Edge computing,with its advantages of high reliability,low latency and low energy consumption,can help the development of Industrial Internet of Things(Io T)and bring more value and benefits to industrial production,such as improving industrial production efficiency,reducing energy consumption and production costs.In edge computing-based industrial Io T,edge computing puts forward higher requirements for the local processing ability of data.The traditional industrial programmable logic controller cannot complete this task.Therefore,the edge intelligent controller is developed according to the demand for edge computing.As the core component of edge computing,the security and reliable operation of edge intelligent controller has great significance and influence on the promotion and development of edge computing.As the first line of defense to ensure the security of industrial Io T,authentication can effectively prevent attackers from impersonating legitimate devices to obtain resources and access rights,while ensuring that access and communication between legitimate devices are safe and secure.Therefore,this paper provides an in-depth study of the authentication mechanism for edge intelligent controllers.Firstly,for the authentication problem between edge intelligent controllers and the edge server,this paper proposes an efficient revocable anonymous authentication scheme for the edge intelligent controllers.The authentication scheme is designed based on group signature technology,which protects the identity privacy of edge intelligent controllers while enabling the tracing of edge intelligent controllers’ identity information and applying an efficient revocable mechanism to revoke any illegal or abnormal edge intelligent controllers.Through security analysis,this paper demonstrates that the authentication scheme has anonymity,integrity,traceability,forward secrecy,resistance to the replay attack and efficient revocability.In addition,performance analysis and comparisons show that the authentication scheme has lower communication overhead and computational cost while satisfying more security properties.Therefore,the authentication scheme is efficient and feasible for edge intelligent controllers.Secondly,for the authentication problem between the edge intelligent controller and terminal devices,this paper proposes a lightweight authentication scheme for edge control systems.The terminal devices that need to access the edge intelligent controller have limited computing and storage capacity,and the traditional asymmetric cryptography-based authentication scheme is difficult to deploy on resource-constrained devices due to its high computing cost.Therefore,this paper designs a lightweight authentication scheme using low computational cost Hash function and Exclusive OR(XOR)operation that can achieve bidirectional anonymous authentication and key agreement between the edge intelligent controller and terminal devices.Through security analysis,this paper demonstrates that the authentication scheme is able to provide the necessary security features and defend against major known attacks.In addition,performance analysis and comparisons show that the authentication scheme has a lower computational cost while satisfying more security properties.Therefore,the authentication scheme is efficient and feasible for edge control systems. |