Font Size: a A A

Research On Remote Attestation Protocol For Multimedia Mobile Edge Computing Security

Posted on:2023-06-16Degree:MasterType:Thesis
Country:ChinaCandidate:D X ShaoFull Text:PDF
GTID:2568307034482864Subject:Engineering
Abstract/Summary:PDF Full Text Request
As multimedia,hardware,and software technologies improves by leaps and bounds,there is a massive surge in the number of communicating devices and interactive multimedia data every day.However,if the terminal data is directly handed over to the cloud server for processing,which will lead to problems such as data accumulation,long reception time and increased data leakage rate.For this reason,Multimedia Mobile Edge Computing(MMEC)is proposed.The multimedia resource requester device only needs to transmit the data to the nearest MMEC for processing,which has the advantages of speeding up data processing,reducing the probability of data leakage,reducing the duration of bandwidth usage by the device,etc.Though,MMEC brings benefits to the requesting party,it also raises the problem of stealing other people’s messages under false identities,and the integrity of devices and data is compromised.Remote attestation is the process of determining whether the device’s identity is true and its integrity is intact.Untrusted device access can be prevented using remote verification,which provides ideas and methods for addressing the MMEC security problem.Therefore,this paper proposes a remote attestation protocol for MMEC security.The main research work is as follows:1.A remote attestation protocol for multimedia mobile edge computing security is proposed.At present,the solutions for MMEC security all use cryptography to ensure the secure transmission of multimedia data,and cannot solve the problems of identity authentication and integrity measurement of the platforms of both parties.Therefore,in this paper,a remote attestation protocol for multimedia mobile edge computing security is proposed,which introduces platform identity authentication,integrity measurement and verification between Terminal and MMEC as well as between MMEC and cloud.In this way,the proposed protocol can detect devices with false identities and damaged devices.Furthermore,the proposed protocol can disconnect the communication connection with these insecure devices in time.As consequence,the proposed protocol ensures the data security,platform identity security,and integrity state preservation of multimedia mobile edge computing and terminal interaction.2.Formal analysis of security protocols.It is the key for two communicating parties to implement the trusted message interaction,when two communicating parties execute the secure protocol.Therefore,for the remote attestation protocol oriented to MMEC security,BAN logic is used to analyze whether there is a security threat.It can be seen from the analysis results that the protocol meets the requirements of the MMEC security objectives,which indicates that the protocol has no security defects.Meanwhile,this analysis results prove that the protocol executed by two communication parties is secure.3.A remote attestation simulation experiment for MMEC security is designed and implemented.First,the simulation environment is constructed.Then,according to the content of the remote attestation protocol designed for MMEC security,the remote attestation modules of Terminal and MMECS are tested.Meanwhile,the remote attestation modules of MMECS and MCS are tested as well.The results of the simulation experiments show that the protocol can verify the authenticity of the multimedia communication party’s identity and integrity status,so as to ensure that only secure and trusted devices can establish communication connections.At the same time,it also turns out that the untrusted message interaction process can be avoided by executing the protocol.Therefore,the research results can be applied to the identity authentication and integrity verification of both communication parties in the multimedia mobile edge computing environment.It has good practicability in MMEC applications that pay attention to safety,such as live broadcast and monitoring systems.
Keywords/Search Tags:Multimedia mobile edge computing, Remote attestation protocol, Identity authentication, Integrity measurement
PDF Full Text Request
Related items