Font Size: a A A

Research On Privacy And Security Authentication Method Based On SDN In Fog Environment

Posted on:2022-08-01Degree:MasterType:Thesis
Country:ChinaCandidate:Z J ZhuFull Text:PDF
GTID:2518306557968079Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of Internet of Things technology,more and more mobile intelligent terminal devices and various kinds of sensors have been applied to people's life scenes such as home,transportation and medical treatment.Moreover,due to the continuous increase of network scale,the virtual SDN architecture is gradually replacing the traditional distributed network.However,the mobile terminal in the edge network often has limited resources,so it cannot process the mass data of users in time.Therefore,an edge data center consisting of virtualized fog nodes is needed to provide fog computing services with specified functional requirements.In smart medicine,for example,the physiological data of a patient user needs to be reported to a nearby medical fog node so that doctors can make an online diagnosis.In order to ensure the privacy security of users when carrying out fog calculation,this paper combined with the characteristics of SDN open programming,conducted an in-depth study on the authentication and privacy protection technology of users' mobile terminals and fog nodes.The main research contents of this paper are as follows:(1)In view of the characteristics of distributed deployment of fog computing and limited computing resources of users' mobile terminals,this paper designs a lightweight authentication method based on SDN and supporting privacy property protection.It uses a programmable SDN gateway to replace the traditional network equipment and monitors the authentication requests of users and fog nodes through an intelligent gateway.In addition,the identity authentication and functional attribute authentication components in POX controller are designed based on bilinear mapping and dot product protocol,so as to reduce the computing overhead of Io T devices in encryption and decryption.Finally,the validity and accuracy of the authentication method are proved by simulation experiments.(2)Aimed at the real identity protection of users and fog nodes in fog computing environment,as well as the encryption of authentication message and location privacy in the authentication process,this paper designs a two-way anonymous authentication method that supports location privacy protection.The authentication method satisfies the mutual authentication requirement between the user and the fog node,and protects the authentication message in the transmission process through the key encryption algorithm and digital signature.Finally,a comparative experiment is carried out to verify that the authentication method designed in this paper can effectively reduce the computing and communication overhead compared with the traditional authentication method.(3)Based on the above research,an authentication system supporting privacy protection is built,which mainly includes modules such as device registration,management,identity authentication and attribute authentication.Then,the authentication function was tested from the client side.The test results showed that the security and reliability of fog computing could be guaranteed by appropriately adjusting the threshold value of the same privacy attribute under the conditions of different computing requirements,and the system's resource occupation rate was not more than 5.1% CPU and 23.8%memory.
Keywords/Search Tags:SDN, Fog Computing, Identity Authentication, Scalar Product Protocol, Privacy Security
PDF Full Text Request
Related items