期刊文献+

适用于车载边缘计算网络的高效匿名认证协议

An efficient anonymous authentication protocol for vehicle edge computing networks
下载PDF
导出
摘要 为了解决车载边缘计算网络中无线网络传输特性导致的窃听、重放、拦截、篡改等安全威胁,考虑到车载终端资源有限的特点,提出了一种轻量级匿名高效身份认证协议。基于切比雪夫混沌映射算法,避免了多数方案所采用的指数、双线性映射等复杂算法,有效降低了身份认证与密钥协商过程中的计算复杂度。此外,在实现接入认证及切换认证的同时,能够实现终端匿名性及可追溯、可撤销等安全功能。通过Scyther工具验证结果表明该协议能够满足认证过程中的安全需求并且能够抵抗多种协议攻击。相比已有方案,所提接入认证方案总计算开销最低可节省67%,带宽开销最低可节省11%。此外,相比于接入认证方案,所提域内切换认证方案总计算开销可节省99.8%,带宽开销可节省52%;域间切换认证方案总计算开销可节省80%,带宽开销可节省37%。性能分析结果表明该协议具备更良好的计算和通信性能,因此可以解决车载边缘计算网络中的终端高效安全接入及切换问题。 In order to solve security threats such as eavesdropping,replay,interception and tampering caused by the wireless network transmission characteristics in the on-board edge computing network,this paper proposes a lightweight anonymous and efficient identity authentication protocol considering the limited resources of on-board terminal.This protocol is based on Chebyshev chaotic mapping algorithm,which avoids complex algorithms such as exponential and bilinear mapping used in most schemes,and effectively reduces the computational complexity in the process of identity authentication and key negotiation.In addition,the protocol can not only realize access authentication and handover authentication,but also realizes terminal anonymity,traceability,revocation and other security functions.The verification results of Scyther tool show that the protocol can meet the security requirements in the authentication process and resist various protocol attacks.Compared with the existing schemes,the total computing cost of the access authentication scheme proposed in this paper can be reduced by 67%,and the bandwidth cost can be reduced by 11%.In addition,compared with the access authentication scheme,the total computing cost and bandwidth cost of the proposed intra-domain handover authentication scheme can be reduced by 99.8%and 52%,respectively.The total computing overhead and bandwidth overhead of the inter-domain handover authentication scheme can be reduced by 80%and 37%,respectively.Performance analysis results show that the protocol has better computing and communication performance,so the protocol can solve the problem of efficient and secure terminal access and handover in the on-board edge computing network.
作者 王昕怡 曹进 任雄鹏 马如慧 李晖 WANG Xinyi;CAO Jin;REN Xiongpeng;Ma Ruhui;LI Hui(School of Cyber Engineering,Xidian University,Xi’an 710126,China)
出处 《信息对抗技术》 2023年第1期21-37,共17页 Information Countermeasures Technology
基金 国家自然科学基金资助项目(62172317,U1836203) 陕西省重点产业创新链(群)-工业领域项目(2020ZDLGYO8-08)。
关键词 移动边缘计算 车联网 匿名性 身份认证 隐私保护 mobile edge computing(MEC) internet of vehicles anonymity identity authentication privacy protection
  • 相关文献

参考文献5

二级参考文献13

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部