Font Size: a A A

Research On Authenticated Key Agreement Mechanism For Edge Computing Environment

Posted on:2021-06-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y T LiFull Text:PDF
GTID:2518306731498184Subject:Mathematics
Abstract/Summary:PDF Full Text Request
In the era of the Internet of Everything,the amount of data generated by devices connected to networks has increased sharply.The centralized data processing model represented by cloud computing has been unable to meet the real-time requirements of data processing.Edge computing has begun to enter the public eye.In the edge computing environment,the computing capabilities and storage resources of terminal devices are limited,and the edge network status is open and complex,which makes various security requirements increasingly urgent.The authenticated key agreement protocol uses the basic cryptographic algorithm to construct protocols,which aims to achieve the goals of key agreement and identity authentication and to protect the subsequent communication.The characteristics of the authenticated key agreement protocol determine its important position in security protection of edge comouting.At present,the existing authenticated key agreement protocol cannot meet the real-time and efficient needs.Therefore,lightweight authenticated key agreement mechanisms need to be designed in edge computing.In this thesis,we focus on studying authenticated key agreement protocols and explore the application characteristics of edge computing environment,particularly the security threats it faces.Moreover,we explore the design and application of authenticated key agreement protocol in edge computing applications.The main results are as follows:1.Several authenticated key agreement protocols are analyzed and improved.First,we analyse CL-AKA protocol,UPIAP1 and UPIAP2 protocol and GAAKE protocol.Besides,the specific attack methods of these protocols are given.Then,we analyze the security of HEEL protocol and present an improved protocol i HEEL for the HEEL protocol.By binding the long-term private key and temporary private key of both parties to the protocol,the ability of the protocol to resist attacks is significantly improved.Finally,we prove the security of i HEEL protocol through the provable security theory.2.The design of authentication protocol for mobile devices in edge computing is researched.First,we propose a multi-level security management mechanism based on the regional edge server.Then,we divide the area based on the geographical location in the mobile TV service system,and propose the cross-domain anonymous authenticated protocol MPAAS based on the regional edge server,which enables terminal equipments conduct handover authentication in different regional network environments.Finally,we use provable security theory to prove the security of MPAAS protocol.Compared with other similar protocols,the performance analysis of MPAAS protocol is given.3.The design of lightweight authenticated key agreement protocol in mobile edge comouting is researched.First,we present an authenticated architecture for the mobile edge computing environment,in order to reduce the bandwidth consumption of the backbone network and the pressure of centralized data storage.Then,we propose a lightweight anonymous authentication protocol MECAAS,which reduces the computing cost and communication overhead of mobile edge server.Finally,we use provable security theory to complete the proof of MECAAS protocol,and give the performance analysis.
Keywords/Search Tags:Authenticated Key Agreement, Edge Computing, Provable Security, Anonymity, Lightweight
PDF Full Text Request
Related items