TY - GEN
T1 - Data interoperability technology based on chain-network convergence
AU - Wang, Haoyu
AU - Xu, Jiping
AU - Zhang, Xin
AU - Chi, Cheng
AU - Yin, Zihang
AU - Shao, Yanjie
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - With the rapid development of industrial Internet services, the era of the Internet of everything has arrived, which puts forward higher requirements for the network security of the industrial Internet. In order to guarantee the safe and trustworthy flow of industrial Internet data, this paper proposes a chain network connector architecture that integrates blockchain technology and industrial Internet technology, which utilizes the characteristics of blockchain traceability, tampering, collective maintenance, and openness and transparency to guarantee that the identification data in the industrial Internet is more secure and trustworthy. In addition, the architecture adopts quantum identity authentication technology in the identity authentication part to reduce the problem of illegal user access due to identity forgery. Meanwhile, for the problem of low efficiency of large-capacity and high-concurrency data processing generated by actual enterprises in the production process, this paper proposes to use analytical hierarchy process and Hungarian algorithm to co-optimize the chain network connector in order to make the resource allocation more reasonable and the transmission efficiency higher. The experimental results show that different algorithms are used for task allocation in different scenarios to maximize the data transmission efficiency, and also greatly improve the security of industrial Internet identification data.
AB - With the rapid development of industrial Internet services, the era of the Internet of everything has arrived, which puts forward higher requirements for the network security of the industrial Internet. In order to guarantee the safe and trustworthy flow of industrial Internet data, this paper proposes a chain network connector architecture that integrates blockchain technology and industrial Internet technology, which utilizes the characteristics of blockchain traceability, tampering, collective maintenance, and openness and transparency to guarantee that the identification data in the industrial Internet is more secure and trustworthy. In addition, the architecture adopts quantum identity authentication technology in the identity authentication part to reduce the problem of illegal user access due to identity forgery. Meanwhile, for the problem of low efficiency of large-capacity and high-concurrency data processing generated by actual enterprises in the production process, this paper proposes to use analytical hierarchy process and Hungarian algorithm to co-optimize the chain network connector in order to make the resource allocation more reasonable and the transmission efficiency higher. The experimental results show that different algorithms are used for task allocation in different scenarios to maximize the data transmission efficiency, and also greatly improve the security of industrial Internet identification data.
KW - blockchain
KW - co-optimization
KW - data security
KW - industrial internet
KW - quantum authentication
UR - http://www.scopus.com/inward/record.url?scp=85185552050&partnerID=8YFLogxK
U2 - 10.1109/Blockchain60715.2023.00038
DO - 10.1109/Blockchain60715.2023.00038
M3 - Conference contribution
AN - SCOPUS:85185552050
T3 - Proceedings - 2023 IEEE International Conference on Blockchain, Blockchain 2023
SP - 180
EP - 185
BT - Proceedings - 2023 IEEE International Conference on Blockchain, Blockchain 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 6th IEEE International Conference on Blockchain, Blockchain 2023
Y2 - 17 December 2023 through 21 December 2023
ER -