;
s44, the Internet of things service provider verifies the authenticity of the second detection report, the public key of the Internet of things safety detection equipment is used for verifying the signature calculated by the Internet of things safety detection equipment by using the private key, and if the signature passes the verification, S45 is executed;
s45, the service provider of the Internet of things calculates the hash value of the second detection report and compares the hash value with the hash value in the received second detection report, and if the hash value is equal to the hash value in the received second detection report, the service provider of the Internet of things executes S46;
s46, the service provider of the Internet of things verifies the correctness of the second detection report, and if the verification is passed, S47 is executed;
s47, recording the second detection report in the block chain.
Specifically, after receiving the first detection report, each internet of things service provider verifies the signature by using the corresponding public keyComputing after passing verificationAnd are combined withComparing, and reporting the initial detection report through a PoW consensus mechanism if the two are equalRecorded in the blockchain, and after receiving the second detection report, each IOT service provider verifies the signature by using the corresponding public keyAfter the verification is passed, calculatingAnd are combined withComparing, if equal, the service provider of the Internet of things is rightThe detection result Des in (1) is subjected to correctness verification, and if the detection results in the Des are all correct, the final detection is carried out through a Proof Of Work (PoW for short) consensus mechanismTest reportRecorded in a blockchain.
In step S5, an intelligent contract is triggered, and a guarantee fund paid by an internet of things service provider for issuing a statement to an issuing system is distributed in the form of a reward fund to the internet of things security detection device that detects that a vulnerability exists in the internet of things system.
In particular, the second detection reportThe system issuing statement delta is recorded in a blockchain, an intelligent contract of the recording system issuing statement delta is triggered, the triggered intelligent contract automatically distributes the deposit in the system issuing statement delta to corresponding detection equipment in an incentive mode, and meanwhile, the service provider of the Internet of things uses the lost payment deposit as a punishment due to the fact that the service provider of the Internet of things issues a leaky Internet of things system.
As shown in fig. 4, it can be understood that when the system release Δ is recorded in the blockchain, the internet of things detection device passes through U in the ΔlAnd downloading the data to a published Internet of things system, and carrying out security detection and scanning. When a vulnerability is discovered, the IOT detection equipment firstly submits an initial detection report containing a hash value of a detection resultThe detection reportAfter the authenticity verification is passed, the block chain of the initial detection report is logged into the block chain through PoW consensus, otherwise, the block chain of the initial detection report is discarded; then, the Internet of things detection equipment submits a final detection report containing detailed detection resultsThe detection reportAfter passing the authenticity verification and the correctness verificationThe block chain can be written into the block chain by the service provider of the Internet of things according to the PoW consensus, and otherwise, the block chain is discarded; and finally, after the detection report is recorded into the block chain, the corresponding system is automatically triggered to release the statement delta, and the guarantee fund submitted by the Internet of things system provider when the statement is released is automatically distributed to the detection equipment to serve as a reward.
In step S6, the user of the internet of things selects a safe and trusted system of the internet of things to install and use by querying the second detection report recorded in the block chain.
According to the embodiment of the invention, the system for detecting the release of the service provider of the Internet of things is introduced through the reward mechanism, so that the comprehensive safety feedback of the system of the Internet of things is favorably formed, the service provider of the Internet of things cannot easily release the system of the Internet of things with holes, the behavior of the service provider of the Internet of things is subject to safety constraint, the safety of the whole Internet of things can be improved, and a safer ecological system of the Internet of things is established.
The block chain based internet of things security detection method according to the embodiment of the invention is described in detail below with reference to the accompanying drawings.
As shown in fig. 5, a blockchain structure of a security detection report of an internet of things system is recorded, which mainly includes five items of a last blockmark, a timestamp, a random number, and a detection report. Wherein the last block mark is such that the blocks are linked to form a chain; the time stamp records the time of block creation; the detection report is submitted by the detection equipment and passes the verification, and all reports are linked in a Meckel tree form; the block mark is the hash value of the last block mark, the timestamp, the detection report and the random number, the service provider of the internet of things successfully creates the block by trying various random numbers to enable the hash value to meet a certain form and complete workload certification, and after the detection equipment submits the detection report, the service provider of the internet of things records the detection report passing authenticity verification and correctness verification in a block chain.
Fig. 6 and fig. 7 show a fine-grained and coarse-grained flow chart of the block chain-based security detection method for the internet of things, respectively, and it can be seen from the flow chart that when a detection report is recorded in the block chain, a system release statement Δ stored in an intelligent contract form is triggered, and a guarantee fund paid by an internet of things service provider is issued to an internet of things detection device in an incentive form. Meanwhile, the Internet of things equipment and the user can inquire detection results recorded in the block chain and select a safer and more credible Internet of things system for installation and use.
From the specific implementation mode, the block chain-based internet of things security detection method introduces an intelligent contract to collect the guarantee money from the internet of things provider of the publishing system and distribute the guarantee money to the detection equipment for detecting the security hidden trouble of the system, introduces a form of submitting detection reports in stages to avoid plagiarism, counterfeiting and other behaviors possibly occurring between the detection equipment, and enables the internet of things service provider to detect the detection result and maintain the related block chain.
In conclusion, the method can realize the lightweight detection of the detection equipment of the Internet of things system and the fair and fair distribution of certain rewards while striking the Internet of things service provider who issues the unsafe system, thereby achieving the purposes of inhibiting bad system providers and attracting more detection equipment to join in the system safety detection, enabling users to obtain more authoritative system safety evaluation and being beneficial to creating a safer Internet of things environment.
According to the block chain-based Internet of things security detection method, an automatic incentive mechanism is established, and Internet of things security detection equipment is attracted to participate in security detection of an Internet of things system, so that the problem of incomplete vulnerability detection in the Internet of things is solved, the behavior of an Internet of things service provider is further restrained, the completeness of vulnerability detection is improved, the ecological security of the Internet of things is enhanced, and the detection capability and the fault tolerance rate are high.
Next, a block chain-based internet of things security detection system proposed according to an embodiment of the present invention is described with reference to the drawings.
Fig. 8 is a schematic structural diagram of a block chain-based internet of things security detection system according to an embodiment of the present invention.
As shown in fig. 8, the block chain based internet of things security detection system 10 includes: a publication module 100, a first detection module 200, a second detection module 300, a third detection module 400, a reward module 500, and an application module 600.
The issuing module 100 is used for the service provider of the internet of things to generate a system issuing statement, the system issuing statement is broadcast to the whole internet of things in the form of an intelligent contract, and the intelligent contract contains a guarantee paid by the service provider of the internet of things for issuing the statement.
The first detection module 200 is used for verifying whether the system issued declaration is true by the internet of things security detection device, and recording the system issued declaration in the blockchain when the system issued declaration is true.
The second detection module 300 is configured to, by the security detection device of the internet of things, obtain a corresponding internet of things system according to the system issuance statement in the block chain, detect the internet of things system, and generate a first detection report when detecting that a bug exists in the internet of things system.
The third detection module 400 is configured to verify whether the first detection report is true by the service provider of the internet of things, record the first detection report in the blockchain when the first detection report is verified to be true, generate and submit a second detection report including a hash value of the detailed detection result by the security detection device of the internet of things, verify authenticity and correctness of the second detection report by the service provider of the internet of things, and record the second detection report in the blockchain when the second detection report is verified to be true and correct.
The reward module 500 is configured to trigger an intelligent contract, and distribute a guarantee fund paid by an internet of things service provider for issuing a statement for an issuing system to the internet of things security detection device that detects that a vulnerability exists in the internet of things system in the form of a reward fund.
The application module 600 is used for the internet of things user to select a safe and reliable internet of things system for installation and use by querying the second detection report recorded in the block chain. The block chain-based Internet of things security detection system 10 solves the problem of incomplete vulnerability detection in the Internet of things, restrains behaviors of service providers of the Internet of things, improves completeness of vulnerability detection, enhances ecological security of the Internet of things, and is high in detection capability and fault tolerance rate.
Further, in an embodiment of the present invention, the first detection module is further configured to detect integrity of a system release declaration by the internet of things security detection device, issue a flag in the declaration by the computing system, compare the flag with a received flag in the system release declaration, detect authenticity of the system release declaration by the internet of things security detection device if the flag is equal to the received flag in the system release declaration, verify a signature of the internet of things service provider by using a public key of the internet of things service provider, verify that the system release declaration is true if the signature of the internet of things service provider passes verification of more than half of the internet of things security detection devices, and record the system release declaration in the block chain.
Further, in an embodiment of the present invention, the second detection module is further configured to download, by the internet-of-things security detection device, the corresponding internet-of-things system according to the download link in the system release statement, and perform security scanning and detection on the internet-of-things system; when a vulnerability is detected in the Internet of things system, the Internet of things safety detection equipment generates a first detection report containing a detection result hash value and submits the first detection report to an Internet of things service provider.
Further, in an embodiment of the present invention, the third detection module is further configured to verify authenticity of the first detection report by the service provider of the internet of things, verify a signature calculated by the security detection device of the internet of things using a private key by using a public key of the security detection device of the internet of things, calculate an identifier of the security detection device of the internet of things if the signature passes the verification, compare the identifier with the identifier of the security detection device of the internet of things in the received first detection report, and if the identifier is equal to the identifier of the security detection device of the internet of things in the received first detection report, record the first detection report in a block chain and generate a second detection report containing a hash value; and the service provider of the Internet of things checks the authenticity of the second detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, if the signature passes the verification, the service provider of the Internet of things calculates the hash value of the second detection report and compares the hash value with the hash value in the received second detection report, if the hash value is equal to the hash value, the service provider of the Internet of things verifies the correctness of the second detection report, and if the signature passes the verification, the service provider of the Internet of things records the second detection report in a block chain.
Further, in an embodiment of the present invention, the reward module is further configured to record that the second detection report is in the blockchain, and trigger the smart contract; and the intelligent contract distributes the guarantee fund in the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has the vulnerability, and the service provider of the Internet of things takes the loss of the guarantee fund as a punishment because of issuing the Internet of things system with the vulnerability.
It should be noted that the foregoing explanation of the embodiment of the block chain-based internet of things security detection method is also applicable to the system of the embodiment, and details are not described here.
According to the block chain-based Internet of things security detection system provided by the embodiment of the invention, an automatic incentive mechanism is established, so that the Internet of things security detection equipment is attracted to participate in the security detection of the Internet of things system, the problem of incomplete vulnerability detection in the Internet of things is solved, the behavior of an Internet of things service provider is further restrained, the completeness of vulnerability detection is improved, the ecological security of the Internet of things is enhanced, and the detection capability and the fault tolerance rate are high.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (10)
1. A block chain-based Internet of things safety detection method is characterized by comprising the following steps:
s1, the service provider of the Internet of things generates a system issuing statement, the system issuing statement is broadcasted to the whole Internet of things in the form of an intelligent contract, and the intelligent contract comprises a guarantee paid by the service provider of the Internet of things for issuing the system issuing statement;
s2, the Internet of things safety detection equipment verifies whether the system release statement is true, and when the system release statement is verified to be true, the system release statement is recorded in a block chain;
s3, the Internet of things safety detection equipment acquires a corresponding Internet of things system according to the system release statement in the block chain, detects the Internet of things system, and generates a first detection report when detecting that the Internet of things system has a leak;
s4, the service provider of internet of things verifies whether the first detection report is true, when the first detection report is verified to be true, the first detection report is recorded in the blockchain, the security detection device of internet of things generates and submits a second detection report, the service provider of internet of things verifies the authenticity and correctness of the second detection report, and when the second detection report is verified to be true and correct, the service provider of internet of things records the second detection report in the blockchain;
s5, triggering the intelligent contract, and distributing the guarantee fund paid by the service provider of the Internet of things for issuing the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has a vulnerability in the form of the reward fund;
and S6, the user of the Internet of things selects the safe and credible Internet of things system to install and use by inquiring the second detection report recorded in the block chain.
2. The block chain based internet of things security detection method of claim 1, wherein the S2 further comprises:
s21, the Internet of things safety detection equipment detects the integrity of the system release statement, calculates the identifier in the system release statement, compares the identifier with the received identifier in the system release statement, and executes S22 if the identifiers are equal to each other;
s22, the Internet of things safety detection device detects the authenticity of the system release statement, the public key of the Internet of things service provider is utilized to verify the signature of the Internet of things service provider, if the signature of the Internet of things service provider passes more than half of the verification of the Internet of things safety detection device, the system release statement is true, and the system release statement is recorded in the block chain.
3. The block chain based internet of things security detection method of claim 1, wherein the S3 further comprises:
s31, the Internet of things safety detection equipment downloads the corresponding Internet of things system according to the download link in the system release statement, and carries out safety scanning and detection on the Internet of things system;
s32, when a vulnerability is detected in the Internet of things system, the Internet of things safety detection equipment generates the first detection report containing the hash value of the detection result and submits the first detection report to the Internet of things service provider.
4. The block chain based internet of things security detection method of claim 1, wherein S4 further comprises:
s41, the service provider of the Internet of things verifies the authenticity of the first detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, and if the signature passes the verification, S42 is executed;
s42, the service provider of the Internet of things calculates the identification of the safety detection equipment of the Internet of things, compares the identification with the identification of the safety detection equipment of the Internet of things in the received first detection report, and if the identification is equal, executes S43;
s43, recording the first detection report in the block chain and generating a second detection report containing a detailed detection result hash value;
s44, the service provider of the Internet of things verifies the authenticity of the second detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, and if the signature passes the verification, S45 is executed;
s45, the service provider of the Internet of things calculates the hash value of the second detection report and compares the hash value with the hash value in the received second detection report, if the hash value is equal to the hash value in the second detection report, the service provider of the Internet of things executes S46;
s46, the service provider of the Internet of things verifies the correctness of the second detection report, and if the verification is passed, S47 is executed;
s47, recording the second detection report in the block chain.
5. The block chain based internet of things security detection method of claim 1, wherein the S5 further comprises:
s51, the second detection report is recorded in the block chain, and the intelligent contract is triggered;
and S52, the intelligent contract distributes the guarantee fund in the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has a vulnerability, and the service provider of the Internet of things takes the loss of the guarantee fund as a penalty for issuing the Internet of things system with the vulnerability.
6. The utility model provides a thing networking safety inspection system based on block chain which characterized in that includes:
the issuing module is used for generating a system issuing statement by an Internet of things service provider, wherein the system issuing statement is broadcasted to the whole Internet of things in the form of an intelligent contract, and the intelligent contract comprises a guarantee paid by the Internet of things service provider for issuing the system issuing statement;
the first detection module is used for verifying whether the system issuing statement is true by the Internet of things safety detection equipment and recording the system issuing statement in a block chain when the system issuing statement is verified to be true;
the second detection module is used for acquiring a corresponding Internet of things system by the Internet of things safety detection equipment according to the system release statement in the block chain, detecting the Internet of things system and generating a first detection report when detecting that the Internet of things system has a bug;
a third detection module, configured to verify, by the service provider of the internet of things, whether the first detection report is true, record the first detection report in the blockchain when the first detection report is verified to be true, generate and submit a second detection report by the security detection device of the internet of things, verify, by the service provider of the internet of things, authenticity and correctness of the second detection report, and record the second detection report in the blockchain when the second detection report is verified to be true and correct;
the reward module is used for triggering the intelligent contract and distributing the guarantee fund paid by the service provider of the Internet of things for issuing the system issuing statement to the Internet of things safety detection equipment for detecting that the Internet of things system has a leak in the form of reward fund;
and the application module is used for the Internet of things user to select the safe and credible Internet of things system for installation and use by inquiring the second detection report recorded in the block chain.
7. The block chain based Internet of things security detection system of claim 6, wherein the first detection module is further configured to,
the internet of things safety detection device detects the integrality of the system release statement, calculates the identification in the system release statement, compares the identification with the received identification in the system release statement, if the identifications are equal, the internet of things safety detection device detects the authenticity of the system release statement, utilizes the public key of the internet of things service provider to verify the signature of the internet of things service provider, if the signature of the internet of things service provider is more than half of the verification of the internet of things safety detection device, the system release statement is true, and the system release statement is recorded in the block chain.
8. The block chain based Internet of things security detection system of claim 6, wherein the second detection module is further configured to,
the Internet of things safety detection equipment downloads the corresponding Internet of things system according to the download link in the system release statement, and carries out safety scanning and detection on the Internet of things system;
when a vulnerability is detected in the IOT system, the IOT safety detection equipment generates a first detection report containing a detection result hash value and submits the first detection report to the IOT service provider.
9. The block chain based Internet of things security detection system of claim 6, wherein the third detection module is further configured to,
the service provider of the Internet of things checks the authenticity of the first detection report, verifies a signature calculated by the Internet of things safety detection equipment by using a private key by using a public key of the Internet of things safety detection equipment, if the signature passes the verification, calculates an identifier of the Internet of things safety detection equipment, compares the identifier with the identifier of the Internet of things safety detection equipment in the received first detection report, and if the identifier of the Internet of things safety detection equipment in the received first detection report is equal to the identifier of the Internet of things safety detection equipment in the received first detection report, records the first detection report in the block chain and generates a second detection report containing a detailed detection result hash value;
the service provider of the Internet of things checks the authenticity of the second detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, if the signature passes the verification, the service provider of the Internet of things calculates the hash value of the second detection report and compares the hash value with the received hash value in the second detection report, if the signature is equal to the hash value, the service provider of the Internet of things verifies the correctness of the second detection report, and if the signature passes the verification, the service provider of the Internet of things records the second detection report in the block chain.
10. The blockchain-based internet of things security detection system of claim 6, wherein the reward module is further configured to,
recording the second detection report in the block chain, and triggering the intelligent contract;
and the intelligent contract distributes the guarantee fund in the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has the vulnerability, and the service provider of the Internet of things takes the loss of the guarantee fund as a penalty for issuing the Internet of things system with the vulnerability.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811364378.4A CN109639646B (en) | 2018-11-16 | 2018-11-16 | Block chain-based Internet of things safety detection method and system |
PCT/CN2019/112322 WO2020098454A1 (en) | 2018-11-16 | 2019-10-21 | Method and system for detecting security of internet to things based on blockchain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811364378.4A CN109639646B (en) | 2018-11-16 | 2018-11-16 | Block chain-based Internet of things safety detection method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109639646A CN109639646A (en) | 2019-04-16 |
CN109639646B true CN109639646B (en) | 2020-04-24 |
Family
ID=66068201
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811364378.4A Active CN109639646B (en) | 2018-11-16 | 2018-11-16 | Block chain-based Internet of things safety detection method and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109639646B (en) |
WO (1) | WO2020098454A1 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109639646B (en) * | 2018-11-16 | 2020-04-24 | 清华大学 | Block chain-based Internet of things safety detection method and system |
CN110474868B (en) * | 2019-06-27 | 2022-12-16 | 山东安畅物联网科技有限公司 | Internet of things environment safety detection method and system based on block chain excitation mechanism |
WO2019170173A2 (en) * | 2019-06-27 | 2019-09-12 | Alibaba Group Holding Limited | Managing cybersecurity vulnerabilities using blockchain networks |
EP3673432B1 (en) | 2019-06-27 | 2021-11-03 | Advanced New Technologies Co., Ltd. | Implementing a blockchain-based workflow |
CN110490613B (en) * | 2019-08-27 | 2023-05-05 | 浪潮卓数大数据产业发展有限公司 | Block chain-based product detection method and system |
US20210126937A1 (en) * | 2019-10-28 | 2021-04-29 | General Electric Company | Cyber-security improvement platform utilizing a secure, distributed transaction ledger |
CN113032490B (en) * | 2019-12-05 | 2022-07-12 | 腾讯科技(深圳)有限公司 | Contract data processing method, related equipment and medium |
CN111327425B (en) * | 2020-01-20 | 2021-04-27 | 福州大学 | Vehicle information safety broadcasting excitation system based on bitcoin and working method thereof |
CN111585984B (en) * | 2020-04-24 | 2021-10-26 | 清华大学 | Decentralized security guarantee method and device for packet full life cycle |
CN113536321B (en) * | 2021-07-16 | 2023-10-20 | 华北电力科学研究院有限责任公司 | Vulnerability detection method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107566381A (en) * | 2017-09-12 | 2018-01-09 | 中国联合网络通信集团有限公司 | Equipment safety control method, apparatus and system |
CN108388806A (en) * | 2018-02-12 | 2018-08-10 | 徐正伟 | A kind of Internet of Things security hardening based on block chain and data Right protection device |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106462841A (en) * | 2014-03-27 | 2017-02-22 | 诺基亚技术有限公司 | Method and apparatus for automatic inter-device authorisation |
US10275772B2 (en) * | 2014-06-16 | 2019-04-30 | Bank Of America Corporation | Cryptocurrency risk detection system |
US9792742B2 (en) * | 2016-02-02 | 2017-10-17 | Live Nation Entertainment, Inc. | Decentralized virtual trustless ledger for access control |
CN106204057A (en) * | 2016-06-27 | 2016-12-07 | 惠众商务顾问(北京)有限公司 | Physical message accidental validation block chain method for anti-counterfeit, system and device |
US20180315055A1 (en) * | 2017-05-01 | 2018-11-01 | International Business Machines Corporation | Blockchain For Issue/Defect Tracking System |
CN107346482A (en) * | 2017-05-12 | 2017-11-14 | 深圳蜂链科技有限公司 | The method and device that block chain is docked, verifies, known together with the outer data of chain |
CN107171794B (en) * | 2017-06-27 | 2019-10-22 | 葛峰 | A kind of electronic document signature method based on block chain and intelligent contract |
CN107819848A (en) * | 2017-11-08 | 2018-03-20 | 济南浪潮高新科技投资发展有限公司 | A kind of internet of things equipment autonomy interconnected method based on block chain |
CN108196872A (en) * | 2017-12-27 | 2018-06-22 | 邵美 | The upgrade method of intelligent contract in a kind of block catenary system |
CN108737370B (en) * | 2018-04-05 | 2020-10-16 | 西安电子科技大学 | Block chain-based Internet of things cross-domain authentication system and method |
CN109639646B (en) * | 2018-11-16 | 2020-04-24 | 清华大学 | Block chain-based Internet of things safety detection method and system |
-
2018
- 2018-11-16 CN CN201811364378.4A patent/CN109639646B/en active Active
-
2019
- 2019-10-21 WO PCT/CN2019/112322 patent/WO2020098454A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107566381A (en) * | 2017-09-12 | 2018-01-09 | 中国联合网络通信集团有限公司 | Equipment safety control method, apparatus and system |
CN108388806A (en) * | 2018-02-12 | 2018-08-10 | 徐正伟 | A kind of Internet of Things security hardening based on block chain and data Right protection device |
Also Published As
Publication number | Publication date |
---|---|
WO2020098454A1 (en) | 2020-05-22 |
CN109639646A (en) | 2019-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109639646B (en) | Block chain-based Internet of things safety detection method and system | |
Lin et al. | BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks | |
Nikitin et al. | {CHAINIAC}: Proactive {Software-Update} transparency via collectively signed skipchains and verified builds | |
Koteska et al. | Blockchain implementation quality challenges: a literature | |
EP3563553B1 (en) | Method for signing a new block in a decentralized blockchain consensus network | |
CN109889497B (en) | Distrust-removing data integrity verification method | |
WO2020015635A1 (en) | Distributed voting system, method and apparatus, and computer device and readable storage medium | |
CN108846673B (en) | Block data processing method, device, equipment and storage medium | |
CN111079136B (en) | Fog computing intrusion detection feature sharing system based on block chain technology | |
KR100350841B1 (en) | Original data circulation method, system, apparatus, and computer readable medium | |
CN110443075A (en) | A kind of method and device of block chain intelligence contract verifying deployment | |
Yan et al. | Social-chain: Decentralized trust evaluation based on blockchain in pervasive social networking | |
WO2020057757A1 (en) | Method for signing a new block in a decentralized blockchain consensus network | |
CN106209379A (en) | A kind of Android APK countersignature verification method | |
CN113723962B (en) | Block chain authority management method and block chain system | |
JP2010508567A (en) | Disabling malware on computing devices | |
Cao et al. | A blockchain-based access control and intrusion detection framework for satellite communication systems | |
CN113010906B (en) | Trusted data tracing method and system based on blockchain | |
JP2023530594A (en) | Permitted Event Processing in Distributed Databases | |
US8214634B1 (en) | Establishing trust via aggregate peer ranking | |
Xia et al. | Trust in Software Supply Chains: Blockchain-Enabled SBOM and the AIBOM Future | |
KR20190045754A (en) | Method for managing license of software based on blockchain, and license management server using the same | |
Wu et al. | Privacy-preserving and Traceable Blockchain-based Charging Payment Scheme for Electric Vehicles | |
Javed et al. | Secure message handling in vehicular energy networks using blockchain and artificially intelligent IPFS | |
Chen et al. | Towards Reliable Utilization of AIGC: Blockchain-Empowered Ownership Verification Mechanism |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |