基于区块链的网络安全体系结构与关键技术研究进展

Ke Xu, Si Tong Ling, Qi Li, Bo Wu, Meng Shen, Zhi Chao Zhang, Su Yao, Xin Liu, Lin Li

科研成果: 期刊稿件文献综述同行评审

16 引用 (Scopus)

摘要

With the continuous evolution of Internet technology and the explosively increasing number of users, the Internet has become an integral part of people's daily life. Therefore, network security has become the focus of attention. Researchers have been doing much research on network security. However, with the expansion of network scale and the diversification of attackers' misbehaviors, some drawbacks have been exposed to traditional network security architecture and its key technologies. Firstly, most of today's network security infrastructures, such as PKI and RPKI, are realized as a centralized architecture. Therefore, the cybersecurity measures built on the trust in these centralized infrastructures expose a single-point of trust problem. The incidents of DigiNotar hacked to issue the malicious certificate for more than 500 websites and Symantec's misinformation of more than 30000 certificate extension vouchers all indicate that once incidents occur in these trust centers, it will be a severe impact on the entire Internet. Secondly, since early network architecture designation did not seriously consider security, the deployment of many later proposed security mechanisms will modify existing network protocols and affect network efficiency. Therefore, there are difficulties in the actual deployment of these security mechanisms. Besides, with the advent of the IoT era, the network's complexity will continue to expand, and network security construction should be participated by many organizations and even the whole people. However, there is a lack of a reliable incentive mechanism to coordinate the cooperation between different organizations and mobilize users' enthusiasm to participate in the network security construction. Nowadays, there is no good solution for these disadvantages, but emerging technology blockchain provides new solutions. Blockchain is a trustworthy distributed database that integrates P2P technology, cryptography, consensus mechanism, and distributed storage technology. Because of blockchain's characteristics such as decentralization, immutability, and auditability, researchers have devoted themselves to researching blockchain-based applications on network security. From the perspective of network security architecture, blockchain-based applications focus on network-layer security, application-layer security, and PKI security. The applications in network-layer include collaborative intrusion detection and inter-domain routing security. The applications in the application-layer include vulnerability crowdsourcing and access control. Blockchain's applications for PKI security is to improve centralized PKI or build decentralized PKI. Furthermore, blockchain's role in these network security applications is classified into true-storage, true-computing, and true-incentive. True-storage is to take blockchain as a storage platform to ensure the authenticity of stored data, avoid data tampering, and make a proper response to the user's data access request. True-computing is to take blockchain as a computing platform based on true-storage and smart contracts. The platform can ensure the computing processes' openness, transparency, and verifiability while ensuring the computing results' authenticity, credibility, and immutability. True-incentive introduces incentive mechanisms based on true-storage and true-computing to realize transparent reward and punishment measures. For each specific blockchain-based application on network security, this paper first introduces the security status, then introduces the specific research works and shows how blockchain is applied to improve safety, finally analyzing the advantages of blockchain technology in this field. In the end, this paper introduces the challenges that should be paid attention to in blockchain-based applications on network security, include privacy, scalability, blockchain security, and structure evolution direction. Moreover, this paper prospects future network security architecture and key technologies based on blockchain.

投稿的翻译标题Research Progress of Network Security Architecture and Key Technologies Based on Blockchain
源语言繁体中文
页(从-至)55-83
页数29
期刊Jisuanji Xuebao/Chinese Journal of Computers
44
1
DOI
出版状态已出版 - 1月 2021

关键词

  • Application-layer security
  • Blockchain
  • Network security architecture
  • Network-layer security
  • PKI security

指纹

探究 '基于区块链的网络安全体系结构与关键技术研究进展' 的科研主题。它们共同构成独一无二的指纹。

引用此