簡易檢索 / 詳目顯示

研究生: 趙守豐
Shou-Feng Chao
論文名稱: 多重區塊鏈網路環境下之跨鏈裝置身分鑑別框架
Cross-chain Device Authentication Framework in Multiple Blockchain Network Environments
指導教授: 羅乃維
Na-Wei Lo
口試委員: 吳宗成
Tzong-Chen Wu
黃政嘉
Jheng-Jia Huang
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2022
畢業學年度: 110
語文別: 英文
論文頁數: 61
中文關鍵詞: 區塊鏈多鏈架構自攜設備使用者身分鑑別裝置身分鑑別
外文關鍵詞: Blockchain, Multiple Blockchain Architecture, Bring Your Own Device, User Authentication, Device Authentication
相關次數: 點閱:245下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 區塊鏈的出現,帶給資訊科技在分散式領域下,一個革命性的應用。其中多
    鏈架構下的安全資料交換,是近年來多方關注的議題,因為受限於區塊鏈的特性,
    能夠實現同質大區塊鏈架構的應用情境並不多見,許多研究便紛紛開始探討區塊
    鏈之間的互動,所以跨鏈交易安全將會是本論文欲探究的技術重點。於此同時,
    疫情肆虐,許多國家都曾實施防疫封控、居家上班 (Work From Home, WFH) 等
    疫情時代特有的工作模式,但各大企業無不苦惱於這些模式的生產力與資安控管,
    於是自攜設備 (Bring Your Own Device, BYOD) 的概念又再度成為 IT 界熱門的
    議題。
    有鑑於此,本篇論文嘗試提出一個結合區塊鏈的身分授權與裝置驗證框架,
    並嘗試解決跨鏈交易原子性等議題,透過路由轉送機制與記錄交易狀態,達到安
    全的交易轉送與資產交換,同時也解決實作上惱人的互操作性問題,將各項跨鏈
    功能模組化,使得本篇論文所提之框架,不但適用於我們所假設的企業員工自攜
    設備情境,也適用於企業可能在未來會有任何基於區塊鏈技術的裝置管理需求,
    並將此框架的彈性最大化。最後據實驗結果顯示,平均單次的跨鏈交易,約耗費
    一分十五秒左右,且於文末總結的資安威脅討論來看,本論文所設計之框架在整
    體效能與安全分析上,皆在可接受的合理範圍,因此判斷本框架具有系統落地的
    可行性,值得後續更進一步的研究與發展。


    The emergence of blockchain has brought a revolutionary application of
    information technology in the decentralized field. Among them, the secure data
    exchange under the multiple blockchain architecture has been a topic of concern to
    many parties in recent years. Due to the characteristics of the blockchain, the
    application scenarios which can realize the homogeneous large-scale blockchain
    architecture are rare, and many studies have begun to discuss the interaction issue
    between these blockchains, so cross-chain transaction security is the technical focus of this study. Meanwhile, the epidemic is still raging in 2022, and many countries have
    implemented epidemic prevention and control, Work From Home (WFH) and other
    unique working modes in this epidemic era. However, many enterprises are all troubled
    by the productivity and information security control of these situation. As a result, the concept of Bring Your Own Device (BYOD) has once again become a hot topic in the
    IT industry.
    In view of this, this thesis will propose a framework with user authentication and
    device authentication that combines blockchain technology, and attempts to solve issues
    such as cross-chain transaction atomicity, and achieve secure transaction transfer and
    asset exchange through routing transfer mechanism and record the transaction status.
    At the same time, this study also solves the annoying interoperability problem at
    practical implementation by modularizing various cross-chain functions services, so
    that the framework proposed in this study is not only suitable for our hypothetical
    enterprise’s employees in BYOD situation, but also suitable for any device
    management needs based on blockchain that enterprises may have in the future, and
    maximizes the flexibility of this framework. Finally, according to the experimental
    results, the average single cross-chain transaction takes about one minute and fifteen seconds, and from the information security threat discussion summarized at the end of
    the thesis, the framework designed in this study is acceptable in terms of performance
    and security analysis. Therefore, it is judged that this framework has the feasibility of systematic implementation, which is worthy of further research and development.

    摘要.................................. I Abstract ............................. II 誌謝.................................. IV Table of Contents ........................ V List of Figures ................... VII Lists of Tables ................... VIII Chapter 1 Introduction .................... 1 1.1 Background ........................... 1 1.2 Contributions.............. 3 Chapter 2 Preliminaries ................. 6 2.1 Blockchain ........................... 6 2.2 Inter Planetary File System ................. 8 Chapter 3 Related Work .......................... 10 3.1 Multiple Blockchain Architecture .................. 10 3.2 Bring Your Own Device ............................ 12 Chapter 4 Proposed Framework ......................... 14 4.1 Framework Scenario .............................. 14 4.2 Framework Structure ................................. 16 4.3 Device Registration Phase ................................ 18 4.4 User Registration Phase ................................... 21 4.5 User Authentication Phase ........................ 22 4.6 Single-chain Device Authentication Protocol ............... 25 4.7 Cross-chain Device Authentication Protocol – Routing Phase ............ 28 4.8 Cross-chain Device Authentication Protocol – Transfer Phase ........... 31 4.9 Cross-chain Device Authentication Protocol – Notification Phase ..... 34 Chapter 5 Experiment and Analysis ...................................... 39 5.1 Experiment Design.................................................... 39 5.2 Performance Analysis ................................................. 42 5.3 Security Analysis .................................................... 43 5.3.1 Single Point of Failure ....................................... 43 5.3.2 Replay Attack ............................................ 44 5.3.3 Man-in-the-middle Attack ................................. 44 5.3.4 Device-forgery Attack .................................. 44 5.3.5 Impersonation Attack .................................... 45 Chapter 6 Conclusion ........................................... 46 References .............................. 47

    [1] S. Mandal, D. A. Khan, and S. Jain, “Cloud-Based Zero Trust Access Control
    Policy: An Approach to Support Work-From-Home Driven by COVID-19
    Pandemic” New Gener, vol. 39, pp. 599–622, 2021.
    [2] Y. Wang, J. Wei, and K. Vangury, “Bring Your Own Device Security Issues and
    Challenges” IEEE 11th Consumer Communications and Networking Conference,
    pp. 80-85, 2014.
    [3] G. Sushil, R. Deshmuk, and A. Junnarkar, “Security Challenges and Cyber
    Forensics for IoT Driven BYOD System” IEEE 7th International conference for
    Convergence in Technology (I2CT), pp. 1-7, 2022.
    [4] U. Javaid, M. Aman, and B. Sikdar, “Defining Trust in IoT Environments via
    Distributed Remote Attestation using Blockchain” Mobihoc '20: Proceedings of
    the Twenty-First International Symposium on Theory, Algorithmic Foundations,
    and Protocol Design for Mobile Networks and Mobile Computing, pp. 321–326,
    2020.
    [5] J. Kindervag, “No More Chewy Centers: Introducing the Zero Trust Model of
    Information Security” Forrester Research, 2010.
    [6] K. Luo, W. Yu, H. Amjad, S. Wang, L. Gao, and K. Hu, “A Multiple Blockchains
    Architecture On Inter-Blockchain Communication” IEEE International
    Conference on Software Quality, Reliability and Security Companion, pp. 139-
    145, 2018.
    [7] R. Banoth, and M. Dave, “Blockchain-Enabled Intrusion Detection and Prevention
    System of APTs Within Zero Trust Architecture” IEEE Access, vol. 10, pp.
    89270-89288, 2022.
    [8] G. Wang, Z. Shi, M. Nixon, and S. Han, “ChainSplitter: Towards Blockchain-
    Based Industrial IoT Architecture for Supporting Hierarchical Storage” IEEE
    International Conference on Blockchain (blockchain), pp. 166-175, 2019.
    [9] S. Suhail, R. Hussain, R. Jurdak, A. Oracevic, K. Salah, R. Matulevičius, and C.
    Hong, “Blockchain-based Digital Twins: Research Trends, Issues, and Future
    Challenges” Cryptography and Security, arXiv preprint arXiv:2103.11585.
    [10] P. Frauenthaler, M. Sigwart, C. Spanring, M. Sober, and S. Schulte, “ETH Relay:
    A Cost-efficient Relay for Ethereum-based Blockchains” IEEE International
    Conference on Blockchain (Blockchain), pp. 204-213, 2020.
    [11] B. Pillai, and K. Biswas, “Cross-chain Interoperability Among Blockchain-based
    Systems Using Transactions” The Knowledge Engineering Review, vol. 35, p. e23,
    2020.
    [12] M. Ahmed, I. Elahi, M. Abrar, U. Aslam, I. Khalid, and M. Habib, “Understanding
    Blockchain: Platforms, Applications and Implementation Challenges” ICFNDS
    '19: Proceedings of the 3rd International Conference on Future Networks and
    Distributed Systems, No. 35, pp. 1-8, 2019.
    [13] I. Igboanusi, J. Lee, and D. Kim, “A Survey on Low Latency Blockchain
    Architectures for Industrial Networks” International Conference on Information
    and Communication Technology Convergence (ICTC), pp. 664-668, 2021.
    [14] T. Yang, “On the Design of Secure Blockchain-based Framework for Electronic
    Medical Record System” NTUST Dissertation, 2020.
    [15] R. Banoth, and M. Dave, “A Survey on Decentralized Application based On
    Blockchain Platform” International Conference on Sustainable Computing and
    Data Communication Systems (ICSCDS-2022), pp. 1171-1174, 2022.
    [16] Sun Jianjun, Li Ming, and Ma Jingang, “Research and application of data sharing
    platform integrating Ethereum and IPFs Technology” 19th International Symposium on Distributed Computing and Applications for Business Engineering
    and Science (DCABES), pp. 279-282, 2020.
    [17] Xu, X., Weber, I., Staples, M., Zhu, L., Bosch, J., Bass, L., and Rimba, P.,
    “A taxonomy of blockchain-based systems for architecture design” IEEE
    international conference on software architecture (ICSA), pp. 243-252, 2017.
    [18] Jin, H., Dai, X., and Xiao, J., “Towards a novel architecture for enabling
    interoperability amongst multiple blockchains” 2018 IEEE 38th International
    Conference on Distributed Computing Systems (ICDCS), pp. 1203-1211, 2018.
    [19] K. Lougheed, and Y. Rekhter, “Border Gateway Protocol (BGP)” IETF Standard
    RFC1105, [Online]Available: http://tools.ietf.org/rfc/rfc1105.txt, 1989
    [20] A. Garoffolo, D. Kaidalov and R. Oliynykov, "Zendoo: a zk-SNARK Verifiable
    Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized
    Sidechains" IEEE 40th International Conference on Distributed Computing
    Systems (ICDCS), pp. 1257-1262, 2020.
    [21] Falazi, G., Breitenbücher, U., Daniel, F., Lamparelli, A., Leymann, F., and
    Yussupov, V., “Smart contract invocation protocol (SCIP): A protocol for the
    uniform integration of heterogeneous blockchain smart contracts” International
    Conference on Advanced Information Systems Engineering, pp. 134-149, 2020.
    [22] M. I. Ali, S. Kaur, A. Khamparia, D. Gupta, S. Kumar, A. Khanna, and F. Al-
    Turjman, "Security Challenges and Cyber Forensic Ecosystem in IoT Driven
    BYOD Environment" IEEE Access, vol. 8, pp. 172770-172782, 2020.
    [23] Y. Wang, J. Wei, and K. Vangury, “Bring Your Own Device Security Issues and
    Challenges” IEEE 11th Consumer Communications and Networking Conference,
    pp. 80-85, 2014.
    [24] “IPFS documents” IPFS, [Online]Available: https://docs.ipfs.tech/, 2022
    [25] T. Hardjono, A. Lipton, and A. Pentland, “Towards an Interoperability
    Architecture for Blockchain Autonomous Systems” IEEE Transactions on
    Engineering Management, vol. 67, no. 4, pp. 1298-1309, 2020.
    [26] “Geth Documentation” Geth, [Online] Available: https://geth.ethereum.org, 2022
    [27] W. Ao, C. Zhang, F. Xia, S. Fu, and Y. Huang, “A Secure Identity Authentication
    Scheme Based on Blockchain and Identity-based Cryptography” IEEE 2nd
    International Conference on Computer and Communication Engineering
    Technology-CCET, pp. 90-95, 2019.

    無法下載圖示 全文公開日期 2024/09/26 (校內網路)
    全文公開日期 2024/09/26 (校外網路)
    全文公開日期 2024/09/26 (國家圖書館:臺灣博碩士論文系統)
    QR CODE