Terminal equipment access authentication method and system based on edge computing

A technology of edge computing and terminal equipment, applied in transmission systems, electrical components, etc., can solve problems such as limited computing and storage capabilities, low cost, and limited energy consumption

Active Publication Date: 2018-11-13
CERTUS NETWORK TECHNANJING
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the limited computing and storage capabilities and energy consumption of communication terminal equipment, it is not suitable to directly use traditional complex encryption algorithms to achieve identity authentication. Therefore, it is necessary to design an identity authentication that is suitable for this edge computing communication system with asymmetric resources. Program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal equipment access authentication method and system based on edge computing
  • Terminal equipment access authentication method and system based on edge computing
  • Terminal equipment access authentication method and system based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0048] Such as figure 1 As shown, a terminal device access authentication method based on edge computing includes the following steps:

[0049]S1. Key sharing: the key is shared between the terminal device and the edge computing server through a secure channel;

[0050] S2. System initialization authentication: The terminal device and the edge computing server complete mutual initial identity authentication through a lightweight cryptographic algorithm according to the key Key;

[0051] S3. Physical layer channel authentication modeling: the edge computing server establishes a physical layer channel authentication model based on the channel information collected during coherent time;

[0052] S4. Physical layer channel authentication: Acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal equipment access authentication method and system based on edge computing. The method comprises the following steps: S1, key sharing, sharing a key between the terminal equipment and the edge computing server; S2, system initialization authentication: accomplishing mutual initial identity authentication between the terminal equipment and the edge computing serveraccording to the key and the lightweight cryptography algorithm; S3, physical layer channel authentication modeling: verifying the data legality from the fourth-frame data by the edge computing server; S5, upper cryptography authentication: starting the upper cryptography authentication if the legality of the received data frame cannot pass the model authentication at the non-initialization authentication stage; and S6, physical layer channel authentication model updating: updating the physical layer channel authentication model when j data frames continuously received by the edge computing server in the coherent time need to start the upper cryptography authentication. Through the method disclosed by the invention, the complexity of the terminal equipment identity authentication is reduced, and the security and the authentication rate of the identity authentication are improved.

Description

technical field [0001] The present invention relates to terminal equipment access authentication, in particular to an edge computing-based terminal equipment access authentication method and system. Background technique [0002] With the rapid development of Internet of Things technology, various terminal devices (nodes) will be widely used in daily life and work. Due to the inherent limitations of traditional cloud computing systems, such as inability to meet real-time control, heavy network traffic load, cloud data privacy security cannot be guaranteed, and so on. The emerging edge computing technology can just provide edge intelligent services for IoT devices, build small edge data centers, and micro-cloud data centers, which can meet the needs of related industries in digital fast connection, real-time business, data optimization, application intelligence, and data security. Key requirements in terms of privacy protection and so on. Edge computing nodes (servers) have ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/083H04L63/0869
Inventor 陈宜文红宋欢欢陈洁廖润发曹明贵
Owner CERTUS NETWORK TECHNANJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products