Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (3): 154-168.doi: 10.11959/j.issn.2096-109x.2022034
• Papers • Previous Articles Next Articles
Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU
Revised:
2021-02-12
Online:
2022-06-15
Published:
2022-06-01
Supported by:
CLC Number:
Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU. Fast handover authentication scheme in 5G mobile edge computing scenarios[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 154-168.
"
参数 | 描述 | 参数 | 描述 |
UID | 用户设备信息 | F1、F2、F3、F4 | 哈希函数用于生成匿名密钥、签名信息、身份令牌、会话密钥 |
MID | 加密的用户设备信息 | RAND | 注册阶段产生的随机数 |
UB | 用户生物特征信息 | Nu、Nmi、Nc | 认证阶段用户产生的随机数、区域 i 的 MEC 服务器产生的随机数、云服务器产生的随机数 |
MU | 由用户加密的用户身份信息 | Mreg、Mreq、Sreq | 注册请求、迁移请求、服务请求 |
XMU | 由云服务器加密的用户身份信息 | Sig | 用户的签名信息 |
Cmac | 云服务器地址 | UAUTN、CAUTN | 用户身份令牌、云服务器身份令牌 |
MC | 加密的云服务器身份信息 | MAUTNi | 部署在区域i的MEC服务器身份令牌 |
MACi | 部署在区域i的MEC服务器的mac地址 | AUTNi、AUTNij | 区域i认证令牌、区域i与区域j之间的认证令牌 |
Mimac | 加密区域i的MEC服务器的mac地址 | SKcmi | 云服务器与区域i的MEC服务器之间的会话密钥 |
MMi | 加密区域i的MEC服务器身份信息 | SKumi | 用户与区域i的MEC服务器之间的会话密钥 |
MAKi | 部署在区域i的MEC服务器的匿名参数 | SKmij | 区域i与区域j的MEC服务器之间的会话密钥 |
UAK | 注册阶段用户匿名参数 | N0 | 用于生成共享密钥的用户密钥随机数 |
UAKc | 认证阶段云服务器产生的匿名参数 | Ni | 用于生成共享密钥的区域i的MEC服务器的密钥随机数 |
UAKu | 认证阶段用户产生的匿名参数 | MSKumi | 用户与区域i的MEC服务器之间的共享密钥 |
K | 服务根密钥,定期随着服务升级更新 | RESi | 保存在区域i中的MEC服务器响应消息 |
Kmi | 区域i的MEC服务器的服务标识密钥,定期随着服务升级更新 | ⊕ | 异域运算 |
Kc | 云服务器私有参数 | || | 联接符号 |
Mi | MEC服务器私有参数 | {A}_SK | 使用会话密钥SK加密A |
[1] | 5G Infrastructure PPP Association. 5G Vision-The 5G Infrastructure Public Private Partnership:the next generation of communication networks and services[J]. White Paper,February, 2015. |
[2] | HU Y C , PATEL M , SABELLA D ,et al. Mobile edge computing—A key technology towards 5G[J]. ETSI White Paper, 2015,11(11): 1-16. |
[3] | PATEL M , NAUGHTON B , CHAN C ,et al. Mobile-edge computing introductory technical white paper[J]. Mobile-edge Computing (MEC) Industry Initiative, 2014,29: 854-864. |
[4] | QI Y , TIAN L , ZHOU Y ,et al. Mobile edge computing-assisted admission control in vehicular networks:the convergence of communication and computation[J]. IEEE Vehicular Technology Magazine, 2019,14(1): 37-44. |
[5] | ZHOU Y , TIAN L , LIU L ,et al. Fog computing enabled future mobile communication networks:a convergence of communication and computing[J]. IEEE Communications Magazine, 2019,57(5): 20-7. |
[6] | ZHOU Y , LING L , WANG L ,et al. Service aware 6G:An intelligent and open network based on convergence of communication,computing and caching[J]. Digital Communications and Networks, 2020,6(3): 253-260. |
[7] | 胡鑫鑫, 刘彩霞, 刘树新 ,等. 移动通信网鉴权认证综述[J]. 网络与信息安全学报, 2018,4(12): 1-15. |
HU X X , LIU C X , LIU S X ,et al. Overview of mobile communication network authentication[J]. Chinese Journal of Network and Information Security, 2018,4(12): 1-15. | |
[8] | 翟靖轩 . 移动云计算中的认证协议研究[D]. 徐州:中国矿业大学, 2019. |
ZHAI J X . Research on authentication protocol in mobile cloud computing[D]. Xuzhou:China University of Mining and Technology, 2019. | |
[9] | 陈春雨, 尚文利, 赵剑明 ,等. 边缘计算身份认证和隐私保护技术[J]. 自动化博览, 2018,v.35;No.300(S2): 96-99. |
CHEN C Y , SHANG W L , ZHAO J M ,et al. Edge computing identity authentication and privacy protection technology[J]. Automation Panorama, 2018,v.35;No.300(S2): 96-99. | |
[10] | 胡荣磊, 陈雷, 段晓毅, 于秉琪 . 一种适用于雾计算的终端节点切换认证协议[J]. 电子与信息学报, 2020,42(10): 2350-2356. |
HU R L , CHEN L , DUAN X Y ,et al. A switching authentication protocol of terminal node for fog computing[J]. Journal of Electronics & Information Technology, 2020,42(10): 2350-2356. | |
[11] | 张佳乐, 赵彦超, 陈兵 ,等. 边缘计算数据安全与隐私保护研究综述[J]. 通信学报, 2018,39(3): 1-21. |
ZHANG J L , ZHAO Y C , CHEN B ,et al. Survey on data security and privacy-preserving for the research of edge computing[J]. Journal on Communications, 2018,39(3): 1-21. | |
[12] | CHEN C L , CHIANG M L , HSIEH H C ,et al. A lightweight mutual authentication with wearable device in location-based mobile edge computing[J]. Wireless Personal Communications, 2020,113(1): 575-598. |
[13] | DHILLON P K , KALRA S . A lightweight biometrics based remote user authentication scheme for IoT services[J]. Journal of Information Security and Applications, 2017:S2214212616301442. |
[14] | HU Y C , PATEL M , SABELLA D ,et al. Mobile edge computing—A key technology towards 5G[J]. ETSI White Paper, 2015,11(11): 1-16. |
[15] | 胡鑫鑫 . 5G 网络认证协议和非接入层协议安全性研究[D]. 战略支援部队信息工程大学. |
HU X X . Research on security of 5G network authentication protocol and non-access stratum protocol[D]. PLA Strategic Support Force Information Engineering University. | |
[16] | JIA X , HE D , KUMAR N ,et al. A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing[J]. IEEE Systems Journal, 2019: 1-12. |
[17] | LIU H , ZHANG P , PU G ,et al. Blockchain empowered cooperative authentication with data traceability in vehicular edge computing[J]. IEEE Transactions on Vehicular Technology, 2020,PP(99): 1-1. |
[18] | XIAO Y , JIA Y , LIU C ,et al. Edge computing security:state of the art and challenges[J]. Proceedings of the IEEE, 2019,PP(99): 1-24. |
[19] | ZHANG J , CHEN B , ZHAO Y ,et al. Data security and privacy-preserving in edge computing paradigm:survey and open issues[J]. IEEE Access, 2018,6(18) 209-37. |
[20] | LI X , CHEN T , CHENG Q ,et al. Smart applications in edge computing:overview on authentication and data security[J]. IEEE Internet of Things Journal, 2020,PP(99): 1-1. |
[21] | TEAM T A . AVISPA v1.1 User manual[EB]. Information society technologies programme (June 2006)[EB]. 2006. |
[22] | CHEVALIER Y , COMPAGNA L , CUELLAR J ,et al. A high level protocol specification language for industrial security-sensitive protocols[C]// Workshop on Specification and Automated Processing of Security Requirements-SAPS'2004. Austrian Computer Society, 2004. |
[23] | GLOUCHE Y , GENET T , HOUSSAY E . SPAN:a security protocol animator for AVISPA[C]// IRISA, 2008. |
[24] | SAILLARD R , GENET T . CAS+[EB]. |
[25] | SHARMA V , YOU I , PALMIERI F ,et al. Secure and energy-efficient handover in fog networks using blockchain-based DMM[J]. IEEE Communications Magazine, 2018,56(5): 22-31. |
[26] | RIFA-POUS H , HERRERA-JOANCOMARTí J , . Computational and energy costs of cryptographic algorithms on handheld devices[J]. Future Internet, 2011,3(1): 31-48. |
[1] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
[2] | Zhe SUN, Hong NING, Lihua YIN, Binxing FANG. Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 178-188. |
[3] | Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG. Two-party cooperative blind signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51. |
[4] | Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG. Dynamic and efficient vehicular cloud management scheme with privacy protection [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83. |
[5] | Chenxin LU, Bing CHEN, Ning DING, Liquan CHEN, Ge WU. Identity-based anonymous cloud auditing scheme with compact tags [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 156-168. |
[6] | Shengzhi MING, Jianming ZHU, Zhiyuan SUI, Xian ZHANG. Online medical privacy protection strategy under information value-added mechanism [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 169-177. |
[7] | Xian ZHANG, Jianming ZHU, Zhiyuan SUI, Shengzhi MING. Analysis on anonymity and regulation of digital currency transactions based on game theory [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 150-157. |
[8] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[9] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[10] | Zhensheng GAO, Lifeng CAO, Xuehui DU. Research progress of access control based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87. |
[11] | Chuanxin ZHOU, Yi SUN, Degang WANG, Huawei GE. Survey of federated learning research [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 77-92. |
[12] | Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI. Research on extended access control mechanism in online social network [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131. |
[13] | Zhanhui YUAN, Zhi YANG, Hongqi ZHANG, Shuyuan JIN, Xuehui DU. Android complex information flow analysis method based on communicating sequential process [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 156-168. |
[14] | Kui REN, Quanrun MENG, Shoukun YAN, Zhan QIN. Survey of artificial intelligence data security and privacy protection [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 1-10. |
[15] | Jian SHEN, Tianqi ZHOU, Chen WANG, Huijie YANG. Privacy protection key distribution protocol for edge computing [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 93-100. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|