Security authentication system and method for fog computing environment based on block chain, terminal and medium

A security authentication and blockchain technology, applied in the field of Internet of Things security authentication, can solve the problems of increasing authentication delay, easy to be captured, fog nodes are not completely credible, etc., and achieve the effect of preventing desynchronization attacks

Pending Publication Date: 2022-03-04
ZHONGNAN UNIVERSITY OF ECONOMICS AND LAW
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Many IoT devices are actually deployed in public places where they are easily captured
Third, fog nodes are not completely trustworthy. This is because fog nodes are deployed in public areas near IoT devices and are easily destroyed or captured by attackers.
Fourth, many authentication schemes designed for IoT systems use computationally intensive cryptographic primitives, which are not suitable for resource-constrained IoT devices to participate in authentication
There are also three problems in introducing blockchain into fog computing: first, whether the authentication scheme can be guaranteed to be lightweight
The authentication method that combines blockchain with public key technology is commonly used. IoT devices are resource-constrained, and using public key technology will reduce the authentication efficiency of IoT devices
Second, security issues
Third, the issue of anonymity
[0005] (1) In the cloud-assisted IoT authentication scheme, the remote cloud must be used to perform the authentication process; in the gateway-assisted IoT authentication scheme, the gateway close to the IoT device is assumed to be completely trusted, and in the fog-assisted IoT authentication In the Internet of Things authentication scheme, it is also assumed that there is a trusted entity participating in the authentication, but the assumptions in the existing authentication schemes are not always true
[0006] (2) The participation of the cloud will increase the authentication delay, which does not conform to the characteristics of fog computing; IoT devices deployed in public places are easily captured; fog nodes are not completely trusted; at the same time, many authentication schemes designed for IoT systems Using computationally intensive cryptographic primitives is not suitable for resource-constrained IoT devices to participate in authentication; therefore, existing security authentication schemes are not suitable for fog-assisted IoT systems
[0007] (3) The introduction of blockchain in fog computing also has the problem of whether the authentication scheme can be guaranteed to be lightweight, security issues, and anonymity issues. Using public key technology will reduce the authentication efficiency of IoT devices, and information related to user identities Will leak the privacy of users and IoT devices
[0008] The difficulty in solving the above problems and defects is as follows: there are three difficulties. First, without the participation of a trusted third party, it is a challenging problem to achieve mutual authentication between fog nodes and IoT devices; second, it is necessary to ensure authentication The scheme is lightweight and resistant to known attacks; finally, using the blockchain faces security and anonymity issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication system and method for fog computing environment based on block chain, terminal and medium
  • Security authentication system and method for fog computing environment based on block chain, terminal and medium
  • Security authentication system and method for fog computing environment based on block chain, terminal and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] Aiming at the problems existing in the prior art, the present invention provides a security authentication system and method for a fog computing environment based on blockchain. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0048] Such as figure 1 As shown, the security authentication system for the blockchain-based fog computing environment provided by the embodiment of the present invention includes four entities, the registration authority RA, the fog node, the IoT device and the blockchain network.

[0049] Among them, the registration authority is a tru...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of Internet of Things security authentication, and discloses a security authentication system and method for a fog computing environment based on a block chain, a terminal and a medium. The security authentication system of the fog computing environment based on the block chain comprises four entities including a registration authority (RA), a fog node, Internet of Things equipment and a block chain network. The security authentication method of the fog computing environment based on the block chain comprises the following steps: registering an Internet of Things device through a trusted registration authority; in the registration stage of the Internet of Things equipment, the registration authority RA is responsible for securely registering each Internet of Things equipment and writing registration information into the block chain; and meanwhile, security authentication between the fog node and the Internet of Things equipment is carried out. According to the invention, a block chain technology is adopted, a novel lightweight security authentication system and method for the fog computing environment are designed, the Internet of Things equipment can be effectively authenticated, secure communication between the Internet of Things equipment and the fog node in the fog computing environment can be protected, and expected security and efficiency requirements in the fog computing environment can be met at the same time.

Description

technical field [0001] The invention belongs to the technical field of security authentication of the Internet of Things, and in particular relates to a security authentication system, method, terminal and medium of a blockchain-based fog computing environment. Background technique [0002] At present, the widespread application of the Internet of Things has prompted more and more Internet of Things devices to be connected to the network. These interconnected devices will generate an unprecedented amount of data. It is obviously not advisable to transmit all data to the cloud for centralized processing. In order to solve the requirements of low latency, low bandwidth consumption, high reliability, high security, and high quality of experience required by IoT applications, fog computing emerged as the times require. Fog computing is a new distributed computing paradigm that extends cloud computing services to the edge of the network. It directly provides computing, storage, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L9/32G06F21/62
CPCH04L63/08H04L63/123H04L9/3278H04L9/3297G06F21/6218H04L2463/121
Inventor 郭奕旻
Owner ZHONGNAN UNIVERSITY OF ECONOMICS AND LAW
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products