Lightweight terminal cross-domain authentication protocol in edge computing environment

Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity au...

Full description

Saved in:
Bibliographic Details
Main Authors: Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2023-08-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023055
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850111284713881600
author Hongying ZHU
Xinyou ZHANG
Huanlai XING
Li FENG
author_facet Hongying ZHU
Xinyou ZHANG
Huanlai XING
Li FENG
author_sort Hongying ZHU
collection DOAJ
description Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.
format Article
id doaj-art-d2f63537ce6d4aafa6b355f414320ab2
institution OA Journals
issn 2096-109X
language English
publishDate 2023-08-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-d2f63537ce6d4aafa6b355f414320ab22025-08-20T02:37:38ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2023-08-019748959579560Lightweight terminal cross-domain authentication protocol in edge computing environmentHongying ZHUXinyou ZHANGHuanlai XINGLi FENGEdge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023055edge computingidentity authenticationmultiple trust domainlightweight
spellingShingle Hongying ZHU
Xinyou ZHANG
Huanlai XING
Li FENG
Lightweight terminal cross-domain authentication protocol in edge computing environment
网络与信息安全学报
edge computing
identity authentication
multiple trust domain
lightweight
title Lightweight terminal cross-domain authentication protocol in edge computing environment
title_full Lightweight terminal cross-domain authentication protocol in edge computing environment
title_fullStr Lightweight terminal cross-domain authentication protocol in edge computing environment
title_full_unstemmed Lightweight terminal cross-domain authentication protocol in edge computing environment
title_short Lightweight terminal cross-domain authentication protocol in edge computing environment
title_sort lightweight terminal cross domain authentication protocol in edge computing environment
topic edge computing
identity authentication
multiple trust domain
lightweight
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023055
work_keys_str_mv AT hongyingzhu lightweightterminalcrossdomainauthenticationprotocolinedgecomputingenvironment
AT xinyouzhang lightweightterminalcrossdomainauthenticationprotocolinedgecomputingenvironment
AT huanlaixing lightweightterminalcrossdomainauthenticationprotocolinedgecomputingenvironment
AT lifeng lightweightterminalcrossdomainauthenticationprotocolinedgecomputingenvironment