Font Size: a A A

Research On Message Authentication Scheme Based On Edge Computing In Industrial Internet Of Things

Posted on:2022-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:F Q WangFull Text:PDF
GTID:2518306542963469Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Industrial Internet of Things(IIoT)is a typical application of Internet of Things in industry,which plays an important role in resource allocation,pollution reduction and production optimization.However,the IIoT brings privacy-sensitive data to the Internet,which is vulnerable to various network attacks by malicious network attackers.Message authentication technology is mainly used to verify the integrity and correctness of messages to ensure the security of IIoT system.However,the current message authentication scheme of the IIoT is faced with the issues of strong security assumption,high computing cost and high message transmission delay.In the IIoT system,resource-limited end users or end devices must timely process instant messages obtained from the network while collecting and publishing corresponding messages(such as temperature,instrument status,etc).On the one hand,the application of edge computing technology can effectively reduce the transmission time of messages in view of the large computing pressure and long response time of cloud servers.On the other hand,the application of edge computing technology can effectively improve the data processing speed in view of the limited computing capacity and storage capacity of smart devices.Aiming at the issues of insufficient message security and low message real-time in the IIoT system,this thesis studies the message authentication scheme based on edge computing in IIoT and obtains the following results:(1)This thesis proposes an anonymous message authentication scheme based on semi-trusted edge nodes in the IIoT.This scheme regards edge nodes and cloud nodes as semi-trusted third parties.Compared with the existing schemes that regards edge nodes and cloud nodes as fully trusted entities,this scheme has weaker security assumptions and is more in line with practical requirements.And the scheme uses group signature technology and proxy re-encryption technology,which significantly improves the security of IIoT system.Security analysis shows that the scheme ensures both the integrity,confidentiality and anonymity of messages.The scheme is implemented through a real publish/subscribe system,and the experimental results prove that this scheme can meet the real-time demand of messages in the IIoT.(2)This thesis proposes an efficient batch authentication scheme based on edge computing in the IIoT.The batch authentication scheme is constructed based on elliptic curve,and it can verify messages from different smart devices at the same time,thus effectively reducing the time of verifying massive data.The scheme designs a lightweight signature based on hash chain to further improve the efficiency of the scheme.Security proof and security analysis show that the scheme can resist a variety of network attacks in the IIoT system,and the experimental results prove that the scheme has a good performance in terms of computing cost and response time.
Keywords/Search Tags:Industrial Internet of Things, Edge computing, Group signature, Proxy re-encryption, Batch authentication
PDF Full Text Request
Related items