Autor: |
Kai Man Kwong, Kai-Hau Yeung, Chi Ho Lau |
Rok vydání: |
2019 |
Předmět: |
|
Zdroj: |
Advances in Intelligent Systems and Computing ISBN: 9783030228675 |
Popis: |
Network infrastructure devices form the backbone of a network. Any computer connecting to the network can communicate with these devices by running an appropriate software. Because of this, hackers could easily attack the network infrastructure. The reason why such attacks is possible is that there is no authentication mechanism in most of today’s networks. To solve this, this paper proposes a solution to the problem by introducing an authentication scheme. Blockchain technology is used to store authentication information because malicious tempering is difficult. Authenticated Devices Configuration Protocol (ADCP) is proposed to configure and form a secure overlay network infrastructure automatically. A working implementation has been built to validate the authentication design. Experimental results have also been presented that show the validation. |
Databáze: |
OpenAIRE |
Externí odkaz: |
|