Lightweight authentication method for supporting anonymous access of heterogeneous terminal in edge computing scene

A lightweight authentication and edge computing technology, applied in user identity/authority verification and key distribution, can solve the problems of not supporting anonymity and the authentication system being overwhelmed, and achieve the effect of improving the efficiency and privacy of identity authentication

Active Publication Date: 2020-07-03
SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problem that the authentication system is overwhelmed and does not support anonymity when a large number of heterogeneous devices on the edge side are centrally accessed in the background technology, this invention proposes a lightweight authentica

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight authentication method for supporting anonymous access of heterogeneous terminal in edge computing scene
  • Lightweight authentication method for supporting anonymous access of heterogeneous terminal in edge computing scene
  • Lightweight authentication method for supporting anonymous access of heterogeneous terminal in edge computing scene

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0038] Such as figure 1 As shown, the terminal lightweight access authentication mechanism supporting anonymity in the edge computing scenario includes three entities, namely the cloud platform, edge computing nodes and terminal devices. The cloud platform is responsible for issuing disguised identity information for each terminal device, and the edge Computing nodes can perform identity authentication on connected terminal devices.

[0039] Such as figure 2 As shown, a lightweight authentication mechanism that supports anonymous access of heterogeneous terminals in an edge computing scenario includes the following steps:

[0040] 1) Initialization stage: the cloud platform will first initialize and generate its own public-private key pair and master key information, and then use the master key information to calculate and publicize public parameter information, w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a lightweight authentication method for supporting anonymous access of a heterogeneous terminal in an edge computing scene. According to the invention, a pseudo identity is created for each terminal device by using a cloud platform to hide the real identity information of the terminal device; meanwhile, malicious terminal equipment can be traced back; the invention disclosesa method for authenticating an access edge computing node of terminal equipment. The edge computing node can verify the legality of the identities of all accessed devices under the condition of not communicating with the cloud platform; according to the method and the device, the real identity information of the terminal cannot be learned, the identity privacy of the terminal equipment is guaranteed, the access authentication efficiency is improved, common threats such as replay attacks can be resisted, the safety and reliability of the whole edge computing system are enhanced, and the problem of access authentication of the terminal equipment with limited resources in an edge computing scene is solved.

Description

technical field [0001] The present invention belongs to the field of edge computing information security, and specifically relates to a lightweight authentication mechanism that supports anonymous access of heterogeneous terminals in an edge computing scenario. Background technique [0002] As the trend of the Internet of Everything continues to deepen, IoT technology and smart devices have increasingly penetrated into people's daily lives. Smart technology has taken the lead in applications in industries such as manufacturing, electric power, and transportation. Edge computing expands traditional cloud services. To the edge of the network, with the network edge device as the core, the service can reside on the edge device, while processing massive data, it can also ensure efficient network operation and service delivery, closer to users, and suitable for networks with low latency requirements However, the rise of edge computing also brings new challenges to the information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0421H04L63/08H04L63/0876H04L63/12H04L9/32H04L9/08H04L9/40
Inventor 尚文利陈春雨赵剑明刘贤达尹隆曾鹏
Owner SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products