透過您的圖書館登入
IP:3.147.66.149
  • 學位論文

霧/邊緣計算中安全協議的設計與實現

Design and Implementation of Security Protocol in Fog/Edge Computing

指導教授 : 袁賢銘

摘要


安全協議是霧聯網和邊緣網絡順利運行的關鍵因素。必須建立多個通信方之間的協 議,以確保網絡中的安全運行。該協議可應用於多個啟用網絡的區域,包括分散式系 統,無線感測網路,智能城市,微雲等。在安全互認協議(SMAP)霧/邊緣中,問題陳 述為“設計並實作霧服務器和邊緣設備使用安全的相互身份驗證相互動態互連”。後台 方法包括偽隨機數生成器(PRNG),雜湊函式,時間戳,這些時間戳可用於互連大量 物聯網和計算設備。它還具有使用對話鍵的功能,對於不同使用者的每個驗證都是唯 一的,並且在相同使用者的每次驗證中避免了重複。和基準比較後的評估結果顯示本 文提出之協議效果較佳。對於雜湊鏈霧/邊緣,身份驗證對於防止霧/邊緣計算中的各種 類型的攻擊至關重要。實驗結 果證明,雜湊鏈霧/邊緣被發現可以更有效地互連各種設備並在基準比較中勝出。

並列摘要


Security protocols are a crucial factor for the smooth functioning of fog/edge networks. The agreement between multiple communicating parties has to be established to enable safe functioning in the networks. The protocol can be applied to be everal network enabled areas including distributed systems, wireless sensor networks, Smart City, Micro-Cloud, etc. In Secure Mutual Authentication Protocol (SMAP) Fog/Edge the problem statement is given as “Design and implementation of Fog servers and edge devices to dynamically interconnect with each other using secured mutual authentication”. The background methods include pseudo-random number generator (PRNG), hash function, time-stamps found to be useful for interconnecting large numbers of IoT and computing devices. Also it features using session keys, unique for every authentication and avoiding its repetition. Benchmark results are provided for proving the protocol performance evaluation. In the case of Hash-Chain Fog/Edge and the evaluations compete in benchmark comparison.

參考文獻


[1] B. Schneier, Applied Cryptography, 2nd ed. Hoboken, NJ, USA: Wiley, 1996.
[2] C. Easttom, Modern Cryptography: Applied Mathematics for Encryption and Information Security. New York, NY, USA: McGraw-Hill, 2016.
[3] M. H. Ibrahim, "Octopus: An edge-fog mutual authentication scheme,’Int. J. Netw. Secur., vol. 18, no. 6, pp. 1089–1101, Nov. 2016.
[4] V. L. Shivraj, M. A. Rajan, M. Singh, and P. Balamuralidhar, "One time password authentication scheme based on elliptic curves for Internet of Things (IoT),’’ in Proc. 5th IEEE Nat. Symp. Inf. Technol., Towards Smart World, Feb. 2015, pp. 1–6.
[5] D. Kelly and M. Hammoudeh, ‘‘Optimisation of the public key encryption infrastructure for the Internet of Things,’’ in Proc. Int. Conf. Future Netw. Distrib. Syst. (ICFNDS), Amman, Jordan, Jun. 2018, Art. no. 45.

延伸閱讀