物联网设备中通过区块链生成、再生和验证二进制密钥

John M. Medellin
{"title":"物联网设备中通过区块链生成、再生和验证二进制密钥","authors":"John M. Medellin","doi":"10.30958/ajs.9-1-2","DOIUrl":null,"url":null,"abstract":"This article operationalizes a mathematical root of trust that can be scaled into protection for Internet of Things (IoT) devices. The initial discussion focuses on gated arrays and the generation of 4-way binary keys. Randomization is used in generation of input and sequence keys giving a unique secret key. The probability of successful attack depends on the number of devices and ordinary implementations are well into one in a billion or more. The paper uses the “epoch” concept; a time-dimensioned interval where more blocks are added to the blockchain. The epochs are selected at random and voting, duration, frequency and key roles are also randomized increasing resiliency. The model does not require constant update of IoT storage; only until such time as communication with others is initiated or a request is received. The substantial savings in processing requirements are significant in IoT. A detailed discussion of the management of the blockchain is provided as well as the necessary blocks enabling the approach. The paper includes a sample dialogue using standard TCP/IP communication structures with security protocols and closing remarks aim at extrapolation to cloud and quantum computing. Keywords: blockchain, key management and distribution, internet of things, root of trust, cyber-resiliency","PeriodicalId":91843,"journal":{"name":"Athens journal of sciences","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Generation, Regeneration and Validation of Binary Secret Keys through Blockchain in IoT Devices\",\"authors\":\"John M. Medellin\",\"doi\":\"10.30958/ajs.9-1-2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article operationalizes a mathematical root of trust that can be scaled into protection for Internet of Things (IoT) devices. The initial discussion focuses on gated arrays and the generation of 4-way binary keys. Randomization is used in generation of input and sequence keys giving a unique secret key. The probability of successful attack depends on the number of devices and ordinary implementations are well into one in a billion or more. The paper uses the “epoch” concept; a time-dimensioned interval where more blocks are added to the blockchain. The epochs are selected at random and voting, duration, frequency and key roles are also randomized increasing resiliency. The model does not require constant update of IoT storage; only until such time as communication with others is initiated or a request is received. The substantial savings in processing requirements are significant in IoT. A detailed discussion of the management of the blockchain is provided as well as the necessary blocks enabling the approach. The paper includes a sample dialogue using standard TCP/IP communication structures with security protocols and closing remarks aim at extrapolation to cloud and quantum computing. Keywords: blockchain, key management and distribution, internet of things, root of trust, cyber-resiliency\",\"PeriodicalId\":91843,\"journal\":{\"name\":\"Athens journal of sciences\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Athens journal of sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30958/ajs.9-1-2\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Athens journal of sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30958/ajs.9-1-2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文实现了一个信任的数学根,可以扩展到物联网(IoT)设备的保护中。最初的讨论集中在门控阵列和4路二进制密钥的生成。随机化用于生成输入密钥和序列密钥,给出唯一的密钥。成功攻击的概率取决于设备的数量,普通的实现是十亿分之一或更多。本文采用“时代”概念;一个时间维度的间隔,其中更多的块被添加到区块链中。时代是随机选择的,投票、持续时间、频率和关键角色也是随机选择的,以增加弹性。该模型不需要不断更新物联网存储;直到开始与他人沟通或收到请求为止。在物联网中,处理要求的大量节省是非常重要的。详细讨论了区块链的管理以及实现该方法的必要模块。本文包括一个使用标准TCP/IP通信结构和安全协议的示例对话,以及旨在推断云计算和量子计算的结语。关键词:区块链,密钥管理和分发,物联网,信任根,网络弹性
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Generation, Regeneration and Validation of Binary Secret Keys through Blockchain in IoT Devices
This article operationalizes a mathematical root of trust that can be scaled into protection for Internet of Things (IoT) devices. The initial discussion focuses on gated arrays and the generation of 4-way binary keys. Randomization is used in generation of input and sequence keys giving a unique secret key. The probability of successful attack depends on the number of devices and ordinary implementations are well into one in a billion or more. The paper uses the “epoch” concept; a time-dimensioned interval where more blocks are added to the blockchain. The epochs are selected at random and voting, duration, frequency and key roles are also randomized increasing resiliency. The model does not require constant update of IoT storage; only until such time as communication with others is initiated or a request is received. The substantial savings in processing requirements are significant in IoT. A detailed discussion of the management of the blockchain is provided as well as the necessary blocks enabling the approach. The paper includes a sample dialogue using standard TCP/IP communication structures with security protocols and closing remarks aim at extrapolation to cloud and quantum computing. Keywords: blockchain, key management and distribution, internet of things, root of trust, cyber-resiliency
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Growth of Crayfish, which Serves as an Indicator of Clean and Healthy Water Ecosystems in the Mediterranean Region Identifying Sustainability Efforts in Company’s Reports Using Text Mining and Machine Learning Generative Urban Design in the Field of Infrastructure: An Optimizing Solution for Connecting Fier and Vlora County by a 600 m Bridge over Selenica River, Albania Infrastructures of Large-Scale Geothermal Energy Projects in Kenya: Materialization, Generativity, and Socio-Economic Development Linkages An Analysis of Stream Flow and Flood Frequency: A Case Study from Downstream of Kelani River Basin, Sri Lanka
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1