Font Size: a A A

Research On Identity Authentication And Privacy Protection Technology Of Internet Of Things In Edge Computing Environment

Posted on:2020-09-26Degree:MasterType:Thesis
Country:ChinaCandidate:W WuFull Text:PDF
GTID:2428330602952484Subject:Engineering
Abstract/Summary:PDF Full Text Request
In order to solve the massive data processing problem brought by Internet of things,edge computing can process data on the edge of the network by deploying the edge nodes on the edge of the network,which can effectively reduce the network bandwidth pressure and reduce the processing delay.With the addition of edge nodes,the traditional "cloud-device" architecture has gradually evolved to the "cloud–edge–device" integration framework.This new network architecture brings convenience as well as new challenges and opportunities for identity authentication and privacy protection of Internet of things.On the one hand,under the " cloud–edge–device " integrated network architecture,the number of devices is large,mobility is strong,the level is complex,and a variety of security domains coexist,which brings great challenges to the security access authentication and cross domain authentication of the Internet of things.On the other hand,the establishment of a collaborative trust network among edge nodes by identity authentication can distribute data processed by single device to multiple devices for collaborative processing,which brings certain opportunities to solve the privacy control problem of the Internet of things in the edge computing environment.Aiming at the identity authentication of Internet of things in the context of edge computing,based on the in-depth study of the particularity of the edge computing environment,this thesis proposes a "cloud–edge–device" integration authentication framework for the edge computing environment.In order to solve the problem of terminal key distribution and management,this thesis proposes an identification based key management method,and further designs an identity based "cloud–edge–device" integrated identity authentication scheme based on identity.This scheme can achieve efficient access authentication and cross domain of large-scale Internet of things in edge computing environment.After that,the security and correctness of the authentication scheme are analyzed.In edge conputing environment,edge devices provide services for their adjacent Internet of things,The location awareness of edge devices makes it easy for single devices to divulge device location privacy.Based on the above authentication scheme,a trusted edge network is established.And based on the collaboration among the edge devices,a location privacy protection scheme for the Internet of things is designed,which is suitable for the "cloud–edge–device" integrated network architecture.Under the support of K anonymous thought,the scheme constructs anonymous domains between multiple edge devices by means of message splitting and multipath uploading,using symmetric and asymmetric keys.This schema realize location privacy protection for terminal devices uploading and acquiring data in edge computing environment.In order to verify the feasibility of proposed scheme,based on Miracl large database and shared memory mechanism,the prototype verification system of the scheme is implemented in the environment of raspberry pie and Linux using C++ and Java language.The communication between devices is implemented by socket.A Visual web management system is developed in the cloud using MVC design idea to manage edge device authentication information and terminal data information.Finally,the function of the system is tested in detail.The test results show that the proposed scheme can effectively achieve identity authentication and location privacy protection of Internet of Things in edge computing environment,and it is feasible.
Keywords/Search Tags:Edge computing, Internet of Things, Identity authentication, Location privacy
PDF Full Text Request
Related items