Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment.

IF 3.5 3区 综合性期刊 Q2 CHEMISTRY, ANALYTICAL Sensors Pub Date : 2025-01-18 DOI:10.3390/s25020550
Shoubai Nie, Jingjing Ren, Rui Wu, Pengchong Han, Zhaoyang Han, Wei Wan
{"title":"Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment.","authors":"Shoubai Nie, Jingjing Ren, Rui Wu, Pengchong Han, Zhaoyang Han, Wei Wan","doi":"10.3390/s25020550","DOIUrl":null,"url":null,"abstract":"<p><p>Within the framework of 6G networks, the rapid proliferation of Internet of Things (IoT) devices, coupled with their decentralized and heterogeneous characteristics, presents substantial security challenges. Conventional centralized systems face significant challenges in effectively managing the diverse range of IoT devices, and they are inadequate in addressing the requirements for reduced latency and the efficient processing and analysis of large-scale data. To tackle these challenges, this paper introduces a zero-trust access control framework that integrates blockchain technology with inner-product encryption. By using smart contracts for automated access control, a reputation-based trust model for decentralized identity management, and inner-product encryption for fine-grained access control, the framework ensures data security and efficiency. Firstly, smart contracts are employed to automate access control, and software-defined boundaries are defined for different application domains. Secondly, through a trust model based on a consensus algorithm of node reputation values and a registration-based inner-product encryption algorithm supporting fine-grained access control, zero-trust self-sovereign enhanced identity management in the 6G environment of the Internet of Things is achieved. Furthermore, the use of multiple auxiliary chains for storing data across different application domains not only mitigates the risks associated with data expansion but also achieves micro-segmentation, thereby enhancing the efficiency of access control. Finally, empirical evidence demonstrates that, compared with the traditional methods, this paper's scheme improves the encryption efficiency by 14%, reduces the data access latency by 18%, and significantly improves the throughput. This mechanism ensures data security while maintaining system efficiency in environments with large-scale data interactions.</p>","PeriodicalId":21698,"journal":{"name":"Sensors","volume":"25 2","pages":""},"PeriodicalIF":3.5000,"publicationDate":"2025-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11769087/pdf/","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sensors","FirstCategoryId":"103","ListUrlMain":"https://doi.org/10.3390/s25020550","RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"CHEMISTRY, ANALYTICAL","Score":null,"Total":0}
引用次数: 0

Abstract

Within the framework of 6G networks, the rapid proliferation of Internet of Things (IoT) devices, coupled with their decentralized and heterogeneous characteristics, presents substantial security challenges. Conventional centralized systems face significant challenges in effectively managing the diverse range of IoT devices, and they are inadequate in addressing the requirements for reduced latency and the efficient processing and analysis of large-scale data. To tackle these challenges, this paper introduces a zero-trust access control framework that integrates blockchain technology with inner-product encryption. By using smart contracts for automated access control, a reputation-based trust model for decentralized identity management, and inner-product encryption for fine-grained access control, the framework ensures data security and efficiency. Firstly, smart contracts are employed to automate access control, and software-defined boundaries are defined for different application domains. Secondly, through a trust model based on a consensus algorithm of node reputation values and a registration-based inner-product encryption algorithm supporting fine-grained access control, zero-trust self-sovereign enhanced identity management in the 6G environment of the Internet of Things is achieved. Furthermore, the use of multiple auxiliary chains for storing data across different application domains not only mitigates the risks associated with data expansion but also achieves micro-segmentation, thereby enhancing the efficiency of access control. Finally, empirical evidence demonstrates that, compared with the traditional methods, this paper's scheme improves the encryption efficiency by 14%, reduces the data access latency by 18%, and significantly improves the throughput. This mechanism ensures data security while maintaining system efficiency in environments with large-scale data interactions.

Abstract Image

Abstract Image

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
6G环境下基于区块链和内产品加密的物联网零信任访问控制机制
在6G网络框架下,物联网(IoT)设备的快速扩散,加上其分散和异构的特点,带来了巨大的安全挑战。传统的集中式系统在有效管理各种物联网设备方面面临重大挑战,它们不足以满足降低延迟和高效处理和分析大规模数据的要求。为了解决这些问题,本文引入了一个零信任访问控制框架,该框架将区块链技术与产品内部加密技术相结合。通过使用智能合约进行自动访问控制,基于声誉的信任模型进行分散身份管理,以及内部产品加密进行细粒度访问控制,该框架确保了数据的安全性和效率。首先,采用智能合约实现访问控制自动化,并针对不同的应用领域定义了软件定义边界;其次,通过基于节点信誉值共识算法的信任模型和支持细粒度访问控制的基于注册的内积加密算法,实现物联网6G环境下的零信任自主权增强身份管理。此外,使用多个辅助链跨不同应用领域存储数据,不仅降低了数据扩展带来的风险,而且实现了微分段,从而提高了访问控制的效率。最后,经验证据表明,与传统方法相比,本文方案的加密效率提高了14%,数据访问延迟降低了18%,吞吐量显著提高。该机制确保了数据安全,同时在大规模数据交互环境中保持系统效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Sensors
Sensors 工程技术-电化学
CiteScore
7.30
自引率
12.80%
发文量
8430
审稿时长
1.7 months
期刊介绍: Sensors (ISSN 1424-8220) provides an advanced forum for the science and technology of sensors and biosensors. It publishes reviews (including comprehensive reviews on the complete sensors products), regular research papers and short notes. Our aim is to encourage scientists to publish their experimental and theoretical results in as much detail as possible. There is no restriction on the length of the papers. The full experimental details must be provided so that the results can be reproduced.
期刊最新文献
Explicit Features Versus Implicit Spatial Relations in Geomorphometry: A Comparative Analysis for DEM Error Correction in Complex Geomorphological Regions. Multipath Credibility Selection for Robust UWB Angle-of-Arrival Estimation in Narrow Underground Corridors. Multimodal Shared Autonomy for Heavy-Load UAV Operations with Physics-Aware Cooperative Control. An Unscented Kalman Filter Based on the Adams-Bashforth Method with Applications to the State Estimation of Osprey-Type Drones Composed of Tiltable Rotor Mechanisms. Multi-Sensor Measurement of Cylindrical Illuminance.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1