Font Size: a A A

Research On Authentication And Key Agreement Protocols Based On Fog Computing

Posted on:2021-03-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y HuangFull Text:PDF
GTID:2428330611499760Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet,many application servers are built on cloud servers and rely on cloud computing centers to provide services.The advantages of cloud computing are undeniable.But after the huge number of wearable devices are connects to the cloud computing center,it will cause problems such as network congestion,high latency,low service quality,and a large amount of occupied bandwidth.The current cloud computing structure are no longer handle such situations.Therefore,"fog computing" was proposed as an extension of cloud computing in 2011,and a fog computing architecture based on different application scenarios quickly appeared.Fog computing can reduce the pressure on the cloud,play a role in filtering and aggregating user information,improve transmission efficiency,and reduce latency.However,although the architecture of fog computing is conducive to the future development of the Internet of Things,the network communication under the fog computing architecture is not secure.The authentication and key agreement protocols combine various types of authentication mechanisms.The session communicating parties authenticate each other's identity,and the calculation of the generated session key for subsequent effective session communication is an important mechanism that can ensure secure communication and privacy protection.Out of the security of the transmitted data,it is the first priority to ensure that the network communication can safely transmit data in the public channel and the key of the communicating party of the conversation is not leaked to the attacker.Therefore,this article has made in-depth research on the existing authentication key agreement protocols,attacked many existing protocols with security vulnerabilities,and proposed improvements,which have been published in papers.Then,based on two different application scenarios,we proposed two efficient,lightweight and secure protocols based on the characteristics of fog computing.Among them,in the first protocol,the fog node is used as an transmit node,and the protocol is implemented by fuzzy extractor,XOR and one way hash function;In the second protocol,the fog node is used as a node for verifying the user,and the protocol is implemented in Elliptic curve cryptography.The security of the protocol is verified by the protocol formal analysis tool Pro Verif and BAN logical to verify the protocol and derive the formal security analysis of the results.On the other han d,it simulates an attacker to perform informal security analysis from m ultiple existing attack methods to prove the security of the protocol.The performance analysis of the protocol proves the efficiency of the protocol by comparing the storage and communication costs with related protocols.
Keywords/Search Tags:fog computing, mutual authentication, key agreement, smart grid, Internet of Vehicles
PDF Full Text Request
Related items