Secure authentication communication system, method, and IoT device in fog computing environment

An Internet of Things device and security authentication technology, which is applied in the field of Internet of Things devices and security authentication communication systems, can solve problems such as increasing authentication delays, failing to guarantee authentication security, and inability to authenticate IoT devices, and achieve the effect of reducing communication delays

Active Publication Date: 2022-07-22
陕西艾拓云联智能科技有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] From the perspective of effectiveness and security, the current technology mainly has the following problems: (1) some schemes use cloud servers to achieve secure communication between fog nodes and IoT devices, which obviously increases the authentication delay; (2) Most security schemes cannot guarantee authentication security when the fog node is destroyed; (3) When an IoT device is registered in a fog node, the fog node moves out of the fog area, and the IoT device cannot communicate with other nodes in the fog area. authentication, which causes the IoT device to have to re-register
(4) Most secure authentication communication schemes are not lightweight and not suitable for resource-constrained IoT device implementations
[0004] Through the above analysis, the existing problems and defects of the existing technology are: the existing communication system or communication method, the authentication delay is high, the authentication security cannot be guaranteed, the authentication communication scheme is not lightweight, and is not suitable for resource-constrained IoT devices implementation; and IoT devices need to re-register after the registration node moves out of the fog zone
[0005] The difficulty of solving the above problems and defects is: Since some fog nodes and IoT devices are installed in public areas, they are easy to be faked and attacked. When one of them is attacked or faked, the communication should also be safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure authentication communication system, method, and IoT device in fog computing environment
  • Secure authentication communication system, method, and IoT device in fog computing environment
  • Secure authentication communication system, method, and IoT device in fog computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0089] 1. A security authentication communication system structure in a fog computing environment:

[0090] Fog computing consists of cloud layer, fog layer and device layer. The fog layer consists of many fog areas, and each fog area contains multiple fog nodes. The IoT device belongs to a fog area, and the IoT device transmits data by wireless communication with a fog node in the fog area. In addition, there is a trusted registration center in the system for the secure registration of newly added fog nodes and IoT devices. The purpose of the present invention is to realize secure communication at the fog layer and the device layer.

[0091] 2, the present invention realizes through the following technical scheme in order to achieve this purpose:

[0092] In order to achieve this purpose, the technical solution of the present invention includes three parts: first, a trusted registration center selects public parameters; second, a registration method for IoT devices and fog ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication, and discloses a security authentication communication system, method and IoT device in a fog computing environment. The security authentication communication system in the fog computing environment includes: a cloud layer, a fog layer and a device layer; the fog layer is composed of many The fog area is composed of fog areas, and each fog area includes multiple fog nodes; the device layer includes multiple IoT devices; the IoT devices belong to the fog area; Data is transmitted wirelessly. The security authentication communication method in the fog computing environment includes: selecting public parameters by a trusted registration center; registering IoT devices and fog nodes, and performing security authentication communication between fog nodes and IoT devices. The invention proposes a security authentication communication system and method in fog computing, which realizes secure communication in the fog layer and the device layer, and is suitable for protecting data transmission between IoT devices and fog nodes in a fog computing environment.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a security authentication communication system, method and Internet of Things device in a fog computing environment. Background technique [0002] At present, in order to realize various IoT applications, more and more IoT devices are connected to the Internet. The vast amounts of data generated by these devices need to be analyzed and processed. It is obviously not advisable to transmit all data directly to the cloud for centralized processing. This is due to the physical distance between the cloud and the IoT devices, and the large amount of data is transmitted remotely. This can cause severe network delays, thereby affecting the quality of service of IoT applications. . To solve this problem, fog computing came into being. Fog computing extends the capabilities of cloud computing to the edge of the network, providing computing, storage and network services...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/32H04L67/10
CPCH04L9/0838H04L9/083H04L9/0643H04L9/0869H04L9/3297H04L67/10
Inventor 熊楚豫郭亚军郭奕旻
Owner 陕西艾拓云联智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products