浏览全部资源
扫码关注微信
[ "陈烨(1995-),男,厦门大学信息科学与技术学院硕士生,主要研究方向为网络安全、无线通信。" ]
[ "许冬瑾(1994-),女,厦门大学信息科学与技术学院硕士生,主要研究方向为网络安全、无线通信。" ]
[ "肖亮(1980-),女,厦门大学信息科学与技术学院教授、博士生导师,主要研究方向为网络安全、无线通信。" ]
网络出版日期:2018-03,
纸质出版日期:2018-03-20
移动端阅览
陈烨, 许冬瑾, 肖亮. 基于区块链的网络安全技术综述[J]. 电信科学, 2018,34(3):10-16.
Ye CHEN, Dongjin XU, Liang XIAO. Survey on network security based on blockchain[J]. Telecommunications science, 2018, 34(3): 10-16.
陈烨, 许冬瑾, 肖亮. 基于区块链的网络安全技术综述[J]. 电信科学, 2018,34(3):10-16. DOI: 10.11959/j.issn.1000-0801.2018135.
Ye CHEN, Dongjin XU, Liang XIAO. Survey on network security based on blockchain[J]. Telecommunications science, 2018, 34(3): 10-16. DOI: 10.11959/j.issn.1000-0801.2018135.
随着移动互联网与物联网技术的发展,网络空间承载了海量数据,必须保证其安全性和隐私性。基于区块链的网络安全机制具有去中心化、不可篡改、可追溯、高可信和高可用的特性,有利于提升网络安全性。探讨了区块链在网络安全方面的应用方案,分析了基于区块链的网络安全机制的主要技术特点和方法以及未来研究方向。首先探讨了数据管理体系应用区块链进行数据管理的方法,利用区块链不可篡改的特性提高数据的真实性和可靠性。其次分析了物联网应用区块链进行设备管理的方案,通过区块链记录和执行设备控制指令,强化物联网设备权限和通信管理。最后研究了域名系统应用区块链的部署方案,利用区块链的去中心化结构抵抗针对中心节点的分布式拒绝服务攻击。
With the development of the mobile internet and IoT (internet of things)
mass data are stored in the cyberspace.The network security and privacy are of great significance.The blockchain-based network security mechanism has the properties of decentralization
tamper-resistance
traceability
high availability and credibility
and can be applied to improve network security.The application of blockchain in the network security was explored.The main technologies and the future research direction of the blockchain-based network security mechanism were analyzed.Firstly
the blockchain-based data protection scheme was analyzed
which applied the tamper-resistance of the blockchain to improve the authenticity and reliability of data.Secondly
the blockchain-based IoT device management scheme was analyzed
which applied the blockchain to record and execute the device control instruction and improve the authority and communication of the IoT devices.Lastly
the blockchain-based domain name system was analyzed
which applied the decentralization of the blockchain to resist distributed denial of service effectively.
XIAO L , LI Y , HAN G , et al . A secure mobile crowdsensing game with deep reinforcement learning [J ] . IEEE Transactions on Information Forensics & Security , 2017 , 136 ( 1 ): 35 - 47 .
肖亮 , 李强达 , 刘金亮 . 云存储安全技术研究进展综述 [J ] . 数据采集与处理 , 2016 31 ( 3 ): 464 - 472 .
XIAO L , LI Q D , LIU J L , . Survey on secure cloud storage [J ] . Journal of Data Acquisition & Processing , 2016 31 ( 3 ): 464 - 472 .
XIAO L , XU D , XIE C , et al . Cloud storage defense against advanced persistent threats:a prospect theoretic study [J ] . IEEE Journal on Selected Areas in Communications , 2011 , 35 ( 3 ): 534 - 544 .
刘明辉 , 张尼 , 张云勇 , 等 . 云环境下的敏感数据保护技术研究 [J ] . 电信科学 , 2014 30 ( 11 ): 2 - 8 .
LIU M H , ZHANG N , ZHANG Y Y , , et al . Research on sensitive data protection technology on cloud computing [J ] . Telecommunications Science , 2014 30 ( 11 ): 2 - 8 .
袁勇 , 王飞跃 . 云环境下的敏感数据保护技术研究 [J ] . 自动化学报 , 2016 42 ( 4 ): 481 - 494 .
YUAN Y , WANG F Y . Blockchain:the state of the art and future trends [J ] . Acta Automatica Sinica , 2016 42 ( 4 ): 481 - 494 .
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system [J ] . Consulted , 2008 .
BUTERIN V A . Next-generation smart contract and decentralized application platform [R ] . 2014 .
邵奇峰 , 金澈清 , 张召 , 等 . 区块链技术:架构及进展 [J ] . 计算机学报 , 2017 : 1 - 20 .
SHAO Q F , JIN C Q , ZHANG Z , , et al . Blockchain technology:architecture and progress [J ] . Chinese Journal of Computers , 2017 : 1 - 20 .
ZYSKIND G , NATHAN O . Decentralizing privacy:Using blockchain to protect personal data [C ] // IEEE Security and Privacy Workshops , May 21 - 22 , 2015 , San Jose,CA,USA.Piscataway : IEEE Press , 2015 : 180 - 184 .
WOOD G . Ethereum:a secure decentralised generalized transaction ledger [EB ] . 2014 .
AZARIA A , EKBLAW A , VIEIRA T , et al . MedRec:using blockchain for medical data access and permission management [C ] // IEEE International Conference on Open and Big Data , Dec 5 - 8 , 2016 , Washington,DC,USA.Piscataway : IEEE Press , 2016 : 25 - 30 .
BULDAS A , LAANOJA R , TRUU A , et al . Keyless signature infrastructure and PKI:hash-tree signatures in pre-and post-quantum world [J ] . International Journal of Services Technology & Management , 2017 , 23 ( 1/2 ): 117 .
BULDAS A , LAANOJA R , TRUU A , et al . Efficient quantum-immune keyless signatures with identity [J ] . IACR Cryptology ePrint Archive , 2014 : 321 .
DORRI A , STEGER M , KANHERE S , et al . Blockchain:a distributed solution to automotive security and privacy [J ] . IEEE Communications Magazine , 2017 , 55 ( 12 ): 119 - 125 .
DORRI A , KANHERE S , JURDAK R , et al . Blockchain for IoT security and privacy:the case study of a smart home [C ] // IEEE International Conference on Pervasive Computing and Communications , March 13 - 17 , 2017 , Kona,HI,USA.Piscataway : IEEE Press , 2017 : 618 - 623 .
BAHGA A , MADISETTI V K . Blockchain platform for industrial Internet of things [J ] . Journal of Software Engineering and Applications , 2016 , 9 ( 10 ): 533 .
ALI A , NELSON J , SHEA R , et al . Blockstack:a global naming and storage system secured by blockchains [C ] // USENIX Annual Technical Conference , July 12 - 14 , 2016 , Santa Clara,CA,USA.Piscataway : IEEE Press , 2016 : 181 - 194 .
AITZHAN N , SVETINOVIC D . Security and privacy in decentralized energy trading through multi-signatures,blockchain and anonymous messaging streams [J ] . IEEE Transactions on Dependable & Secure Computing , 2016 ( 99 ): 1 .
赵明慧 , 张琭 , 亓晋 . 基于区块链的社会物联网可信服务管理框架 [J ] . 电信科学 , 2017 , 33 ( 10 ): 19 - 25 .
ZHAO M H , ZHANG L , QI J . A framework of trusted services management based on block chain in social internet of things [J ] . Telecommunications Science , 2017 , 33 ( 10 ): 19 - 25 .
WANG B , ZHENG Y , LOU W , et al . DDoS attack protection in the era of cloud computing and software-defined networking [J ] . Computer Networks , 2015 ( 81 ): 308 - 319 .
李传煌 , 孙正君 , 袁小雍 , 等 . 基于深度学习的实时DDoS攻击检测 [J ] . 电信科学 , 2017 , 33 ( 7 ): 53 - 65 .
LI C H , SUN Z J , YUAN X Y , et al . Real-time DDoS attack detection based on deep learning [J ] . Telecommunications Science , 2017 , 33 ( 7 ): 53 - 65 .
王帅 , 汪来富 , 金华敏 , 等 . 网络安全分析中的大数据技术应用 [J ] . 电信科学 , 2015 , 31 ( 7 ): 145 - 150 .
WANG S , WANG L F , JIN H M , et al . Big data application in network security analysis [J ] . Telecommunications Science , 2015 , 31 ( 7 ): 145 - 150 .
KOSBA A , MILLER A , SHI E , et al . Hawk:the blockchain model of cryptography and privacy-preserving smart contracts [C ] // IEEE Symposium on Security and Privacy (SP) , May 23 - 25 , 2016 , San Jose,CA,USA.Piscataway : IEEE Press , 2016 : 839 - 858 .
SIVARAMAN V , CHAN D , EARL D , et al . Smart-phones attacking smart-homes [C ] // ACM Conference on Security &Privacy in Wireless and Mobile Networks , July 18 - 20 , 2016 , Darmstadt,Germany.New York : ACM Press , 2016 : 195 - 200 .
HU Q , LV S , SHI Z , et al . Defense Against advanced persistent threats with expert system for internet of things // IEEE/IFIP International Conference on Wireless Algorithms Systems and Application , June 19 - 21 , 2017 , Guilin,China.Piscataway : IEEE Press , 2017 .
NARAYANAN A , BONNEAU J , FELTEN E , et al . Bitcoin and cryptocurrency technologies:a comprehensive introduction [M ] . Princeton : Princeton University Press , 2016 .
RODRIGUES B , BOCEK T , LAREIDA A , et al . A blockchain-based architecture for collaborative DDoS mitigation with smart contracts [C ] // IFIP International Conference on Autonomous Infrastructure,Management and Security , July 10 - 13 , 2017 , University of Zurich,Zurich,Switzerland.Berlin : Springer-Verlag , 2017 : 16 - 29 .
HU W , AO M , SHI L , et al . Review of blockchain-based DNS alternatives [J ] . 网络与信息安全学报 , 2017 , 3 ( 3 ): 71 - 77 .
HU W , AO M , SHI L , et al . Review of blockchain-based DNS alternatives [J ] . Chinese Journal of Network and Information Security , 2017 , 3 ( 3 ): 71 - 77 .
0
浏览量
2338
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构