Font Size: a A A

Research On Identity Authentication And Security Offloading Mechanism In Mobile Edge Computing Environment

Posted on:2021-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z M BaiFull Text:PDF
GTID:2428330623483959Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the development of 5G network technology,the demand for mobile smart devices at the edge of the network and their diverse tasks has grown dramatically.Traditional cloud computing is difficult to process the massive data generated by smart terminal devices in real time.Mobile Edge Computing provides network,computing,storage,and application services on the side close to the source of the data,making up for the limitations of cloud computing in terms of latency,bandwidth,and mobility.However,the new features of mobile edge computing make mobile terminal users' data security and privacy protection face new challenges.On the one hand,due to the limited storage and computing capabilities of mobile terminals,traditional public key infrastructure based authentication protocols cannot be deployed at the edge because of large resource consumption and long response times.New authentication protocols need to be designed to implement mobility End-user secure access;on the other hand,when mobile end-users offload tasks to the MEC server,there will be an attacker at the edge of the network overhearing computing tasks off-loaded by the end-users via wireless channels,which will lead to the leakage of user privacy.The uninstall decision is necessary.In view of the above problems,this thesis will combine application-layer encryption technology and physical-layer security technology to conduct research on the issues of identity authentication and data security in mobile edge computing.The specific research content is as follows:1.Regarding the problem of mutual authentication of edge nodes and resource-constrained mobile terminals,a lightweight identity authentication protocol suitable for edge computing environments is proposed.This protocol combines encryption technology with physical layer security protection technology,uses a symmetric cryptosystem to reduce the computational complexity of mobile terminals during authentication,and completes the mobile terminal and edge server with a small amount of calculation and low information storage.Mutual authentication and key negotiation,and the mobile terminal only needs to register once to roam randomly in the edge computing environment.Security analysis shows that the protocol meets security features such as forward security,anti-replay attack,and man-in-the-middle attack,and has good performance advantages in communication and computing costs,effectively reducing the identity of mobile terminal devices Consumption of computing resources during authentication.2.Regarding the problem that end users in the MEC environment are easy to be intercepted by attackers when offloading tasks through wireless channels,an offloading scheme based on physical layer security technology is proposed.This solution uses thecharacteristics of the wireless channel,comprehensively considers the quality of the end user's main channel and the eavesdropping channel,and aims at minimizing the energy consumption of the user during safe unloading.The optimization problem is established,and then the Lagrange multiplier method is used to obtain the performance Constrained safe unloading strategy and optimal transmission power.Through the analysis and comparison of the simulation results,the security advantages of this scheme compared with the traditional task offloading scheme are explained,and the confidentiality of edge user data during the offloading process is guaranteed.
Keywords/Search Tags:Edge Computing, Network Offloading Decision, Resource Allocation, Trust Management, Secure Network Architecture
PDF Full Text Request
Related items