Lightweight terminal cross-domain authentication protocol in edge computing environment
Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity au...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2023-08-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023055 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850111284713881600 |
|---|---|
| author | Hongying ZHU Xinyou ZHANG Huanlai XING Li FENG |
| author_facet | Hongying ZHU Xinyou ZHANG Huanlai XING Li FENG |
| author_sort | Hongying ZHU |
| collection | DOAJ |
| description | Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments. |
| format | Article |
| id | doaj-art-d2f63537ce6d4aafa6b355f414320ab2 |
| institution | OA Journals |
| issn | 2096-109X |
| language | English |
| publishDate | 2023-08-01 |
| publisher | POSTS&TELECOM PRESS Co., LTD |
| record_format | Article |
| series | 网络与信息安全学报 |
| spelling | doaj-art-d2f63537ce6d4aafa6b355f414320ab22025-08-20T02:37:38ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2023-08-019748959579560Lightweight terminal cross-domain authentication protocol in edge computing environmentHongying ZHUXinyou ZHANGHuanlai XINGLi FENGEdge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023055edge computingidentity authenticationmultiple trust domainlightweight |
| spellingShingle | Hongying ZHU Xinyou ZHANG Huanlai XING Li FENG Lightweight terminal cross-domain authentication protocol in edge computing environment 网络与信息安全学报 edge computing identity authentication multiple trust domain lightweight |
| title | Lightweight terminal cross-domain authentication protocol in edge computing environment |
| title_full | Lightweight terminal cross-domain authentication protocol in edge computing environment |
| title_fullStr | Lightweight terminal cross-domain authentication protocol in edge computing environment |
| title_full_unstemmed | Lightweight terminal cross-domain authentication protocol in edge computing environment |
| title_short | Lightweight terminal cross-domain authentication protocol in edge computing environment |
| title_sort | lightweight terminal cross domain authentication protocol in edge computing environment |
| topic | edge computing identity authentication multiple trust domain lightweight |
| url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023055 |
| work_keys_str_mv | AT hongyingzhu lightweightterminalcrossdomainauthenticationprotocolinedgecomputingenvironment AT xinyouzhang lightweightterminalcrossdomainauthenticationprotocolinedgecomputingenvironment AT huanlaixing lightweightterminalcrossdomainauthenticationprotocolinedgecomputingenvironment AT lifeng lightweightterminalcrossdomainauthenticationprotocolinedgecomputingenvironment |