Authentication method and system based on fog computing and used for enhancing communication security

A communication security and fog computing technology, which is applied in encryption authentication technology, fog computing, and Internet of Things security fields, can solve problems such as time and money loss, traffic signal confusion, production process delay, etc., to avoid time and bandwidth consumption and reduce burden , the effect of improving the accuracy

Active Publication Date: 2018-11-16
PEKING UNIV
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Just imagine that in an intelligent transportation system, if there are malicious users pretending to be nodes to send a large amount of false information, it will inevitably cause confusion in traffic signals, and even casualties; If the other machines in the machine transmit wrong information, it will lead to the delay of the production process and the waste of raw materials, resulting in a lot of time and money loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system based on fog computing and used for enhancing communication security
  • Authentication method and system based on fog computing and used for enhancing communication security
  • Authentication method and system based on fog computing and used for enhancing communication security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Below in conjunction with accompanying drawing, further describe the present invention through embodiment, but do not limit the scope of the present invention in any way.

[0048] The present invention provides a method and system for improving communication security between nodes and endpoints and between nodes based on the fog computing framework. By analyzing the existing underlying work of fog computing, the security and privacy deficiencies in it are obtained. A method for enhancing authentication security mechanism and communication security between nodes and endpoints and between nodes is further proposed.

[0049] figure 1 It is a schematic diagram of the module system structure under the fog computing framework provided by the present invention. figure 1 In the network domain of each fog node, there are four modules: (1) endpoint and identity authentication security module between nodes, (2) lookup table module: responsible for saving the following four items ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system based on a fog computing framework and used for enhancing communication security. The system comprises an endpoint as well as an identity authentication security module, a lookup table module, a suspicious MAC address isolation account book module and a private key storage module among nodes; and by virtue of a decentration authentication mechanism, security authentication is performed on the endpoint as well as identities among the nodes, and a machine learning method is adopted for enhancing the communication security between the nodes and the endpoint as well as between the nodes, so as to prevent a malicious attack and a fake identity. By adopting the technical scheme of the invention, extra time and bandwidth consumption produced by a third-party organization can be avoided, and processing efficiency of a cloud terminal and a local fog node is improved; and authentication accuracy is improved, and establishment of a more timely securityprecaution mechanism can be facilitated.

Description

technical field [0001] The invention belongs to the fields of encryption authentication technology, Internet of Things security, and fog computing technology, and relates to identity confirmation between nodes and endpoints and an enhancement method for communication security mechanisms, in particular to an enhanced node-to-endpoint and node-to-node based on a fog computing framework A method and system for communication security between. Background technique [0002] The concept of fog computing was proposed in 2011, and then the OpenFog Consortium (OpenFog Consortium) made a clear definition of fog computing: fog computing is a system-level horizontal Computing, storage, control, and network resources and services anywhere in the region support multiple vertical industries and application areas, deliver wisdom and services to users and businesses, and make services and applications distributed closer to the physical level. Fog computing The structure extends from things, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/08G06Q20/38G06Q20/40
CPCG06Q20/3825G06Q20/4014H04L9/3242H04L9/3247H04L67/10
Inventor 文伟平邓宇凡
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products