CN114900288B - 一种基于边缘服务的工业环境认证方法 - Google Patents
一种基于边缘服务的工业环境认证方法 Download PDFInfo
- Publication number
- CN114900288B CN114900288B CN202210560845.0A CN202210560845A CN114900288B CN 114900288 B CN114900288 B CN 114900288B CN 202210560845 A CN202210560845 A CN 202210560845A CN 114900288 B CN114900288 B CN 114900288B
- Authority
- CN
- China
- Prior art keywords
- industrial
- authentication
- registration
- edge server
- service center
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Physics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210560845.0A CN114900288B (zh) | 2022-05-23 | 2022-05-23 | 一种基于边缘服务的工业环境认证方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210560845.0A CN114900288B (zh) | 2022-05-23 | 2022-05-23 | 一种基于边缘服务的工业环境认证方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114900288A CN114900288A (zh) | 2022-08-12 |
CN114900288B true CN114900288B (zh) | 2023-08-25 |
Family
ID=82724127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210560845.0A Active CN114900288B (zh) | 2022-05-23 | 2022-05-23 | 一种基于边缘服务的工业环境认证方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114900288B (zh) |
Citations (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009089764A1 (fr) * | 2008-01-10 | 2009-07-23 | Shaohua Ren | Système et procédé d'authentification de réseau sécurisé |
GB201304916D0 (en) * | 2013-03-18 | 2013-05-01 | Ibm | A method for secure user authentication in a dynamic network |
CN103347018A (zh) * | 2013-07-02 | 2013-10-09 | 山东科技大学 | 一种基于智能卡的多服务环境下远程身份认证方法 |
CN107919956A (zh) * | 2018-01-04 | 2018-04-17 | 重庆邮电大学 | 一种面向物联网云环境下端到端安全保障方法 |
US10104039B1 (en) * | 2017-09-28 | 2018-10-16 | Cloudflare, Inc. | Establishing and using a tunnel from an origin server in a distributed edge compute and routing service |
CN108965338A (zh) * | 2018-09-21 | 2018-12-07 | 杭州师范大学 | 多服务器环境下的三因素身份认证及密钥协商的方法 |
CN110020524A (zh) * | 2019-03-31 | 2019-07-16 | 西安邮电大学 | 一种基于智能卡的双向认证方法 |
WO2019161285A1 (en) * | 2018-02-15 | 2019-08-22 | Webasto Ncharging Systems, Inc. | Devices and systems for industrial internet of things security |
CN111294352A (zh) * | 2020-02-03 | 2020-06-16 | 国家工业信息安全发展研究中心 | 云端与边缘节点之间的数据安全认证方法 |
CN111355745A (zh) * | 2020-03-12 | 2020-06-30 | 西安电子科技大学 | 基于边缘计算网络架构的跨域身份认证方法 |
WO2020194295A1 (en) * | 2019-03-25 | 2020-10-01 | Identiq Protocol Ltd. | System and method for providing anonymous validation of a query among a plurality of nodes in a network |
KR20200115359A (ko) * | 2019-03-29 | 2020-10-07 | 삼성전자주식회사 | 엣지 컴퓨팅 서비스를 위한 방법 및 그의 전자 장치 |
CN111935714A (zh) * | 2020-07-13 | 2020-11-13 | 兰州理工大学 | 一种移动边缘计算网络中身份认证方法 |
KR20200130141A (ko) * | 2019-05-09 | 2020-11-18 | 삼성전자주식회사 | 무선 통신 시스템에서 모바일 엣지 컴퓨팅 서비스를 제공하기 위한 장치 및 방법 |
CN112000941A (zh) * | 2020-10-29 | 2020-11-27 | 北京邮电大学 | 一种用于移动云计算的身份认证方法和系统 |
CN112003691A (zh) * | 2020-07-02 | 2020-11-27 | 北京交通大学 | 一种应用于城市轨道交通的分布式密钥管理系统 |
CN113630244A (zh) * | 2021-07-14 | 2021-11-09 | 国网河北省电力有限公司信息通信分公司 | 面对通信传感网的端到端安全保障方法及边缘服务器 |
CN113849815A (zh) * | 2021-08-26 | 2021-12-28 | 兰州大学 | 一种基于零信任和机密计算的统一身份认证平台 |
CN113873508A (zh) * | 2021-09-23 | 2021-12-31 | 国网辽宁省电力有限公司电力科学研究院 | 基于用户双公私钥的边缘计算双向认证方法及系统 |
CN114024766A (zh) * | 2021-11-23 | 2022-02-08 | 重庆邮电大学 | 一种面向边缘计算节点的零信任身份认证方法 |
CN114037457A (zh) * | 2021-11-05 | 2022-02-11 | 西北工业大学 | 一种基于身份标识的工业复杂产品终端跨域接入认证方法 |
CN114125833A (zh) * | 2021-10-29 | 2022-03-01 | 南京信息工程大学 | 一种用于智能设备通信的多因素认证密钥协商方法 |
CN114238886A (zh) * | 2021-11-18 | 2022-03-25 | 广东电网有限责任公司广州供电局 | 基于ibe的电网pmu身份认证方法、装置、计算机设备和介质 |
CN114268490A (zh) * | 2021-12-21 | 2022-04-01 | 杭州萤石软件有限公司 | 一种设备认证方法、物联网系统、服务器及存储介质 |
WO2022067654A1 (en) * | 2020-09-30 | 2022-04-07 | Lenovo (Beijing) Limited | Key-based authentication for a mobile edge computing network |
CN114362993A (zh) * | 2021-11-24 | 2022-04-15 | 北京理工大学 | 一种区块链辅助的车联网安全认证方法 |
CN114422152A (zh) * | 2022-03-30 | 2022-04-29 | 科大天工智能装备技术(天津)有限公司 | 一种基于puf和区块链的工业环境认证方法 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW202021384A (zh) * | 2018-11-23 | 2020-06-01 | 財團法人工業技術研究院 | 網路服務系統及網路服務方法 |
US11647014B2 (en) * | 2020-02-18 | 2023-05-09 | International Business Machines Corporation | Identity authentication based on data from Internet of Things devices |
-
2022
- 2022-05-23 CN CN202210560845.0A patent/CN114900288B/zh active Active
Patent Citations (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009089764A1 (fr) * | 2008-01-10 | 2009-07-23 | Shaohua Ren | Système et procédé d'authentification de réseau sécurisé |
GB201304916D0 (en) * | 2013-03-18 | 2013-05-01 | Ibm | A method for secure user authentication in a dynamic network |
CN103347018A (zh) * | 2013-07-02 | 2013-10-09 | 山东科技大学 | 一种基于智能卡的多服务环境下远程身份认证方法 |
US10104039B1 (en) * | 2017-09-28 | 2018-10-16 | Cloudflare, Inc. | Establishing and using a tunnel from an origin server in a distributed edge compute and routing service |
CN107919956A (zh) * | 2018-01-04 | 2018-04-17 | 重庆邮电大学 | 一种面向物联网云环境下端到端安全保障方法 |
WO2019161285A1 (en) * | 2018-02-15 | 2019-08-22 | Webasto Ncharging Systems, Inc. | Devices and systems for industrial internet of things security |
CN108965338A (zh) * | 2018-09-21 | 2018-12-07 | 杭州师范大学 | 多服务器环境下的三因素身份认证及密钥协商的方法 |
WO2020194295A1 (en) * | 2019-03-25 | 2020-10-01 | Identiq Protocol Ltd. | System and method for providing anonymous validation of a query among a plurality of nodes in a network |
KR20200115359A (ko) * | 2019-03-29 | 2020-10-07 | 삼성전자주식회사 | 엣지 컴퓨팅 서비스를 위한 방법 및 그의 전자 장치 |
CN110020524A (zh) * | 2019-03-31 | 2019-07-16 | 西安邮电大学 | 一种基于智能卡的双向认证方法 |
KR20200130141A (ko) * | 2019-05-09 | 2020-11-18 | 삼성전자주식회사 | 무선 통신 시스템에서 모바일 엣지 컴퓨팅 서비스를 제공하기 위한 장치 및 방법 |
CN111294352A (zh) * | 2020-02-03 | 2020-06-16 | 国家工业信息安全发展研究中心 | 云端与边缘节点之间的数据安全认证方法 |
CN111355745A (zh) * | 2020-03-12 | 2020-06-30 | 西安电子科技大学 | 基于边缘计算网络架构的跨域身份认证方法 |
CN112003691A (zh) * | 2020-07-02 | 2020-11-27 | 北京交通大学 | 一种应用于城市轨道交通的分布式密钥管理系统 |
CN111935714A (zh) * | 2020-07-13 | 2020-11-13 | 兰州理工大学 | 一种移动边缘计算网络中身份认证方法 |
WO2022067654A1 (en) * | 2020-09-30 | 2022-04-07 | Lenovo (Beijing) Limited | Key-based authentication for a mobile edge computing network |
CN112000941A (zh) * | 2020-10-29 | 2020-11-27 | 北京邮电大学 | 一种用于移动云计算的身份认证方法和系统 |
CN113630244A (zh) * | 2021-07-14 | 2021-11-09 | 国网河北省电力有限公司信息通信分公司 | 面对通信传感网的端到端安全保障方法及边缘服务器 |
CN113849815A (zh) * | 2021-08-26 | 2021-12-28 | 兰州大学 | 一种基于零信任和机密计算的统一身份认证平台 |
CN113873508A (zh) * | 2021-09-23 | 2021-12-31 | 国网辽宁省电力有限公司电力科学研究院 | 基于用户双公私钥的边缘计算双向认证方法及系统 |
CN114125833A (zh) * | 2021-10-29 | 2022-03-01 | 南京信息工程大学 | 一种用于智能设备通信的多因素认证密钥协商方法 |
CN114037457A (zh) * | 2021-11-05 | 2022-02-11 | 西北工业大学 | 一种基于身份标识的工业复杂产品终端跨域接入认证方法 |
CN114238886A (zh) * | 2021-11-18 | 2022-03-25 | 广东电网有限责任公司广州供电局 | 基于ibe的电网pmu身份认证方法、装置、计算机设备和介质 |
CN114024766A (zh) * | 2021-11-23 | 2022-02-08 | 重庆邮电大学 | 一种面向边缘计算节点的零信任身份认证方法 |
CN114362993A (zh) * | 2021-11-24 | 2022-04-15 | 北京理工大学 | 一种区块链辅助的车联网安全认证方法 |
CN114268490A (zh) * | 2021-12-21 | 2022-04-01 | 杭州萤石软件有限公司 | 一种设备认证方法、物联网系统、服务器及存储介质 |
CN114422152A (zh) * | 2022-03-30 | 2022-04-29 | 科大天工智能装备技术(天津)有限公司 | 一种基于puf和区块链的工业环境认证方法 |
Non-Patent Citations (1)
Title |
---|
边缘计算环境下可信接入安全技术研究与实现;谢辉;《中国优秀硕士学位论文全文数据库》;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114900288A (zh) | 2022-08-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | A privacy-aware PUFs-based multiserver authentication protocol in cloud-edge IoT systems using blockchain | |
US11063941B2 (en) | Authentication system, authentication method, and program | |
CN114730420A (zh) | 用于生成签名的系统和方法 | |
Kaur et al. | A Secure Two‐Factor Authentication Framework in Cloud Computing | |
JP5224481B2 (ja) | パスワード認証方法 | |
Dua et al. | Replay attack prevention in Kerberos authentication protocol using triple password | |
CN114125833A (zh) | 一种用于智能设备通信的多因素认证密钥协商方法 | |
Gupta et al. | Hash based multi-server key exchange protocol using smart card | |
Kang et al. | Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain | |
Hossain et al. | ICAS: Two-factor identity-concealed authentication scheme for remote-servers | |
Khan et al. | A brief review on cloud computing authentication frameworks | |
Rana et al. | Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system | |
Kumari et al. | Blockchain based data security for financial transaction system | |
CN116388995A (zh) | 一种基于puf的轻量级智能电网认证方法 | |
Kara et al. | A Password-Based Mutual Authentication Protocol via Zero-Knowledge Proof Solution | |
Salvakkam et al. | Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment | |
Liou et al. | T-auth: A novel authentication mechanism for the IoT based on smart contracts and PUFs | |
CN110784305B (zh) | 基于不经意伪随机函数和签密的单点登录认证方法 | |
Srinivas et al. | An authentication framework for roaming service in global mobility networks | |
CN114900288B (zh) | 一种基于边缘服务的工业环境认证方法 | |
Akram et al. | Fog-based low latency and lightweight authentication protocol for vehicular communication | |
Yu et al. | Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones | |
Wu et al. | A privacy protection scheme for facial recognition and resolution based on edge computing | |
Kaur et al. | Fortification of transport layer security protocol by using password and fingerprint as identity authentication parameters | |
Elngar | An efficient user authentication model for IOT-based healthcare environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100083 No. 30, Haidian District, Beijing, Xueyuan Road Applicant after: University OF SCIENCE AND TECHNOLOGY BEIJING Applicant after: USTC TIANGONG INTELLIGENT EQUIPMENT TECHNOLOGY (TIANJIN) CO.,LTD. Address before: 300308 Building 1, block g, No. 6, Huafeng Road, Huaming high tech Industrial Zone, Dongli District, Tianjin Applicant before: USTC TIANGONG INTELLIGENT EQUIPMENT TECHNOLOGY (TIANJIN) CO.,LTD. Applicant before: University OF SCIENCE AND TECHNOLOGY BEIJING |
|
CB02 | Change of applicant information | ||
CB03 | Change of inventor or designer information |
Inventor after: Zhang Bo Inventor after: Wan Yadong Inventor after: Zhang Chao Inventor before: Wan Yadong Inventor before: Zhang Bo Inventor before: Zhang Chao |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |