CN111031519B - Terminal access authentication method and device based on edge calculation - Google Patents

Terminal access authentication method and device based on edge calculation Download PDF

Info

Publication number
CN111031519B
CN111031519B CN201911168546.7A CN201911168546A CN111031519B CN 111031519 B CN111031519 B CN 111031519B CN 201911168546 A CN201911168546 A CN 201911168546A CN 111031519 B CN111031519 B CN 111031519B
Authority
CN
China
Prior art keywords
node
group
mtc terminal
group leader
selecting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911168546.7A
Other languages
Chinese (zh)
Other versions
CN111031519A (en
Inventor
李亚杰
张�杰
付颖雯
赵永利
赵瑛琪
刘明哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201911168546.7A priority Critical patent/CN111031519B/en
Publication of CN111031519A publication Critical patent/CN111031519A/en
Application granted granted Critical
Publication of CN111031519B publication Critical patent/CN111031519B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/76Group identity

Abstract

The invention provides a terminal access authentication method and a terminal access authentication device based on edge calculation, wherein the method comprises the following steps: when at least one MTC terminal initiates an access request, group division is carried out on each MTC terminal; after the group division, selecting a group leader to make the group leader perform group authentication on each MTC terminal; the method for selecting the group leader comprises the following steps: if each MTC terminal accesses the same MN node, selecting the MN node as the group leader; and if each MTC terminal is respectively accessed to different MN nodes, selecting one of the different MN nodes as the group leader. The invention selects the MN node as the group length, realizes group authentication by utilizing the MN node and can avoid network system congestion.

Description

Terminal access authentication method and device based on edge calculation
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for authenticating terminal access based on edge computing.
Background
With the rapid development of 5G communication and Internet of things technologies, mass machine type communication (mMTC) technology is widely applied and developed. Because the mMTC transmits signals in a wireless communication mode, a wireless network interface is easily attacked to influence network security, and therefore, when a terminal of the mMTC network is accessed to the network, identity authentication must be carried out firstly, and the terminal can normally access the network after passing verification.
The existing terminal authentication method is centralized authentication, when a large number of terminals initiate access requests at the same time, network congestion is easily caused, and the problems of data loss, network delay and the like are caused; one is group authentication, which divides terminals initiating access requests into groups and authenticates aggregated signatures of the groups, thereby avoiding pressure on central nodes and network congestion; however, in the group authentication method, it is necessary to select a node having the capability of calculation, storage, standby, and the like as a group leader to realize the group authentication function, and a general terminal does not have the capability of being the group leader.
Disclosure of Invention
In view of the above, the present invention provides a method and an apparatus for authenticating a terminal access based on edge calculation, so as to solve the problem of selecting a group length to implement group authentication.
Based on the above purpose, the present invention provides a terminal access authentication method based on edge computation, which is applied to an MTC network, where the MTC network includes MTC terminals, AE nodes, and MN nodes, and the method includes:
when at least one MTC terminal initiates an access request, group division is carried out on each MTC terminal;
after the group division, selecting a group leader to make the group leader perform group authentication on each MTC terminal; the method for selecting the group leader comprises the following steps: if each MTC terminal accesses the same MN node, selecting the MN node as the group leader; and if each MTC terminal is respectively accessed to different MN nodes, selecting one of the different MN nodes as the group leader.
Optionally, if each MTC terminal is respectively accessed to different MN nodes, selecting one of the different MN nodes as a group leader includes:
determining the current comprehensive performance score of each MN node; the current comprehensive performance score is obtained by calculation according to the load quantity, the calculation capacity and the storage capacity of the MN node;
and selecting the group leader according to the current comprehensive performance score of each MN node.
Optionally, the group leader performs group authentication on each MTC terminal, including:
the group leader receives aggregated signature information sent by an AE node, wherein the aggregated signature information is generated by the AE node according to the identity information of the AE node and the identity information of the MTC terminal;
the group leader authenticates the aggregated signature information;
if the authentication is successful, the access request of the MTC terminal passes; and if the authentication fails, the access request of the MTC terminal is not passed.
Optionally, the group leader performs group authentication on each MTC terminal, and further includes:
and if the authentication is successful, the group leader distributes a corresponding key to each MTC terminal so that each MTC terminal and the group leader perform encrypted communication by utilizing the distributed key.
Optionally, when at least one MTC terminal initiates an access request, the group division is performed on each MTC terminal, which includes:
when at least one MTC terminal initiates an access request, the MTC terminal is divided into groups according to the MTC terminal type, the MTC terminal geographical position and the access request time.
Optionally, the method for selecting a group leader further includes:
judging the service type;
and if the service type is a low-delay service, selecting the MN node positioned in the middle position as the group leader according to the geographical position of each MN node.
The embodiment of the invention also provides a terminal access authentication device based on edge calculation, which is applied to an mMTC network, wherein the mMTC network comprises an MTC terminal, an AE node and an MN node, and the device comprises:
the group division module is used for carrying out group division on each MTC terminal when at least one MTC terminal initiates an access request;
the group leader selecting module is used for selecting a group leader after the group division so as to enable the group leader to carry out group authentication on each MTC terminal; the method for selecting the group leader comprises the following steps: if each MTC terminal accesses the same MN node, selecting the MN node as the group leader; and if each MTC terminal is respectively accessed to different MN nodes, selecting one of the different MN nodes as the group leader.
Optionally, the group length selecting module includes:
the score calculation module is used for determining the current comprehensive performance score of each MN node; the current comprehensive performance score is obtained by calculation according to the load quantity, the calculation capacity and the storage capacity of the MN node;
and the selection module is used for selecting the group leader according to the current comprehensive performance score of each MN node.
Optionally, the group division module is configured to, when at least one MTC terminal initiates an access request, perform group division on the MTC terminal according to a type of the MTC terminal, a geographical location of the MTC terminal, and a request access time.
Optionally, the group length selecting module further includes:
the service judging module is used for judging the service type;
and the group leader selecting module is used for selecting the MN node positioned in the middle position as the group leader according to the geographic position of each MN node when the service type is judged to be the low-delay service.
As can be seen from the above, according to the method and device for authenticating terminal access based on edge computing, when at least one MTC terminal initiates an access request, group division is performed on each MTC terminal; after the group division, selecting a group leader to carry out group authentication on each MTC terminal by the group leader; the method for selecting the group leader comprises the following steps: if each MTC terminal accesses the same MN node, selecting the MN node as a group length; and if each MTC terminal is respectively accessed to different MN nodes, selecting one of the different MN nodes as a group leader. The invention selects the MN node as the group length, realizes group authentication by utilizing the MN node and can avoid network system congestion.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a mtc network topology according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of a method according to an embodiment of the present invention;
fig. 3 is a network topology diagram for selecting a group leader to perform group authentication according to an embodiment of the present invention;
FIG. 4 is a block diagram of an apparatus according to an embodiment of the present invention;
fig. 5 is a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to specific embodiments and the accompanying drawings.
It is to be noted that technical terms or scientific terms used in the embodiments of the present invention should have the ordinary meanings as understood by those having ordinary skill in the art to which the present disclosure belongs, unless otherwise defined. The use of "first," "second," and similar terms in this disclosure is not intended to indicate any order, quantity, or importance, but rather is used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", and the like are used merely to indicate relative positional relationships, and when the absolute position of the object being described is changed, the relative positional relationships may also be changed accordingly.
Fig. 1 is a mtc network topology diagram according to an embodiment of the present invention. As shown in the figure, the Edge computing-based terminal Access authentication method of the embodiment of the present invention is applied to an MTC network, where the MTC network includes but is not limited to an MTC (Machine Type Communication) terminal, an AAU (Active Antenna Unit), an AE (Access Edge) node, an MN (metro node) node, an ME (metro Edge) node, and the like, where a DU (Distributed Unit) is deployed in the MN node and the AE node, and a CU (Centralized Unit) is deployed in the ME node; as shown in the figure, the MTC terminal accesses a core network (e.g. 5G core network) through an AAU antenna, an AE node, an MN node, and an ME node.
FIG. 2 is a schematic flow chart of a method according to an embodiment of the present invention. As shown in the figure, the method for authenticating terminal access based on edge computing provided by the embodiment of the present invention includes:
s201: when at least one MTC terminal initiates an access request, group division is carried out on each MTC terminal;
in the embodiment of the invention, when a plurality of MTC terminals initiate access requests, the MTC terminals are grouped according to the conditions of the MTC terminal type, the MTC terminal geographical position, the access request time and the like, and the MTC terminals can be grouped into the same group or different groups. For example, the MTC terminals of the same type are classified into the same group, the MTC terminals located in the same geographical location (like an urban area) are classified into the same group, and the MTC terminals requesting access time within a certain range are classified into the same group.
It should be noted that the group division condition may be set such that MTC terminals meeting at least one condition are divided into the same group, and each condition may be further specifically set according to actual needs.
S202: after the group division, selecting a group leader to carry out group authentication on each MTC terminal by the group leader; the method for selecting the group leader comprises the following steps: if each MTC terminal accesses the same MN node, selecting the MN node as a group length; and if each MTC terminal is respectively accessed to different MN nodes, selecting one of the different MN nodes as a group leader.
In the terminal access authentication method of the embodiment of the present invention, when a plurality of MTC terminals initiate an access request, each MTC terminal is first group-divided, and then a group leader is selected, if each MTC terminal is group-divided and then accesses to the same MN node, the MN node is directly selected as the group leader, and if each MTC terminal is respectively accessed to different MN nodes, one MN node needs to be selected from the different MN nodes as the group leader (as shown in fig. 3); and subsequently authenticating the MTC terminal by the determined group leader. The embodiment of the invention adopts the group authentication mode to authenticate the MTC terminal, can avoid network congestion, and selects the MN node as the group leader, thereby meeting the performance condition of group authentication.
In this embodiment of the present invention, in step S202, if each MTC terminal accesses different MN nodes, one of the different MN nodes is selected as a group leader, and the method includes:
determining the current comprehensive performance score of each MN node;
and selecting the group leader according to the current comprehensive performance score of each MN node.
In the embodiment of the present invention, the performance indexes of the MN node include, but are not limited to, a load number M, a computing capacity C (for example, the number of CPUs), and a storage capacity S (a remaining storage space); setting weight value K of each performance indexM、KC、KSAnd calculating the current comprehensive performance Score of the MN node as follows:
Score=KMM+KCC+KSS (1)
and (3) respectively calculating the current comprehensive performance score of each MN node according to the formula (1), and selecting the MN node with the highest current comprehensive performance score as the group leader.
In this embodiment of the present invention, in step S202, the group leader performs group authentication on each MTC terminal, including:
the group leader receives aggregated signature information sent by an AE node, wherein the aggregated signature information is generated by the AE node according to the identity information of the AE node and the identity information of an MTC terminal;
the group leader authenticates the aggregated signature information;
if the authentication is successful, the access request of the MTC terminal passes; and if the authentication fails, the access request of the MTC terminal is not passed.
In some embodiments, the MTC terminal establishes data connection with the MN node through the AUU antenna and the AE node, the MTC terminal sends the identity information to the AUU antenna, the AUU antenna sends the identity information of the MTC terminal to the AE node, and the AE node calculates the aggregated signature information according to the identity information of the AE node and the identity information of the MTC terminal. The identity information of the MTC terminal can be an identity identifier, the identity identifier is configured by a terminal provider and stored in the MTC terminal, and the identity identifier can be used during network access registration; the identity information of the AE node includes, but is not limited to, geographical location information, identification, and the like.
The method for calculating the aggregated signature information by the AE node according to the identity information of the AE node and the identity information of the MTC terminal may be a Schnorr signature algorithm. By utilizing signature aggregation of respective keys generated by each party of Schnorr signature, the public keys and the signatures of all participants of a multi-signature transaction can be combined into a public key and a signature, the whole combining process is invisible, information before combination cannot be deduced from the combined public key and signature, and only one-time verification is needed during verification. Due to the linear nature of the Schnorr signature algorithm, the signatures of the N private keys can be aggregated into one signature under the same conditions. In the embodiment of the present invention, other signature algorithms may also be used to calculate the aggregated signature information, and the specific algorithm is not limited in the present invention.
In some embodiments, if the group leader authenticates the aggregated signature information and the authentication is successful, the group leader distributes a corresponding key to each MTC terminal, and subsequently, the MTC terminals perform encryption and decryption operations on the transmission information by using the received key and the group leader, the group leader maintains the key of each MTC terminal, and the group leader performs encrypted communication with each MTC terminal through the corresponding key. Optionally, the method for generating the key by the group leader may be a hash algorithm, the group leader may authenticate the aggregated signature information by using an existing authentication algorithm, and the method for generating the key and the authentication method are not particularly limited in the present invention.
In the embodiment of the present invention, in step S202, after the group is divided, a method of selecting a group length may be further performed, that is, in a low latency service scenario, whether the divided group is a low latency service (a service with the shortest latency) is determined, and if yes, an MN node located in a middle position is selected as the group length according to a geographical position of each MN node; if not, selecting the MN node with the strongest computing capability and storage capability as the group length, namely respectively computing the current comprehensive performance score of each MN node according to the formula (1), and selecting the MN node with the highest current comprehensive performance score as the group length. The embodiment of the invention can select the most appropriate group length according to the service type and optimize the resource utilization.
It should be noted that the method of the embodiment of the present invention may be executed by a single device, such as a computer or a server. The method of the embodiment can also be applied to a distributed scene and completed by the mutual cooperation of a plurality of devices. In the case of such a distributed scenario, one of the multiple devices may only perform one or more steps of the method according to the embodiment of the present invention, and the multiple devices interact with each other to complete the method.
Fig. 4 is a block diagram of an apparatus according to an embodiment of the present invention. As shown in the figure, the edge-computing-based terminal access authentication apparatus provided in the embodiment of the present invention includes:
the group division module is used for carrying out group division on each MTC terminal when at least one MTC terminal initiates an access request;
the group length selection module is used for selecting the group length after the group division so as to ensure that the group length carries out group authentication on each MTC terminal; if each MTC terminal accesses the same MN node, selecting the MN node as a group length; and if each MTC terminal is respectively accessed to different MN nodes, selecting one of the different MN nodes as a group leader.
In some embodiments, the group length selecting module comprises:
the score calculation module is used for determining the current comprehensive performance score of each MN node; the current comprehensive performance score is obtained by calculation according to the load quantity, the calculation capacity and the storage capacity of the MN node;
and the selection module is used for selecting the group leader according to the current comprehensive performance score of each MN node.
In some embodiments, the group division module is configured to, when at least one MTC terminal initiates an access request, perform group division on the MTC terminal according to a type of the MTC terminal, a geographical location of the MTC terminal, and a request access time.
In some embodiments, the group length selecting module further includes:
the service judging module is used for judging the service type;
and the group leader selecting module is used for selecting the MN node positioned in the middle position as the group leader according to the geographic position of each MN node when the service type is judged to be the low-delay service.
The apparatus of the foregoing embodiment is used to implement the corresponding method in the foregoing embodiment, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Fig. 5 is a schematic diagram illustrating a more specific hardware structure of an electronic device according to this embodiment, where the electronic device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein the processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 are communicatively coupled to each other within the device via bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1020 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random Access Memory), a static storage device, a dynamic storage device, or the like. The memory 1020 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 1020 and called to be executed by the processor 1010.
The input/output interface 1030 is used for connecting an input/output module to input and output information. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1040 is used for connecting a communication module (not shown in the drawings) to implement communication interaction between the present apparatus and other apparatuses. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 1050 includes a path that transfers information between various components of the device, such as processor 1010, memory 1020, input/output interface 1030, and communication interface 1040.
It should be noted that although the above-mentioned device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040 and the bus 1050, in a specific implementation, the device may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
Computer-readable media of the present embodiments, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, is limited to these examples; within the idea of the invention, also features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the invention as described above, which are not provided in detail for the sake of brevity.
In addition, well known power/ground connections to Integrated Circuit (IC) chips and other components may or may not be shown within the provided figures for simplicity of illustration and discussion, and so as not to obscure the invention. Furthermore, devices may be shown in block diagram form in order to avoid obscuring the invention, and also in view of the fact that specifics with respect to implementation of such block diagram devices are highly dependent upon the platform within which the present invention is to be implemented (i.e., specifics should be well within purview of one skilled in the art). Where specific details (e.g., circuits) are set forth in order to describe example embodiments of the invention, it should be apparent to one skilled in the art that the invention can be practiced without, or with variation of, these specific details. Accordingly, the description is to be regarded as illustrative instead of restrictive.
While the present invention has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of these embodiments will be apparent to those of ordinary skill in the art in light of the foregoing description. For example, other memory architectures (e.g., dynamic ram (dram)) may use the discussed embodiments.
The embodiments of the invention are intended to embrace all such alternatives, modifications and variances that fall within the broad scope of the appended claims. Therefore, any omissions, modifications, substitutions, improvements and the like that may be made without departing from the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (6)

1. A terminal access authentication method based on edge calculation is applied to an mMTC network, wherein the mMTC network comprises an MTC terminal, an AE node and an MN node, and the method comprises the following steps:
when at least one MTC terminal initiates an access request, the MTC terminal is divided into groups according to the MTC terminal type, the MTC terminal geographical position and the access request time;
after the group division, selecting a group leader to make the group leader perform group authentication on each MTC terminal; the method for selecting the group leader comprises the following steps: if each MTC terminal accesses the same MN node, selecting the MN node as the group leader; if each MTC terminal is respectively accessed to different MN nodes, selecting one of the different MN nodes as the group leader, wherein the group leader comprises:
determining the current comprehensive performance score of each MN node; the current comprehensive performance score is obtained by calculation according to the load quantity, the calculation capacity and the storage capacity of the MN node;
and selecting the group leader according to the current comprehensive performance score of each MN node.
2. The method of claim 1, wherein the group leader performs group authentication on each MTC terminal, comprising:
the group leader receives aggregated signature information sent by an AE node, wherein the aggregated signature information is generated by the AE node according to the identity information of the AE node and the identity information of the MTC terminal;
the group leader authenticates the aggregated signature information;
if the authentication is successful, the access request of the MTC terminal passes; and if the authentication fails, the access request of the MTC terminal is not passed.
3. The method of claim 2, wherein the group leader performs group authentication on each MTC terminal, and further comprising:
and if the authentication is successful, the group leader distributes a corresponding key to each MTC terminal so that each MTC terminal and the group leader perform encrypted communication by utilizing the distributed key.
4. The method of claim 1, wherein the selecting the group leader further comprises:
judging the service type;
and if the service type is a low-delay service, selecting the MN node positioned in the middle position as the group leader according to the geographical position of each MN node.
5. A terminal access authentication device based on edge calculation is applied to an mMTC network, wherein the mMTC network comprises an MTC terminal, an AE node and an MN node, and the device comprises:
the MTC terminal comprises a group division module, a group division module and a group division module, wherein the group division module is used for carrying out group division on the MTC terminal according to the type of the MTC terminal, the geographic position of the MTC terminal and the access request time when at least one MTC terminal initiates an access request;
the group leader selecting module is used for selecting a group leader after the group division so as to enable the group leader to carry out group authentication on each MTC terminal; the method for selecting the group leader comprises the following steps: if each MTC terminal accesses the same MN node, selecting the MN node as the group leader; if each MTC terminal is respectively accessed to different MN nodes, selecting one of the different MN nodes as the group leader;
the group length selecting module comprises:
the score calculation module is used for determining the current comprehensive performance score of each MN node; the current comprehensive performance score is obtained by calculation according to the load quantity, the calculation capacity and the storage capacity of the MN node;
and the selection module is used for selecting the group leader according to the current comprehensive performance score of each MN node.
6. The apparatus of claim 5, wherein the group leader election module further comprises:
the service judging module is used for judging the service type;
and the group leader selecting module is used for selecting the MN node positioned in the middle position as the group leader according to the geographic position of each MN node when the service type is judged to be the low-delay service.
CN201911168546.7A 2019-11-25 2019-11-25 Terminal access authentication method and device based on edge calculation Active CN111031519B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911168546.7A CN111031519B (en) 2019-11-25 2019-11-25 Terminal access authentication method and device based on edge calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911168546.7A CN111031519B (en) 2019-11-25 2019-11-25 Terminal access authentication method and device based on edge calculation

Publications (2)

Publication Number Publication Date
CN111031519A CN111031519A (en) 2020-04-17
CN111031519B true CN111031519B (en) 2021-06-29

Family

ID=70202107

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911168546.7A Active CN111031519B (en) 2019-11-25 2019-11-25 Terminal access authentication method and device based on edge calculation

Country Status (1)

Country Link
CN (1) CN111031519B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556172B (en) * 2020-06-16 2021-09-21 常熟理工学院 Implementation method of intelligent medical care monitoring system based on biological characteristics
CN112039660B (en) * 2020-08-13 2021-06-08 南京航空航天大学 Internet of things node group identity security authentication method
CN112261003A (en) * 2020-09-27 2021-01-22 紫光云引擎科技(苏州)有限公司 Safety authentication method and system for industrial internet edge computing node
CN113067626B (en) * 2021-03-15 2022-03-04 西安电子科技大学 Unmanned system bee colony credibility certification method based on edge computing

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102088668A (en) * 2011-03-10 2011-06-08 西安电子科技大学 Group-based authentication method of machine type communication (MTC) devices
CN102215474A (en) * 2010-04-12 2011-10-12 华为技术有限公司 Method and device for carrying out authentication on communication equipment
CN103596167A (en) * 2013-10-25 2014-02-19 西安电子科技大学 Machine-type communication authentication and key agreement method based on proxy
CN104703178A (en) * 2015-03-15 2015-06-10 西安电子科技大学 Machine type communication authenticating and key negotiating method based on group anonymous proxy
CN105634989A (en) * 2014-10-28 2016-06-01 中兴通讯股份有限公司 M2M group and notification resource establishing and information interaction method thereof
CN109756877A (en) * 2018-12-05 2019-05-14 西安电子科技大学 A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2893648A4 (en) * 2012-09-04 2016-04-27 Lg Electronics Inc Method and apparatus of providing a proximity-based service for public safety with one or more user equipments out of the cellular network coverage
KR101675088B1 (en) * 2015-04-30 2016-11-10 성균관대학교산학협력단 Mutual authentication method and system with network in machine type communication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215474A (en) * 2010-04-12 2011-10-12 华为技术有限公司 Method and device for carrying out authentication on communication equipment
CN102088668A (en) * 2011-03-10 2011-06-08 西安电子科技大学 Group-based authentication method of machine type communication (MTC) devices
CN103596167A (en) * 2013-10-25 2014-02-19 西安电子科技大学 Machine-type communication authentication and key agreement method based on proxy
CN105634989A (en) * 2014-10-28 2016-06-01 中兴通讯股份有限公司 M2M group and notification resource establishing and information interaction method thereof
CN104703178A (en) * 2015-03-15 2015-06-10 西安电子科技大学 Machine type communication authenticating and key negotiating method based on group anonymous proxy
CN109756877A (en) * 2018-12-05 2019-05-14 西安电子科技大学 A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks;Jinguo Li;《IEEE Internet of Things Journal》;20151027;全文 *
基于群组的MTC设备认证方案研究;康蕊;《中国优秀硕士学位论文全文数据库》;20131215;全文 *

Also Published As

Publication number Publication date
CN111031519A (en) 2020-04-17

Similar Documents

Publication Publication Date Title
CN111031519B (en) Terminal access authentication method and device based on edge calculation
CN109067728B (en) Access control method and device for application program interface, server and storage medium
US11956371B2 (en) Recursive token binding for cascaded service calls
US11463258B2 (en) Secure token refresh
CN112199382B (en) Method for creating node group and transaction based on node group in alliance chain network
US20160358135A1 (en) Digital currency management method and digital currency node apparatus
CN112291190B (en) Identity authentication method, terminal and server
CN111008840B (en) Service processing system, service processing method, device and equipment
WO2015081808A1 (en) Method and apparatus for data transmission
US11055277B2 (en) Integrity verification method, apparatus, and system and device for data in a blockchain-type ledger
US8874919B2 (en) Apparatus and method of a portable terminal authenticating another portable terminal
CN112600678B (en) Data processing method, device, equipment and storage medium
EP3812998B1 (en) Data storage and attestation method and system based on multiple blockchain networks
EP3813001A1 (en) Data reading method based on a plurality of block chain networks and system
CN111713088A (en) Method and device for processing data and equipment for processing data
Wu et al. A cloudlet-based multi-lateral resource exchange framework for mobile users
CN107888717A (en) A kind of domain name determines method, apparatus and electronic equipment
US10917231B2 (en) Data storage method, apparatus, system and device
US9742769B2 (en) Method and system for determining trusted wireless access points
WO2020025056A1 (en) Method, device, system, and mobile terminal for security authorization
WO2020168564A1 (en) Method and device for digital currency transaction and account authentication, and storage medium
US10979233B2 (en) Monitoring time certificate generation requests
CN111899104B (en) Service execution method and device
CN112613050A (en) Data access method and device based on big data system and related products
CN115242412B (en) Certificateless aggregation signature method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant