LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context

被引:42
作者
Wang, Qixu [1 ]
Chen, Dajiang [1 ,2 ]
Zhang, Ning [2 ]
Qin, Zhen [1 ]
Qin, Zhiguang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 611731, Peoples R China
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会; 美国国家科学基金会; 中国博士后科学基金;
关键词
5G; Internet of things; fog node; caching; access control; authentication; WIRELESS; GENERATION; INTERNET;
D O I
10.1109/ACCESS.2017.2678510
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to massive mobile terminal devices and ubiquitous communication, the Internet of things (IoT) has become an inevitable trend. Given that the fifth generation (5G) wireless networks expects to drive the proliferation of the IoT and may extend the access functions and systems of the IoT, it makes the IoT a vitally important part in future 5G wireless networks. Simultaneously, the limit of the bandwidth and power of the 5G would adversely affect the widespread promotion of the IoT. However, wireless caching techniques could remarkably resolve this issue. Recently, using fog nodes to improve the capacity of caching has become a trend in caching system. However, node-based caching systems may suffer from malicious access and destruction. To protect caching from sabotage and to further ensure its reliability, we propose a new lightweight label-based access control scheme (LACS) that authenticates the authorized fog nodes to ensure protection. Specifically, the LACS can authenticate the fog nodes by verifying the integrity of the shared files that are embedded label values, and only the authenticated fog nodes can access the caching service. The analysis shows that the proposed scheme is verifiable (the malicious fog node cannot cheat the caching server to pretend to be a legal node) and efficient in both computation and verification. Moreover, simulation experiments show that the LACS can reach the millisecond-level verification and it has a good accuracy.
引用
收藏
页码:4018 / 4027
页数:10
相关论文
共 48 条
[1]   Ubiquitous Shift with Information Centric Network Caching Using Fog Computing [J].
Abdullahi, Ibrahim ;
Arif, Suki ;
Hassan, Suhaidi .
COMPUTATIONAL INTELLIGENCE IN INFORMATION SYSTEMS, 2015, 331 :327-335
[2]  
Amadco M, 2015, IEEE ICC, P648, DOI 10.1109/ICC.2015.7248395
[3]  
[Anonymous], IMPLEMENTING SHA2 AC
[4]  
[Anonymous], 2013, J INTERNET SERVICES
[5]  
[Anonymous], GRADUALLY SUNETTING
[6]  
[Anonymous], 2015, P 5G RADIO TECHNOLOG, DOI DOI 10.1049/IC.2015.0029
[7]  
[Anonymous], INT C INF SCI COMM T
[8]  
[Anonymous], 2013, P INT WORKSHOP ADAPT
[9]  
[Anonymous], 2014, P IEEE EM TECHN FACT, DOI DOI 10.1109/ETFA.2014
[10]  
[Anonymous], 2015, P 2015 WORKSH MOB BI