A Trusted Internet of Things Access Scheme for Cloud Edge Collaboration

被引:1
作者
Zhu, Wenlong [1 ]
Zhou, Changli [1 ]
Jiang, Linmei [1 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
关键词
Internet of Things; protocol; chaotic mapping algorithm; cloud edge collaboration; KEY MANAGEMENT PROTOCOL; AUTHENTICATION PROTOCOL; AGREEMENT PROTOCOL; PROVABLY SECURE;
D O I
10.3390/electronics13061026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid popularization of current Internet of Things (IoT) technology and 5G networks, as well as the continuous updating of new service lifestyles and businesses, the era of big data processing for the IoT has arrived. However, centralizing all data for processing in the cloud can lead to issues such as communication latency and privacy breaches. To solve these problems, edge computing, as a new network architecture close to terminal data sources and supporting low latency services, has gradually emerged. In this context, cloud edge collaborative computing has become an important network architecture. With the changing security requirements and communication methods of cloud edge collaborative network architecture, traditional authentication key agreement protocols are no longer applicable. Therefore, a new IoT authentication and key agreement protocol needs to be designed to solve this problem. This study proposes an IoT accessible solution for cloud edge collaboration. This scheme adopts a chaotic mapping algorithm to achieve efficient authentication. It ensures the anonymity and untraceability of users. Following this, we conducted strict security verification using BAN logic and Scyther tools. Through experimental comparative analysis, the research results show that the protocol performs better than other schemes while ensuring security. This indicates that the protocol can achieve efficient authentication and key negotiation in cloud edge collaborative network architecture, providing a secure and reliable solution for the accessibility of the IoT.
引用
收藏
页数:17
相关论文
共 41 条
  • [1] Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications
    AbdolrezaEftekhari, Seyed
    Nikooghadam, Morteza
    Rafighi, Masoud
    [J]. VEHICULAR COMMUNICATIONS, 2021, 28
  • [2] A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
    Amin, Ruhul
    Kumar, Neeraj
    Biswas, G. P.
    Iqbal, R.
    Chang, Victor
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 1005 - 1019
  • [3] Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks
    Babu, Erukala Suresh
    Barthwal, Amogh
    Kaluri, Rajesh
    [J]. COMPUTER COMMUNICATIONS, 2023, 199 : 10 - 29
  • [4] A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Srinivas, Jangirala
    Kumar, Neeraj
    Chattopadhyay, Samiran
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8739 - 8752
  • [5] Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
    Challa, Sravani
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEEE ACCESS, 2017, 5 : 3028 - 3043
  • [6] Collaborative Authentication for 6G Networks: An Edge Intelligence Based Autonomous Approach
    Fang, He
    Xiao, Zhenlong
    Wang, Xianbin
    Xu, Li
    Hanzo, Lajos
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2091 - 2103
  • [7] Robust Biometrics-Based Authentication Scheme for Multiserver Environment
    He, Debiao
    Wang, Ding
    [J]. IEEE SYSTEMS JOURNAL, 2015, 9 (03): : 816 - 823
  • [8] A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
    Hou, Yichen
    Garg, Sahil
    Hui, Lin
    Jayakody, Dushantha Nalin K.
    Jin, Rui
    Hossain, M. Shamim
    [J]. IEEE ACCESS, 2020, 8 : 136119 - 136130
  • [9] Authenticated key agreement scheme for fog-driven IoT healthcare system
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. WIRELESS NETWORKS, 2019, 25 (08) : 4737 - 4750
  • [10] Signature-based three-factor authenticated key exchange for internet of things applications
    Jia, Xiaoying
    He, Debiao
    Li, Li
    Choo, Kim-Kwang Raymond
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18355 - 18382