CN115052009A - Network function virtualization data protection method and system based on double-chain block chain - Google Patents

Network function virtualization data protection method and system based on double-chain block chain Download PDF

Info

Publication number
CN115052009A
CN115052009A CN202210690876.8A CN202210690876A CN115052009A CN 115052009 A CN115052009 A CN 115052009A CN 202210690876 A CN202210690876 A CN 202210690876A CN 115052009 A CN115052009 A CN 115052009A
Authority
CN
China
Prior art keywords
chain
nfv
block
layer
index information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210690876.8A
Other languages
Chinese (zh)
Other versions
CN115052009B (en
Inventor
吴星佑
李宏图
胡亮
迟令
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin University
Original Assignee
Jilin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin University filed Critical Jilin University
Priority to CN202210690876.8A priority Critical patent/CN115052009B/en
Publication of CN115052009A publication Critical patent/CN115052009A/en
Application granted granted Critical
Publication of CN115052009B publication Critical patent/CN115052009B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a network function virtualization data protection method and system based on a double-chain block chain. The method comprises the steps of constructing a double-chain NFV model; the double-chain NFV model comprises an NFV layer, a down-chain storage layer and a blockchain layer; the NFV layer is used for registering and logging in users, providing NFV services, encrypting and signing, and sending service data to the down-link storage layer; the under-link storage layer is connected with the block link layer; the down-link storage layer stores the service data and sends the index information to the block link layer; the block chain layer comprises a working chain and a verification chain; the working chain links the index information, determines an abstract value according to the index information, and uploads the abstract value to a verification chain by adopting an intelligent contract; acquiring a digest value, and verifying whether the index information is tampered according to the digest value; and when the index information is not tampered, acquiring corresponding service data according to the index information, and performing auditing work. The invention can solve the problem of auditability of NFV service data, and improves the safety on the basis of keeping high efficiency.

Description

Network function virtualization data protection method and system based on double-chain block chain
Technical Field
The invention relates to the technical field of block chains, in particular to a network function virtualization data protection method and system based on a double-chain block chain.
Background
Network Functions Virtualization (NFV) is one of the important technologies of 5G. NFV requires co-maintenance with multiple parties. In a collaborative environment, the NFV model has a need for decentralization in addition to the need for auditability. In addition, the problem of lack of trust needs to be solved, because each NFV participant cannot trust other participants sufficiently, and they all have absolute control over own data.
In order to solve the problems of centralization, weak auditability and lack of trust, a block chain technology is introduced into the NFV field as a solution. A block chain (Blockchain) is a distributed account book system participated by nodes, and is characterized by being unchangeable and unforgeable. The block chain is composed of a string of data blocks generated by cryptography, each block containing a hash value (hash) of a previous block, and is connected to the current block starting from the starting block to form the block chain. Each block is guaranteed to be generated after the previous block in time order.
The current NFV design based on the block chain is based on a single block chain, and the NFV based on the single block chain cannot give consideration to high safety and high efficiency, and the NFV design based on the single block chain specifically has the following embodiments: firstly, potential safety hazards. When the single blockchain adopts the private chain or alliance chain technology, certain security is improved compared with the non-blockchain NFV, but the decentralized degree of the single blockchain or alliance chain is low, in practical application, the private chain and the alliance chain are jointly proxied by one or a plurality of mechanisms, and when the centralized shutdown condition occurs, for example, the blockchain is extremely easy to attack and tamper data. The mechanisms by which these proxy blockchains operate may also combine to hinder blockchain usage; second, efficiency and data limitations. When the single block chain adopts the public chain technology, the single chain NFV model efficiency based on the public chain is seriously limited by the public chain efficiency because the public chain block-out speed is low. In order to prevent all public link users from being able to see the service data, the service data is not allowed to be stored in the public link in clear. And the block size of the public link is limited, so that excessive service data cannot be stored.
Therefore, it is desirable to provide a new protection method to solve the above problems.
Disclosure of Invention
The invention aims to provide a network function virtualization data protection method and system based on a double-chain block chain, which can solve the problem of auditability of NFV service data and improve the safety on the basis of keeping high efficiency.
In order to achieve the purpose, the invention provides the following scheme:
a network function virtualization data protection method based on a double-chain block chain comprises the following steps:
constructing a double-chain NFV model; the double-stranded NFV model comprises: an NFV layer, an under-link storage layer, and a block chain layer; the NFV layer includes: NFV infrastructure and NFV manager; the NFV layer is used for user registration, login, NFV service provision, encryption and signature, and sends service data to the down-link storage layer; the under-link storage layer is connected with the block chain layer; the down-link storage layer is used for storing the service data and sending the index information of the service data to the block link layer; the block chain layer includes: a work chain and a verification chain; the working chain is used for chaining the index information of the business data, determining the abstract value of each block in the working chain according to the index information, and uploading the abstract value of each block to the verification chain by adopting an intelligent contract;
acquiring a digest value of each block in the working chain stored in the verification chain in the double-chain NFV model, and verifying whether the index information of each block in the working chain is tampered according to the digest value;
and when the index information of each block in the working chain is not tampered, acquiring corresponding service data according to the index information of each block in the working chain, and performing auditing work.
Optionally, the work chain and the verification chain both use P2P technology to organize network nodes.
Optionally, the work chain employs private chain or federated chain technology.
Optionally, the verification chain employs a public chain technique.
Optionally, the downlink storage layer performs centralization of the business data by using a P2P decentralized storage technology.
A network function virtualization data protection system based on a dual-link blockchain, comprising:
the double-chain NFV model building module is used for building a double-chain NFV model; the double-stranded NFV model comprises: an NFV layer, an under-link storage layer, and a block chain layer; the NFV layer includes: NFV infrastructure and NFV manager; the NFV layer is used for user registration, login, NFV service provision, encryption and signature, and sends service data to the down-link storage layer; the under-link storage layer is connected with the block link layer; the down-link storage layer is used for storing the service data and sending the index information of the service data to the block link layer; the block chain layer includes: a work chain and a verification chain; the working chain is used for chaining the index information of the business data, determining the abstract value of each block in the working chain according to the index information, and uploading the abstract value of each block to the verification chain by adopting an intelligent contract;
the verification module is used for acquiring a digest value of each block in the working chain stored in the verification chain in the double-chain NFV model and verifying whether the index information of each block in the working chain is tampered according to the digest value;
and the auditing module is used for acquiring corresponding service data according to the index information of each block in the working chain and performing auditing work when the index information of each block in the working chain is not tampered.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
according to the network function virtualization data protection method and system based on the double-chain block chain, audit work is performed through the double-chain NFV model, wherein the work chain records interaction operation of all parties in the double-chain NFV model, and high-efficiency auditability is provided. And the verification chain provides guarantee for the data on the working chain, and ensures high reliability and credibility of auditability. The data protection is carried out through the double-chain NFV model, so that the problem that the existing single-chain NFV model cannot give consideration to high efficiency and high safety is solved, and meanwhile, the protection is provided for the data privacy of the NFV; for the consumers of the NFV service, the model satisfies service information data integrity, traceability. When an accident or dispute occurs and an auditing mechanism is required to trace the source, the double-chain auditing action can be used for both high efficiency and safety, and a responsibility main body is locked in time so as to provide evidence for follow-up responsibility tracing.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a schematic flow chart of a method for protecting network function virtualization data based on a dual-link block chain according to the present invention;
FIG. 2 is a schematic diagram of a double-stranded NFV model structure;
FIG. 3 is a schematic diagram of data transmission for a double-stranded NFV model;
FIG. 4 is a schematic diagram showing the comparison of the effects of the double-stranded NFV model and the single-stranded NFV model;
fig. 5 is a schematic structural diagram of a network function virtualization data protection system based on a dual-link block chain according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a network function virtualization data protection method and system based on a double-chain block chain, which can solve the problem of auditability of NFV service data and improve the safety on the basis of keeping high efficiency.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Fig. 1 is a schematic flow chart of a method for protecting network function virtualized data based on a dual-chain block chain according to the present invention, and as shown in fig. 1, the method for protecting network function virtualized data based on a dual-chain block chain according to the present invention includes:
s101, constructing a double-chain NFV model, and showing the model in figure 2; the double-stranded NFV model comprises: an NFV layer, an under-link storage layer, and a block chain layer; the NFV layer includes: NFV infrastructure and NFV manager; the NFV layer is used for user registration, login, NFV service provision, encryption and signature, and sends service data to the down-link storage layer; the under-link storage layer is connected with the block link layer; the down-link storage layer is used for storing the service data and sending the index information of the service data to the block link layer; the block chain layer includes: a work chain and a verification chain; the working chain is configured to uplink the index information of the service data, determine the digest value of each block in the working chain according to the index information, and upload the digest value of each block to the verification chain by using an intelligent contract, as shown in fig. 3; the work chain and the verification chain both use P2P technology to organize network nodes. Each node has the functions of node perception and data broadcasting.
In a specific embodiment, the work chain employs private chain or federated chain technology. The work chain consists of nodes maintained by NFV infrastructure providers (server providers such as the arry cloud), NFV service providers (Megaport Limited, etc.), or blockchain agencies (hundredth hyperlinks, etc.). The business in the NFV layer interacts with and leaves data on the chain available for review, and the work chain records the interaction of the parties in the NFV model.
In a specific embodiment, the verification chain employs a public chain technique.
And sending the business data to the offline storage layer, wherein the business data of the NFV layer is stored by the NFV infrastructure provider, VNF producer, NFV service seller and the like in the offline storage layer by using decentralized P2P offline storage technology.
The NFV business application contains operations for adding, deleting, modifying, querying, etc. data. The block generation process of the block chain is not influenced by NFV service, and NFV related mechanisms can only perform addition and query operations on a working chain. The work chain is responsible for keeping and disclosing all auditable information, needs encryption for sensitive information (such as user ID, etc.) and then chains up, and if an organization conducts malicious activities (such as adding a large amount of meaningless information), it can be added to the blacklist, expelled from NFV cooperation and blamed.
As a specific example, the index is extracted from the original data, encrypted and left with an electronic signature, and uploaded to the work chain. Data needs to be uploaded to a work chain at the index of the storage position under the chain, sensitive information (such as user ID and the like) needs to be encrypted and then transmitted to the chain, and the mechanisms can only carry out addition or query operation on the work chain.
S102, acquiring a digest value of each block in the working chain stored in the verification chain in the double-chain NFV model, and verifying whether the index information of each block in the working chain is tampered according to the digest value;
s103, when the index information of each block in the working chain is not tampered, acquiring corresponding service data according to the index information of each block in the working chain, and performing auditing work.
Through the double-chain NFV model, the problem of auditability of NFV service data is solved, high safety is provided on the basis of maintaining high efficiency, and the double-chain NFV model is shown in figure 4.
Fig. 5 is a schematic structural diagram of a network function virtualization data protection system based on a dual-chain block chain, as shown in fig. 5, the network function virtualization data protection system based on a dual-chain block chain provided by the present invention includes:
a double-chain NFV model building module 501, configured to build a double-chain NFV model; the double-stranded NFV model comprises: an NFV layer, an under-link storage layer, and a block chain layer; the NFV layer includes: NFV infrastructure and NFV manager; the NFV layer is used for user registration, login, NFV service provision, encryption and signature, and sends service data to the down-link storage layer; the under-link storage layer is connected with the block link layer; the down-link storage layer is used for storing the service data and sending the index information of the service data to the block link layer; the block chain layer includes: a work chain and a verification chain; the working chain is used for chaining the index information of the business data, determining the abstract value of each block in the working chain according to the index information, and uploading the abstract value of each block to the verification chain by adopting an intelligent contract;
a verification module 502, configured to obtain a digest value of each block in the working chain stored in the verification chain in the double-chain NFV model, and verify whether the index information of each block in the working chain is tampered according to the digest value;
and the auditing module 503 is configured to, when the index information of each block in the work chain is not tampered, obtain corresponding service data according to the index information of each block in the work chain, and perform auditing work.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the system disclosed by the embodiment, the description is relatively simple because the system corresponds to the method disclosed by the embodiment, and the relevant points can be referred to the method part for description.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.

Claims (6)

1. A network function virtualization data protection method based on a double-chain block chain is characterized by comprising the following steps:
constructing a double-chain NFV model; the double-stranded NFV model comprises: an NFV layer, an under-link storage layer, and a block chain layer; the NFV layer includes: NFV infrastructure and NFV managers; the NFV layer is used for user registration, login, NFV service provision, encryption and signature, and sends service data to the down-link storage layer; the under-link storage layer is connected with the block link layer; the down-link storage layer is used for storing the service data and sending the index information of the service data to the block link layer; the block chain layer includes: a work chain and a verification chain; the working chain is used for chaining the index information of the business data, determining the abstract value of each block in the working chain according to the index information, and uploading the abstract value of each block to the verification chain by adopting an intelligent contract;
acquiring a digest value of each block in the working chain stored in the verification chain in the double-chain NFV model, and verifying whether the index information of each block in the working chain is tampered according to the digest value;
and when the index information of each block in the working chain is not tampered, acquiring corresponding service data according to the index information of each block in the working chain, and performing auditing work.
2. The method for network function virtualization data protection based on dual-link blockchain of claim 1, wherein the working chain and the verification chain both use P2P technology to organize network nodes.
3. The method as claimed in claim 1, wherein the work chain employs private chain or alliance chain technology.
4. The method according to claim 1, wherein the verification chain employs a public chain technique.
5. The method according to claim 1, wherein the down-link storage layer performs the centralization of the service data by using a P2P decentralized storage technology.
6. A network function virtualization data protection system based on a dual-link blockchain, comprising:
the double-chain NFV model building module is used for building a double-chain NFV model; the double-stranded NFV model comprises: an NFV layer, an under-link storage layer, and a block chain layer; the NFV layer includes: NFV infrastructure and NFV manager; the NFV layer is used for user registration, login, NFV service provision, encryption and signature, and sends service data to the down-link storage layer; the under-link storage layer is connected with the block link layer; the down-link storage layer is used for storing the service data and sending the index information of the service data to the block link layer; the block chain layer includes: a work chain and a verification chain; the working chain is used for chaining the index information of the business data, determining the abstract value of each block in the working chain according to the index information, and uploading the abstract value of each block to the verification chain by adopting an intelligent contract;
the verification module is used for acquiring a digest value of each block in the working chain stored in the verification chain in the double-chain NFV model and verifying whether the index information of each block in the working chain is tampered according to the digest value;
and the auditing module is used for acquiring corresponding service data according to the index information of each block in the working chain and performing auditing work when the index information of each block in the working chain is not tampered.
CN202210690876.8A 2022-06-17 2022-06-17 Network function virtualization data protection method and system based on double-chain block chain Active CN115052009B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210690876.8A CN115052009B (en) 2022-06-17 2022-06-17 Network function virtualization data protection method and system based on double-chain block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210690876.8A CN115052009B (en) 2022-06-17 2022-06-17 Network function virtualization data protection method and system based on double-chain block chain

Publications (2)

Publication Number Publication Date
CN115052009A true CN115052009A (en) 2022-09-13
CN115052009B CN115052009B (en) 2023-04-07

Family

ID=83162481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210690876.8A Active CN115052009B (en) 2022-06-17 2022-06-17 Network function virtualization data protection method and system based on double-chain block chain

Country Status (1)

Country Link
CN (1) CN115052009B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010430A (en) * 2019-12-05 2020-04-14 江苏荣泽信息科技股份有限公司 Cloud computing security data sharing method based on double-chain structure
CN112559625A (en) * 2020-12-09 2021-03-26 国网安徽省电力有限公司物资分公司 Power business material information storage system and method based on block chain
WO2021232590A1 (en) * 2020-05-22 2021-11-25 平安国际智慧城市科技股份有限公司 User verification method and apparatus based on private chain, and computer device and storage medium
CN114172735A (en) * 2021-12-11 2022-03-11 中国人民解放军战略支援部队信息工程大学 Double-chain mixed block chain data sharing method and system based on intelligent contract

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010430A (en) * 2019-12-05 2020-04-14 江苏荣泽信息科技股份有限公司 Cloud computing security data sharing method based on double-chain structure
WO2021232590A1 (en) * 2020-05-22 2021-11-25 平安国际智慧城市科技股份有限公司 User verification method and apparatus based on private chain, and computer device and storage medium
CN112559625A (en) * 2020-12-09 2021-03-26 国网安徽省电力有限公司物资分公司 Power business material information storage system and method based on block chain
CN114172735A (en) * 2021-12-11 2022-03-11 中国人民解放军战略支援部队信息工程大学 Double-chain mixed block chain data sharing method and system based on intelligent contract

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
FU, XIAOYUAN 等: "Performance Optimization for Blockchain-Enabled Distributed Network Function Virtualization Management and Orchestration", 《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》 *

Also Published As

Publication number Publication date
CN115052009B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
US10432394B2 (en) Method and system for sharing encrypted content
CN111444277B (en) Anti-terrorism information cooperative sharing platform and method based on blockchain technology
Pradeep et al. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
CN111726343A (en) Electronic official document safe transmission method based on IPFS and block chain
CN113328997B (en) Alliance chain crossing system and method
CN110061887B (en) Block chain-based traffic statistical method, device and equipment
CN106330465B (en) Distributed timestamp processing method, server and system
Millán et al. PKI-based trust management in inter-domain scenarios
Sarıtekin et al. Blockchain based secure communication application proposal: Cryptouch
Beato et al. For some eyes only: protecting online information sharing
CN112540957A (en) File secure storage and sharing system based on mixed block chain and implementation method
Dürr et al. Re-socializing online social networks
CN114547698A (en) CORS service data storage system and method based on block chain
CN113706106A (en) Government affair cooperation system constructed based on block chain
Li et al. Controlled sharing mechanism of data based on the consortium blockchain
CN115052009B (en) Network function virtualization data protection method and system based on double-chain block chain
CN116980240A (en) Message synchronization method, device, equipment and storage medium
CN102185866A (en) Internet protocol (IP) telephone network-based trust model construction method
Magnusson Evaluation of Decentralized Alternatives to PKI for IoT Devices: A litterature study and proof of concept implementation to explore the viability of replacing PKI with decentralized alternatives
AlQallaf Blockchain-based digital identity management scheme for field connected IoT devices
Kharjana et al. Blockchain-based key management system in named data networking: A survey
Yang et al. A source authentication scheme based on message recovery digital signature for multicast
CN112765665A (en) Data source management method and management platform
Nikander et al. Towards understanding pure publish/subscribe cryptographic protocols
Bai Comparative research on two kinds of certification systems of the public key infrastructure (PKI) and the identity based encryption (IBE)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant