首页 | 本学科首页   官方微博 | 高级检索  
     

一种适用于雾计算的终端节点切换认证协议
引用本文:胡荣磊,陈雷,段晓毅,于秉琪.一种适用于雾计算的终端节点切换认证协议[J].电子与信息学报,2020,42(10):2350-2356.
作者姓名:胡荣磊  陈雷  段晓毅  于秉琪
作者单位:1.北京电子科技学院 北京 1000702.北京邮电大学网络空间安全学院 北京 100876
基金项目:国家自然科学基金(61772047),中央高校基本科研业务费项目(328201914),北京电子科技学院中央高校研究基金(2017LG01)
摘    要:针对当前雾计算环境下终端节点的切换认证协议在存储量、计算量和安全性等方面还存在缺陷,该文提出一种高效的终端节点切换认证协议。在该协议中,采用双因子组合公钥(TF-CPK)和认证Ticket相结合的方式,实现雾节点和终端节点的相互认证和会话密钥协商。安全性和性能分析结果表明,该协议支持不可跟踪性,可以抵抗众多已知攻击和安全威胁,且具有较小的系统开销。

关 键 词:雾计算    终端节点    切换认证    双因子组合公钥    认证票据
收稿时间:2020-01-02

A Switching Authentication Protocol of Terminal Node for Fog Computing
Ronglei HU,Lei CHEN,Xiaoyi DUAN,Bingqi YU.A Switching Authentication Protocol of Terminal Node for Fog Computing[J].Journal of Electronics & Information Technology,2020,42(10):2350-2356.
Authors:Ronglei HU  Lei CHEN  Xiaoyi DUAN  Bingqi YU
Affiliation:1.Beijing Electronic Science and Technology Institute, Beijing 100070, China2.School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
Abstract:In order to solve the problem that the switching authentication protocol of terminal nodes in fog computing has some defects in storage, compute and security, an efficient terminal node switching authentication protocol is proposed. In this protocol, mutual authentication and session key agreement between the fog nodes and terminal nodes are realized by the combination of Two Factors Combined Public Key(TF-CPK) and authentication ticket. The security and performance analysis results show that the protocol supports untraceability, which can resist numerous known attacks and security threats, and has a smaller system overhead.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号