适用于车载边缘计算网络的高效匿名认证协议
作者:
作者单位:

作者简介:

王昕怡,女,1998年生,硕士研究生,研究方向为边缘计算场景下的终端身份认证E-mail:874732434@qq.com

通讯作者:

中图分类号:

TP393

基金项目:

国家自然科学基金资助项目(62172317,U1836203);陕西省重点产业创新链(群)-工业领域项目(2020ZDLGYO8-08)


An efficient anonymous authentication protocol for vehicle edge computing networks
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    为了解决车载边缘计算网络中无线网络传输特性导致的窃听、重放、拦截、篡改等安全威胁,考虑到车载终端资源有限的特点,提出了一种轻量级匿名高效身份认证协议。基于切比雪夫混沌映射算法,避免了多数方案所采用的指数、双线性映射等复杂算法,有效降低了身份认证与密钥协商过程中的计算复杂度。此外,在实现接入认证及切换认证的同时,能够实现终端匿名性及可追溯、可撤销等安全功能。通过Scyther工具验证结果表明该协议能够满足认证过程中的安全需求并且能够抵抗多种协议攻击。相比已有方案,所提接入认证方案总计算开销最低可节省67%,带宽开销最低可节省11%。此外,相比于接入认证方案,所提域内切换认证方案总计算开销可节省99.8%,带宽开销可节省52%;域间切换认证方案总计算开销可节省80%,带宽开销可节省37%。性能分析结果表明该协议具备更良好的计算和通信性能,因此可以解决车载边缘计算网络中的终端高效安全接入及切换问题。

    Abstract:

    In order to solve security threats such as eavesdropping, replay, interception and tampering caused by the wireless network transmission characteristics in the on-board edge computing network, this paper proposes a lightweight anonymous and efficient identity authentication protocol considering the limited resources of on-board terminal. This protocol is based on Chebyshev chaotic mapping algorithm, which avoids complex algorithms such as exponential and bilinear mapping used in most schemes, and effectively reduces the computational complexity in the process of identity authentication and key negotiation. In addition, the protocol can not only realize access authentication and handover authentication, but also realizes terminal anonymity, traceability, revocation and other security functions. The verification results of Scyther tool show that the protocol can meet the security requirements in the authentication process and resist various protocol attacks. Compared with the existing schemes, the total computing cost of the access authentication scheme proposed in this paper can be reduced by 67%, and the bandwidth cost can be reduced by 11%. In addition, compared with the access authentication scheme, the total computing cost and bandwidth cost of the proposed intra-domain handover authentication scheme can be reduced by 99.8% and 52%, respectively. The total computing overhead and bandwidth overhead of the inter-domain handover authentication scheme can be reduced by 80% and 37%, respectively. Performance analysis results show that the protocol has better computing and communication performance, so the protocol can solve the problem of efficient and secure terminal access and handover in the on-board edge computing network.

    参考文献
    相似文献
    引证文献
引用本文
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2022-10-25
  • 最后修改日期:2022-11-26
  • 录用日期:
  • 在线发布日期: 2023-05-04
  • 出版日期: