Font Size: a A A

Research On Identity Authentication Mechanism Based On Consortium Blockchain For Edge Computing Nodes

Posted on:2023-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:C M RongFull Text:PDF
GTID:2568307031988659Subject:Control engineering
Abstract/Summary:PDF Full Text Request
The introduction of edge computing technology provides real-time and efficient computing services for industrial field device,it solves the problem of data processing and computing for industrial field device.However,compared with the traditional Internet,edge network security under more threats.Identity authentication is the first door of defense of the edge network security system.How to ensure the trusted access of edge computing nodes to the edge network is the key to its large-scale application.Based on this,this thesis designs an identity authentication mechanism based on consortium blockchain for edge computing nodes.The main work is as follows:1.The security requirements of identity authentication in industrial edge computing networks are analyzed,meanwhile,the possible attacks on industrial edge networks are summarized.Consortium blockchain based edge computing nodes identity authentication architecture is designed,in order to establish a foundation for building an industrial edge computing identity authentication mechanism.This architecture builds the consortium blockchain at the edge layer,which can provide effective security authentication for edge nodes.2.An identity authentication mechanism based on consortium blockchain for edge computing nodes is proposed.A method for collecting and processing edge computing node feature data is designed for edge computing scenarios,on this basis,a risk assessment algorithm for edge computing nodes based on SGD is designed;an identity authentication mechanism based on consortium blockchain is designed,which combined with the risk assessment algorithm.This mechanism uses the information of edge computing nodes as elements,writes the identity information summary as a transaction into the blockchain,moreover associates the transaction with the distributed storage system.This mechanism takes different identity authentication measures based on the risk assessment results of the edge computing nodes.3.In order to verify and test the proposed identity authentication mechanism for edge computing nodes,a verification platform is built.Malicious edge nodes attacking the edge network is simulated to generate feature dataset by using OMNET++,the effectiveness of the edge computing node risk assessment algorithm is verified.A verification platform is built by using the laboratory’s WIA-PA wireless system and edge devices,the functions and system overhead of the mechanism’s identity registration,identity authentication and identity update were tested and analyzed.The results show that the accuracy rate of the risk assessment algorithm is about 91%,the evaluation time of the algorithm meets the needs of the identity authentication mechanism for real-time risk assessment.Moreover,the scheme proposed in this thesis provides an efficient,secure and distributed identity authentication service for edge computing nodes at a relatively low cost.
Keywords/Search Tags:edge computing, identity authentication, consortium blockchain, cyber security
PDF Full Text Request
Related items