Skip to main content

2020 | OriginalPaper | Buchkapitel

Identity Authentication Under Internet of Everything Based on Edge Computing

verfasst von : Zixiao Kong, Jingfeng Xue, Yong Wang, Weijie Han, Xinyu Liu

Erschienen in: Trusted Computing and Information Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rapid development of the Internet, the application of the Internet of things and big data is more and more extensive. The era of Internet of everything (IoE) has come, and the traditional cloud computing model has been unable to efficiently process the massive data generated by a large number of edge devices. Therefore, edge-type big data processing which is oriented to massive data computing generated by network edge devices—edge computing comes into being. However, due to the complexity of edge computing, data security and privacy issues become more prominent. Aiming at the security authentication of edge equipment under the Internet of everything, this paper designs an identity authentication framework under the Internet of everything based on edge computing. In the framework, multi-factor identity authentication is applied to solve the weakness of edge equipment security authentication. Moreover, the software defined network technology (SDN) is adopted to realize the global management of the deployment and application of a large number of edge equipment, which can effectively realize the effective security protection of the Internet of everything. In the end, the formalized verification of the identity authentication process of the designed framework is carried out.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shi, W., Sun, H., Cao, J., et al.: Edge computing: a new computing model in the Internet of everything era. Comput. Res. Dev. 54(5), 907–924 (2017) Shi, W., Sun, H., Cao, J., et al.: Edge computing: a new computing model in the Internet of everything era. Comput. Res. Dev. 54(5), 907–924 (2017)
3.
Zurück zum Zitat Cisco cloud index supplement. Cloud readiness regional details white paper (2017) Cisco cloud index supplement. Cloud readiness regional details white paper (2017)
4.
Zurück zum Zitat Evans, D.: The Internet of everything: how more relevant and valuable connections will change the world. Cisco IBSG 2012, 1–9 (2012) Evans, D.: The Internet of everything: how more relevant and valuable connections will change the world. Cisco IBSG 2012, 1–9 (2012)
5.
Zurück zum Zitat Zhang, J., Zhao, Y., Chen, B., Hu, F., Zhu, K.: Research review on edge computing data security and privacy protection. J. Commun. 39(03), 1–21 (2008) Zhang, J., Zhao, Y., Chen, B., Hu, F., Zhu, K.: Research review on edge computing data security and privacy protection. J. Commun. 39(03), 1–21 (2008)
6.
Zurück zum Zitat An, X., Cao, G., Miao, L., Ren, S., Lin, F.: Security review of intelligent edge computing. Telecommun. Sci. 34(07), 135–147 (2018) An, X., Cao, G., Miao, L., Ren, S., Lin, F.: Security review of intelligent edge computing. Telecommun. Sci. 34(07), 135–147 (2018)
9.
Zurück zum Zitat Bangui, H., Rakrak, S., Raghay, S., et al.: Moving to the edge-cloud-of-things: recent advances and future research directions. Electronics 7, 309 (2018)CrossRef Bangui, H., Rakrak, S., Raghay, S., et al.: Moving to the edge-cloud-of-things: recent advances and future research directions. Electronics 7, 309 (2018)CrossRef
10.
Zurück zum Zitat Liu, J., Ming, M., Wang, H., et al.: Optimization method of attribute-based ciphertext access control for mobile cloud. J. Commun. 39(373) (7), 43–53 (2018) Liu, J., Ming, M., Wang, H., et al.: Optimization method of attribute-based ciphertext access control for mobile cloud. J. Commun. 39(373) (7), 43–53 (2018)
11.
Zurück zum Zitat Roy, S., Chatterjee, S., Das, A.K., et al.: On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services. IEEE Access 5, 25808–25825 (2017)CrossRef Roy, S., Chatterjee, S., Das, A.K., et al.: On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services. IEEE Access 5, 25808–25825 (2017)CrossRef
13.
Zurück zum Zitat Jin, B.W., Park, J.O., Mun, H.J.: A design of secure communication protocol using RLWE-based homomorphic encryption in IoT convergence cloud environment. Wirel. Pers. Commun. 105, 599–618 (2018)CrossRef Jin, B.W., Park, J.O., Mun, H.J.: A design of secure communication protocol using RLWE-based homomorphic encryption in IoT convergence cloud environment. Wirel. Pers. Commun. 105, 599–618 (2018)CrossRef
14.
Zurück zum Zitat Dhillon, P.K., Kalra, S.: Multi-factor user authentication scheme for IoT-based healthcare services. J. Reliab. Intell. Environ. 4(3), 141–160 (2018)CrossRef Dhillon, P.K., Kalra, S.: Multi-factor user authentication scheme for IoT-based healthcare services. J. Reliab. Intell. Environ. 4(3), 141–160 (2018)CrossRef
15.
Zurück zum Zitat Zhang, X., Shao, Y., Sun, C.: Overall design of smart transportation for future cities. Urban Transp. (05), 1–7 (2018) Zhang, X., Shao, Y., Sun, C.: Overall design of smart transportation for future cities. Urban Transp. (05), 1–7 (2018)
16.
Zurück zum Zitat Mei, H.: Everything can be connected and everything can be programmed. Fangyuan (12), 58–59 (2018) Mei, H.: Everything can be connected and everything can be programmed. Fangyuan (12), 58–59 (2018)
17.
Zurück zum Zitat Liu, J., Xiao, Y., Chen, C.L.P.: Authentication and access control in the internet of things. In: International Conference on Distributed Computing Systems Workshops. IEEE Computer Society (2012) Liu, J., Xiao, Y., Chen, C.L.P.: Authentication and access control in the internet of things. In: International Conference on Distributed Computing Systems Workshops. IEEE Computer Society (2012)
18.
Zurück zum Zitat He, W., Golla, M., Padhi, R., Ofek, J., Dürmuth, M., Fernandes, E., Ur, B.: Rethinking access control and authentication for the home internet of things (IoT). In: Proceedings of USENIX Security Symposium (2018) He, W., Golla, M., Padhi, R., Ofek, J., Dürmuth, M., Fernandes, E., Ur, B.: Rethinking access control and authentication for the home internet of things (IoT). In: Proceedings of USENIX Security Symposium (2018)
19.
Zurück zum Zitat Tu, Y., Dong, Z., Yang, H.: Key technologies and application of edge computing. ZTE Commun. 15(02), 26–34 (2017) Tu, Y., Dong, Z., Yang, H.: Key technologies and application of edge computing. ZTE Commun. 15(02), 26–34 (2017)
20.
Zurück zum Zitat Wang, F., Wen, H., Chen, S., Chen, L., Hou, W.: Protection method of mobile intelligent terminal privacy data under edge computing. Cyberspace Secur. 9(02), 47–50 (2018) Wang, F., Wen, H., Chen, S., Chen, L., Hou, W.: Protection method of mobile intelligent terminal privacy data under edge computing. Cyberspace Secur. 9(02), 47–50 (2018)
21.
Zurück zum Zitat Chen, Z., Guo, B., Zhang, Y.: MEC technology scheme and application analysis of 5G network edge computing. Mob. Commun. 42(07), 34–38 (2018) Chen, Z., Guo, B., Zhang, Y.: MEC technology scheme and application analysis of 5G network edge computing. Mob. Commun. 42(07), 34–38 (2018)
24.
Zurück zum Zitat Tian, Y., Zhang, N., Lin, Y.-H., Wang, X., Ur, B., Guo, X., Tague, P.: SmartAuth: user-centered authorization for the internet of things. In: Proceedings of the USENIX Security Symposium (2017) Tian, Y., Zhang, N., Lin, Y.-H., Wang, X., Ur, B., Guo, X., Tague, P.: SmartAuth: user-centered authorization for the internet of things. In: Proceedings of the USENIX Security Symposium (2017)
25.
Zurück zum Zitat Wang, M.: A three-factor two-way identity authentication scheme in mobile internet. In: Proceedings of 2017 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017), Research Institute of Management Science and Industrial Engineering: Computer Science and Electronic Technology International Society, p. 5 (2017) Wang, M.: A three-factor two-way identity authentication scheme in mobile internet. In: Proceedings of 2017 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017), Research Institute of Management Science and Industrial Engineering: Computer Science and Electronic Technology International Society, p. 5 (2017)
26.
Zurück zum Zitat He, W., et al.: Rethinking access control and authentication for the home internet of things (IoT). In: Proceedings of the USENIX Security Symposium (2018) He, W., et al.: Rethinking access control and authentication for the home internet of things (IoT). In: Proceedings of the USENIX Security Symposium (2018)
28.
Zurück zum Zitat Zhao, Y., Zhang, X.: New media identity authentication and traffic optimization in 5G network. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 1331–1334 (2017) Zhao, Y., Zhang, X.: New media identity authentication and traffic optimization in 5G network. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 1331–1334 (2017)
29.
Zurück zum Zitat Fan, X., Lu, Z., Ju, L.: Security of SDN southbound channel. J. Beijing Univ. Electron. Sci. Technol. 24(04), 15–20 (2016) Fan, X., Lu, Z., Ju, L.: Security of SDN southbound channel. J. Beijing Univ. Electron. Sci. Technol. 24(04), 15–20 (2016)
Metadaten
Titel
Identity Authentication Under Internet of Everything Based on Edge Computing
verfasst von
Zixiao Kong
Jingfeng Xue
Yong Wang
Weijie Han
Xinyu Liu
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-3418-8_6