Edge computing node identity authentication method based on AES algorithm

A technology of identity authentication and edge computing, which is applied in identity authentication-related applications to achieve high performance, flexibility, low latency, and high dynamics

Inactive Publication Date: 2018-06-15
UNIV OF SCI & TECH BEIJING
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the purpose of the present invention is to provide an edge computing node identity authentication method based on AES algorit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Edge computing node identity authentication method based on AES algorithm
  • Edge computing node identity authentication method based on AES algorithm
  • Edge computing node identity authentication method based on AES algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] An AES algorithm-based edge computing node identity authentication method provided by the present invention will be described in detail below.

[0048] see figure 1 , is a flowchart of an AES algorithm-based edge computing node identity authentication method in an embodiment of the present invention.

[0049] In step S1, the initialization step uses the registration agency to assign an ID to each edge service device in the network, and completes the generation of a public-private key pair between the edge service device and the registration agency.

[0050] In this embodiment, edge computi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an edge computing node identity authentication method based on an AES algorithm. The method comprises the following steps: an initialization step: allocating ID to each edge service device in a network by utilizing a register mechanism, and finishing generation of a public/private key pair of each edge service device and the register mechanism; a register step: finishing registration of an edge user requesting for service and generation of a master key; and an authentication step: realizing two-way identity authentication of the edge user and each edge service device byutilizing an improved AES algorithm. The technical scheme solves the problem of two-way identity authentication of an edge computing node, ensures safe and efficient communication of the edge node, and can meet requirements for high dynamic and low time delay of edge calculation.

Description

technical field [0001] The invention relates to the application field related to identity authentication, in particular to an identity authentication method for edge computing nodes based on an AES algorithm. Background technique [0002] With the rapid development of the Internet of Things and the popularization of 4G / 5G wireless networks, the era of the Internet of Everything is coming rapidly, the number of network edge devices is increasing rapidly, and massive data needs to be processed. The centralized big data processing method with the cloud computing model as the core can no longer be processed efficiently. The data generated by edge devices, the continuous complexity of the network, network delay, network congestion, etc. will bring immeasurable losses to the Internet of Things, and the existing model of the Internet of Things directly connected to the cloud is no longer applicable. Edge computing can efficiently, timely, and safely process massive amounts of data,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0869H04L63/0435H04L63/0869H04L63/0876
Inventor 滕明凤安建伟林福宏孔志印
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products