信息网络安全 ›› 2021, Vol. 21 ›› Issue (11): 58-64.doi: 10.3969/j.issn.1671-1122.2021.11.007

• 技术研究 • 上一篇    下一篇

轻量化移动边缘计算双向认证协议

李桐1,2, 周小明3(), 任帅2, 徐剑4   

  1. 1.东北大学计算机科学与工程学院,沈阳 110169
    2.国网辽宁省电力有限公司电力科学研究院,沈阳 110003
    3.国网辽宁省电力有限公司,沈阳 110003
    4.东北大学软件学院,沈阳 110169
  • 收稿日期:2021-06-13 出版日期:2021-11-10 发布日期:2021-11-24
  • 通讯作者: 周小明 E-mail:271337328@qq.com
  • 作者简介:李桐(1990—),男,辽宁,工程师,博士,主要研究方向为电力系统网络安全|周小明(1978—),男,黑龙江,高级工程师,博士,主要研究方向为网络安全|任帅(1989—),男,辽宁,工程师,硕士,主要研究方向为信息安全|徐剑(1978—),男,辽宁,副教授,博士,主要研究方向为网络与信息安全
  • 基金资助:
    工信部工业企业网络安全综合防护平台项目-物联网终端虚拟化与安全验证技术研究(TC200H01V)

Light-weight Mutual Authentication Protocol for Mobile Edge Computing

LI Tong1,2, ZHOU Xiaoming3(), REN Shuai2, XU Jian4   

  1. 1. School of Computer Science and Engineering, Northeastern University, Shenyang 110169
    2. China State Grid Liaoning Electric Power Research Institute, Shenyang 110003, China
    3. Grid Liaoning Electric Power Supply Co., LTD, Shenyang 110003, China
    4. Software College, Northeastern University, Shenyang 110169, China
  • Received:2021-06-13 Online:2021-11-10 Published:2021-11-24
  • Contact: ZHOU Xiaoming E-mail:271337328@qq.com

摘要:

移动边缘计算是一种新型计算模式,通过部署靠近数据源头的移动边缘计算服务器,可以满足移动智能设备的实时业务、数据优化、应用智能等需求。文章针对移动边缘计算场景中移动设备和移动边缘计算服务器之间的安全身份认证问题,提出了一种基于椭圆曲线加密的轻量化移动边缘计算双向认证协议。该协议使用椭圆曲线加密和哈希函数构建,满足双向认证、移动用户匿名保护、移动用户不可追踪等特性,同时可以抵抗重放攻击和中间人攻击等多种攻击手段。通过性能分析及与同类协议的对比表明,协议的整体计算开销较低,适用于计算资源受限的移动智能设备。

关键词: 物联网, 边缘计算, 身份认证, 椭圆曲线加密, 隐私保护

Abstract:

Mobile edge computing is a new computing paradigm, which can provide real-time computing, data optimization and smarter application to mobile smart devices by deploying mobile edge computing servers that are closer to the data sources. This paper focuses on the problem of secure identity authentication between mobile devices and mobile edge computing servers, and proposed a light-weight mutual authentication protocol for mobile edge computing based on elliptic curve cryptography and Hash function. The protocol achieved mutual authentication, mobile user anonymous protection and mobile user untraceability, and was secure against replay attack and man-in-the-middle attack. According to performance analysis and comparison with similar protocols, the proposed protocol has lower computational costs, and is suitable for resource constrained mobile smart devices.

Key words: Internet of things, edge computing, identity authentication, elliptic curve cryptography, privacy protection

中图分类号: