Font Size: a A A

Research On Secure Access Control Of Internetof Things Based On Fog Computing

Posted on:2020-12-04Degree:MasterType:Thesis
Country:ChinaCandidate:J QianFull Text:PDF
GTID:2428330602452030Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The Internet of Things has developed rapidly in China,and its security problems have become increasingly apparent,and it has become a major bottleneck that hinders the widespread application of Io T.There are many Io T access devices and with different morphological functions.Ensuring terminal access security has become a research hotspot of Io T security.As a new computing model,fog computing is an extension of cloud computing which can provide users with service that was provided by functions of some cloud computing platforms.Fog computing can alleviate the computing,storage and transmission burden of the cloud platform,and also reduce the waiting time delay of the end user,which is an effective bearer of the Internet of Things.Therefore,the research on Io T security access control technology based on fog computing has certain theoretical significance and practical application value.Based on the research of the existing Io T security access control scheme,this thesis proposes a lightweight attribute-based outsourcing encryption scheme and a fast roaming authentication protocol which has support on terminal mobility.To some extent,the problem of access authentication of the Internet of Things to the terminal equipment is solved,and the security of the system is improved.The main research contents are as follows:(1)A lightweight attribute-based outsourcing encryption scheme is proposed.The existing attribute-based end-user identity encryption scheme is studied in this thesis.The advantages and disadvantages of the typical attribute-based encryption schemes are compared among different schemes.With the limitation of mobile device resources,a new type of attribute-based outsourcing encryption scheme is designed,which can effectively achieve fine-grained data access and reduce the network burden.By introducing an encryption agent,most of the encryption work is offloaded to the fog computing node,thereby reducing the user's computation overhead,simplifying the ciphertext structure,and reducing the user's storage overhead.And the provable security method using the standard model proves the security of the proposed encryption scheme.(2)An end user roaming authentication scheme applied in fog computing environment is proposed to support user mobility.It avoids the repeated authentication problem caused by the terminal accessing the cloud platform multiple times.The communication link established between the fog nodes is used to enhance the interoperability between the nodes,so that the roaming authentication does not need to pass through the cloud platform,and the congestion of the cloud platform network port caused by a large amount of management operation data is avoided,thereby avoiding network deterioration.By using knowledge proof based on ECC to replace the certificate,reduce the number of interactions in initial authentication and the use of public key,the roaming authentication time is reduced,and the efficient management of the network to the terminal is improved.(3)Finally,the performance analysis of the above two schemes is carried out,the roaming authentication protocol and schemes in other documents are simulated in the VS using the MIRACL library.The running time of roaming authentication protocols are compared.The result shows that the proposed scheme guarantees the security while ensuring the security,and the certification time is minimal.
Keywords/Search Tags:Fog computing, access control, attribute outsourcing encryption, proof of security, roaming authentication, SVO logic
PDF Full Text Request
Related items