网络与信息安全学报 ›› 2023, Vol. 9 ›› Issue (4): 74-89.doi: 10.11959/j.issn.2096-109x.2023055

• 学术论文 • 上一篇    

边缘计算环境下轻量级终端跨域认证协议

朱宏颖, 张新有, 邢焕来, 冯力   

  1. 西南交通大学计算机与人工智能学院,四川 成都610097
  • 修回日期:2023-07-11 出版日期:2023-08-01 发布日期:2023-08-01
  • 作者简介:朱宏颖(1997- ),女,辽宁抚顺人,西南交通大学硕士生,主要研究方向为边缘计算、网络安全
    张新有(1971- ),男,河南三门峡人,博士,西南交通大学副教授,主要研究方向为分布式计算与应用、网络安全
    邢焕来(1984- ),男,河北唐山人,博士,西南交通大学副教授,主要研究方向为人工智能、网络安全
    冯力(1974- ),男,四川广元人,博士,西南交通大学教授、博士生导师,主要研究方向为人工智能、网络安全
  • 基金资助:
    国家自然科学基金(62172342)

Lightweight terminal cross-domain authentication protocol in edge computing environment

Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG   

  1. School of Computer and Artificial Intelligence, Southwest Jiaotong University, Chengdu 610097, China
  • Revised:2023-07-11 Online:2023-08-01 Published:2023-08-01
  • Supported by:
    The National Natural Science Foundation of China(62172342)

摘要:

边缘计算由于低时延、高带宽、低成本等众多优点,被广泛应用在各种智能应用场景中,但也因其分布式、实时性和数据多源异构性等特点,面临安全方面的诸多挑战。身份认证是终端接入网络的第一步,也是边缘计算的第一道防线,为了解决边缘计算环境下的安全问题,在“云-边-端”三级网络认证架构基础上,提出了一种适用于边缘计算环境下的终端跨域认证协议。该协议首先基于 SM9 算法实现终端与本地边缘节点间的接入认证,并协商出会话密钥;然后利用该密钥结合对称加密技术和 Hash 算法实现终端的跨域认证;认证过程中采用假名机制,保护终端用户的隐私安全,终端只需一次注册,便可在不同安全域之间随机漫游。通过 BAN 逻辑证明了协议的正确性,并对协议的安全性进行分析。结果表明,该协议可以抵抗物联网场景下的常见攻击,同时具备单点登录、用户匿名等特点。最后从计算成本和通信成本两方面对跨域认证协议进行性能分析,并与现有方案进行对比。实验结果显示,该协议在计算成本和通信开销上优于其他方案,满足资源受限的终端设备需求,是一种轻量级安全的身份认证协议。

关键词: 边缘计算, 身份认证, 多信任域, 轻量级

Abstract:

Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.

Key words: edge computing, identity authentication, multiple trust domain, lightweight

中图分类号: 

No Suggested Reading articles found!