阅读:数字孪生边缘网络的资源高效认证方案

IF 6.2 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS
Kai Wang, Jiankuo Dong, Yijie Xu, Xinyi Ji, Letian Sha, Fu Xiao
{"title":"阅读:数字孪生边缘网络的资源高效认证方案","authors":"Kai Wang,&nbsp;Jiankuo Dong,&nbsp;Yijie Xu,&nbsp;Xinyi Ji,&nbsp;Letian Sha,&nbsp;Fu Xiao","doi":"10.1016/j.future.2024.107498","DOIUrl":null,"url":null,"abstract":"<div><p>In recent vigorous developments, digital twin edge networks (DITEN) have emerged as a network paradigm to improve network communication efficiency. Given that Web 3.0 technologies promise secure decentralized data storage and effective information exchange, it is feasible to construct a wireless edge intelligence-enabled Web 3.0 physical infrastructure through DITEN. However, DITEN encounters various security threats related to communication and authentication, and establishing a secure and cost-effective authentication scheme for confidential access to physical entities poses a significant challenge. To tackle this issue, in this article, we introduce READ, a provably secure multi-factor user authentication scheme tailored for DITEN in industrial applications. Using designed ASCON cryptography primitive cipher suite, physical unclonable functions, extended Chebyshev chaotic maps, one-way secure collision-resistant hash functions, and lightweight bitwise exclusive-or operations, READ enables mutual authentication and session key negotiation among mobile users, smart gateways, and smart industrial devices. Rigorous security assessments, conducted through the real-or-random (ROR) model, the automated validation of internet security-sensitive protocols and applications (AVISPA) simulation tool, and heuristic informal security analysis, confirm that READ meets all 13 security evaluation criteria. Furthermore, compared to other seven advanced multi-factor user authentication schemes, READ excels in security and efficiency, making it ideal for practical multi-factor user authentication scenarios.</p></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"163 ","pages":"Article 107498"},"PeriodicalIF":6.2000,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"READ: Resource efficient authentication scheme for digital twin edge networks\",\"authors\":\"Kai Wang,&nbsp;Jiankuo Dong,&nbsp;Yijie Xu,&nbsp;Xinyi Ji,&nbsp;Letian Sha,&nbsp;Fu Xiao\",\"doi\":\"10.1016/j.future.2024.107498\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>In recent vigorous developments, digital twin edge networks (DITEN) have emerged as a network paradigm to improve network communication efficiency. Given that Web 3.0 technologies promise secure decentralized data storage and effective information exchange, it is feasible to construct a wireless edge intelligence-enabled Web 3.0 physical infrastructure through DITEN. However, DITEN encounters various security threats related to communication and authentication, and establishing a secure and cost-effective authentication scheme for confidential access to physical entities poses a significant challenge. To tackle this issue, in this article, we introduce READ, a provably secure multi-factor user authentication scheme tailored for DITEN in industrial applications. Using designed ASCON cryptography primitive cipher suite, physical unclonable functions, extended Chebyshev chaotic maps, one-way secure collision-resistant hash functions, and lightweight bitwise exclusive-or operations, READ enables mutual authentication and session key negotiation among mobile users, smart gateways, and smart industrial devices. Rigorous security assessments, conducted through the real-or-random (ROR) model, the automated validation of internet security-sensitive protocols and applications (AVISPA) simulation tool, and heuristic informal security analysis, confirm that READ meets all 13 security evaluation criteria. Furthermore, compared to other seven advanced multi-factor user authentication schemes, READ excels in security and efficiency, making it ideal for practical multi-factor user authentication scenarios.</p></div>\",\"PeriodicalId\":55132,\"journal\":{\"name\":\"Future Generation Computer Systems-The International Journal of Escience\",\"volume\":\"163 \",\"pages\":\"Article 107498\"},\"PeriodicalIF\":6.2000,\"publicationDate\":\"2024-08-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Future Generation Computer Systems-The International Journal of Escience\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0167739X2400462X\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Future Generation Computer Systems-The International Journal of Escience","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167739X2400462X","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

摘要

近年来,数字孪生边缘网络(DITEN)蓬勃发展,成为提高网络通信效率的一种网络范式。鉴于 Web 3.0 技术有望实现安全的分散式数据存储和有效的信息交换,通过 DITEN 构建支持无线边缘智能的 Web 3.0 物理基础设施是可行的。然而,DITEN 会遇到与通信和身份验证有关的各种安全威胁,而建立一个安全且经济高效的身份验证方案以实现对物理实体的保密访问则是一项重大挑战。为解决这一问题,我们在本文中介绍了 READ,一种专为工业应用中的 DITEN 量身定制的可证明安全的多因素用户验证方案。READ 利用设计的 ASCON 密码学原始密码套件、物理不可克隆函数、扩展的切比雪夫混沌图、单向安全抗碰撞哈希函数和轻量级比特排他运算,实现了移动用户、智能网关和智能工业设备之间的相互验证和会话密钥协商。通过真实或随机(ROR)模型、互联网安全敏感协议和应用自动验证(AVISPA)模拟工具以及启发式非正式安全分析进行的严格安全评估证实,READ 符合所有 13 项安全评估标准。此外,与其他七种先进的多因素用户身份验证方案相比,READ 在安全性和效率方面都非常出色,是实际多因素用户身份验证方案的理想选择。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
READ: Resource efficient authentication scheme for digital twin edge networks

In recent vigorous developments, digital twin edge networks (DITEN) have emerged as a network paradigm to improve network communication efficiency. Given that Web 3.0 technologies promise secure decentralized data storage and effective information exchange, it is feasible to construct a wireless edge intelligence-enabled Web 3.0 physical infrastructure through DITEN. However, DITEN encounters various security threats related to communication and authentication, and establishing a secure and cost-effective authentication scheme for confidential access to physical entities poses a significant challenge. To tackle this issue, in this article, we introduce READ, a provably secure multi-factor user authentication scheme tailored for DITEN in industrial applications. Using designed ASCON cryptography primitive cipher suite, physical unclonable functions, extended Chebyshev chaotic maps, one-way secure collision-resistant hash functions, and lightweight bitwise exclusive-or operations, READ enables mutual authentication and session key negotiation among mobile users, smart gateways, and smart industrial devices. Rigorous security assessments, conducted through the real-or-random (ROR) model, the automated validation of internet security-sensitive protocols and applications (AVISPA) simulation tool, and heuristic informal security analysis, confirm that READ meets all 13 security evaluation criteria. Furthermore, compared to other seven advanced multi-factor user authentication schemes, READ excels in security and efficiency, making it ideal for practical multi-factor user authentication scenarios.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
19.90
自引率
2.70%
发文量
376
审稿时长
10.6 months
期刊介绍: Computing infrastructures and systems are constantly evolving, resulting in increasingly complex and collaborative scientific applications. To cope with these advancements, there is a growing need for collaborative tools that can effectively map, control, and execute these applications. Furthermore, with the explosion of Big Data, there is a requirement for innovative methods and infrastructures to collect, analyze, and derive meaningful insights from the vast amount of data generated. This necessitates the integration of computational and storage capabilities, databases, sensors, and human collaboration. Future Generation Computer Systems aims to pioneer advancements in distributed systems, collaborative environments, high-performance computing, and Big Data analytics. It strives to stay at the forefront of developments in grids, clouds, and the Internet of Things (IoT) to effectively address the challenges posed by these wide-area, fully distributed sensing and computing systems.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信