基于雾计算的工业无线传感器网络认证方案分析与改进

Yuyan Huo, Baoyuan Kang, Xinyu Zuo, Shufang Niu, Anqian Li
{"title":"基于雾计算的工业无线传感器网络认证方案分析与改进","authors":"Yuyan Huo, Baoyuan Kang, Xinyu Zuo, Shufang Niu, Anqian Li","doi":"10.54097/fcis.v4i3.10737","DOIUrl":null,"url":null,"abstract":"Cloud computing enables access to needed resources from a shared pool of configurable computing resources anytime, anywhere. Cloud computing offers many benefits, such as security and reliability of data and convenience of resource sharing. But as more and more devices are accessed, the demand for network bandwidth increases and it is because cloud computing centralizes all the resources that risks are also centralized. To overcome the shortcomings of cloud computing, the concept of fog computing has been introduced. Fog computing supports high mobility and has a wide geographical distribution, it also delivers data with very low latency. However, as an extension of cloud computing, fog computing inherits the security and privacy issues of cloud computing. Therefore, identity authentication in a fog computing environment is essential. In 2022, Sahoo et al. proposed an authentication scheme for industrial wireless sensor networks with fog computing. However, we analyze the security of Sahoo et al.’s scheme and find that many places in the data distribution phase are not clearly explained and their scheme is also not resistant to user impersonation attack, tracking attack, denial of service attack and replay attack. In order to overcome the weaknesses of Sahoo et al.’s scheme, this paper proposes an improved scheme by making full use of random numbers and timestamps. After security analysis and comparison with some similar schemes, it is shown that the improved scheme can resist various known attacks and has smaller computational cost.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis and Improvement of Authentication Schemes for Industrial Wireless Sensor Networks with Fog Computing\",\"authors\":\"Yuyan Huo, Baoyuan Kang, Xinyu Zuo, Shufang Niu, Anqian Li\",\"doi\":\"10.54097/fcis.v4i3.10737\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing enables access to needed resources from a shared pool of configurable computing resources anytime, anywhere. Cloud computing offers many benefits, such as security and reliability of data and convenience of resource sharing. But as more and more devices are accessed, the demand for network bandwidth increases and it is because cloud computing centralizes all the resources that risks are also centralized. To overcome the shortcomings of cloud computing, the concept of fog computing has been introduced. Fog computing supports high mobility and has a wide geographical distribution, it also delivers data with very low latency. However, as an extension of cloud computing, fog computing inherits the security and privacy issues of cloud computing. Therefore, identity authentication in a fog computing environment is essential. In 2022, Sahoo et al. proposed an authentication scheme for industrial wireless sensor networks with fog computing. However, we analyze the security of Sahoo et al.’s scheme and find that many places in the data distribution phase are not clearly explained and their scheme is also not resistant to user impersonation attack, tracking attack, denial of service attack and replay attack. In order to overcome the weaknesses of Sahoo et al.’s scheme, this paper proposes an improved scheme by making full use of random numbers and timestamps. After security analysis and comparison with some similar schemes, it is shown that the improved scheme can resist various known attacks and has smaller computational cost.\",\"PeriodicalId\":346823,\"journal\":{\"name\":\"Frontiers in Computing and Intelligent Systems\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Frontiers in Computing and Intelligent Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.54097/fcis.v4i3.10737\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Frontiers in Computing and Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54097/fcis.v4i3.10737","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

云计算支持随时随地从可配置计算资源的共享池访问所需资源。云计算提供了许多好处,例如数据的安全性和可靠性以及资源共享的便利性。但是随着越来越多的设备被访问,对网络带宽的需求也在增加,而正是由于云计算将所有的资源集中起来,风险也就集中起来了。为了克服云计算的缺点,引入了雾计算的概念。雾计算支持高移动性和广泛的地理分布,它也以非常低的延迟交付数据。然而,作为云计算的延伸,雾计算继承了云计算的安全和隐私问题。因此,在雾计算环境中进行身份验证至关重要。2022年,Sahoo等人提出了一种雾计算工业无线传感器网络的认证方案。但是,我们分析了Sahoo等人的方案的安全性,发现在数据分发阶段有很多地方没有明确的解释,他们的方案也不能抵抗用户冒充攻击、跟踪攻击、拒绝服务攻击和重放攻击。为了克服Sahoo等人方案的不足,本文提出了一种充分利用随机数和时间戳的改进方案。经过安全分析和与一些类似方案的比较,表明改进方案能够抵抗各种已知攻击,并且计算成本更小。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis and Improvement of Authentication Schemes for Industrial Wireless Sensor Networks with Fog Computing
Cloud computing enables access to needed resources from a shared pool of configurable computing resources anytime, anywhere. Cloud computing offers many benefits, such as security and reliability of data and convenience of resource sharing. But as more and more devices are accessed, the demand for network bandwidth increases and it is because cloud computing centralizes all the resources that risks are also centralized. To overcome the shortcomings of cloud computing, the concept of fog computing has been introduced. Fog computing supports high mobility and has a wide geographical distribution, it also delivers data with very low latency. However, as an extension of cloud computing, fog computing inherits the security and privacy issues of cloud computing. Therefore, identity authentication in a fog computing environment is essential. In 2022, Sahoo et al. proposed an authentication scheme for industrial wireless sensor networks with fog computing. However, we analyze the security of Sahoo et al.’s scheme and find that many places in the data distribution phase are not clearly explained and their scheme is also not resistant to user impersonation attack, tracking attack, denial of service attack and replay attack. In order to overcome the weaknesses of Sahoo et al.’s scheme, this paper proposes an improved scheme by making full use of random numbers and timestamps. After security analysis and comparison with some similar schemes, it is shown that the improved scheme can resist various known attacks and has smaller computational cost.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信