Secure Network Slicing Scheme with Signature Authentication and User Trust

被引:2
|
作者
Luo, Yiming [1 ]
Quan, Wei [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
来源
EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022 | 2023年 / 1696卷
关键词
Slicing network; Signature authentication; User trust;
D O I
10.1007/978-981-19-9697-9_21
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of the slicing network, slicing service providers need to protect the needs of users for differentiated services and they prefer to provide public APIs to users. However, attacks against public APIs pose challenges to the security of user identity authentication. In this paper, we design a network slicing scheme based on signature authentication and user trust, which provides a standardized and unified security access method through RESTful API. It can make access decisions according to the relevant attributes of users. Besides, we proposed a flexible model for the slicing network, featured by user trust and a decision model. The experiment shows that the scheme can ensure the anti-tampering and anti-counterfeiting of the slicing scheme, prevent replay attacks, enhance the non-repudiation of information and enhance the access judgment ability of the slicing scheme.
引用
收藏
页码:258 / 269
页数:12
相关论文
共 50 条
  • [1] A Secure Mobility Network Authentication Scheme Ensuring User Anonymity
    Chang, Ya-Fen
    Tai, Wei-Liang
    Hsu, Min-How
    SYMMETRY-BASEL, 2017, 9 (12):
  • [2] A Secure Remote User Authentication Scheme
    Park, Ji-Hye
    Yim, Seong Jun
    Chang, Jik Hyun
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 368 - 373
  • [3] A robust and secure signature scheme for video authentication
    Ahmed, Fawad
    Siyal, M. Y.
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 2126 - 2129
  • [4] User authentication scheme based on undeniable signature scheme
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (08): : 146 - 147
  • [5] More secure remote user authentication scheme
    Kim, Sang-Kyun
    Chung, Min Gyo
    COMPUTER COMMUNICATIONS, 2009, 32 (06) : 1018 - 1021
  • [6] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [7] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    JournalofCentralSouthUniversity, 2013, 20 (10) : 2741 - 2746
  • [8] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    Journal of Central South University, 2013, 20 : 2741 - 2746
  • [9] A New Secure Quantum Signature Masked Authentication Scheme
    Verma, Vandani
    Malhotra, Kajal
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (02) : 1659 - 1674
  • [10] Secure authentication policy with evidential signature scheme for WLAN
    Ouyang, Yen-Chieh
    Hsueh, Ching-Tsung
    Chen, Hung-Wei
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (03) : 259 - 270