Font Size: a A A

Research On Security Protocol Based On Fog Computing

Posted on:2020-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y C HeFull Text:PDF
GTID:2392330596476524Subject:Engineering
Abstract/Summary:PDF Full Text Request
Fog computing is a new network architecture developed from cloud computing.Compared with cloud computing,fog computing has the characteristics of mobility,low latency,high heterogeneity and low bandwidth.Vehicle networking is an Internet of Things technology that supports the rapid movement of network nodes.Through real-time communication between vehicle and vehicle,vehicle and roadside unit,it can realize the functions of data sharing and positioning navigation.Because a single vehicle usually only has weak computing and storage capacity,and can not complete complex intelligent applications alone,some scholars have proposed a vehicle network architecture based on fog computing.Under the new architecture,how to ensure the safety of communication between vehicles and fog nodes and the safety of communication between vehicles,how to use fog nodes to reduce the computational cost of on-board computers are the main contents of this thesis.In this thesis,We propose two security protocols for a fog-based vehicle network architecture.In order to protect the security of communication between vehicle and fog node,especially the location information of vehicle,a deniable aggregate signcryption scheme is proposed in this thesis.Based on this scheme,a data transmission protocol is designed to protect the privacy of user's location.In order to protect the security of communication between vehicles and reduce the computing cost of vehicles by using fog nodes,we implement an anonymous message authentication protocol for outsourcing authentication through outsourcing computing technology and anonymous authentication protocol.The main contents of this thesis are as follows:(1)We analyse a data transmission protocol and point out that it's insecure.Then we improve the protocol and analyses its efficiency through experiments..(2)We propose a deniable aggregate signcryption scheme,and implement a data transmission protocol based on this scheme to protect user's location privacy.This protocol is used to protect the security of communication between vehicle and fog node.We analyse the correctness and repudiation of the scheme,and prove that the scheme can resist the adaptive selection ciphertext attack and the deniable adaptive selection message attack.Then we verify the efficiency of the scheme through experiments.(3)We propose an anonymous message authentication protocol for outsourcing authentication,which is used in the scenario of communication between vehicles.The protocol can outsource most of the computation of message authentication to fog nodes for processing,while protecting user's identity privacy.Through formal proof,we prove that the protocol can resist the collusion attack ?,and then we further improve the protocol to make it resist the collusion attack ?.
Keywords/Search Tags:fog computing, vehicular sensor network, aggregate signcryption, deniable encryption, computing out-sourcing
PDF Full Text Request
Related items