版权说明 操作指南
首页 > 成果 > 详情

Fog-Centric Authenticated Key Agreement Scheme Without Trusted Parties

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Guo, Yimin*;Zhang, Zhenfeng;Guo, Yajun
通讯作者:
Guo, Yimin
作者机构:
[Guo, Yimin; Zhang, Zhenfeng] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing 100190, Peoples R China.
[Guo, Yimin; Zhang, Zhenfeng] Univ Chinese Acad Sci, Beijing 100049, Peoples R China.
[Guo, Yimin] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan 430073, Peoples R China.
[Guo, Yajun] Cent China Normal Univ, Sch Comp, Wuhan 430079, Peoples R China.
通讯机构:
[Guo, Yimin] C
[Guo, Yimin] U
[Guo, Yimin] Z
Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing 100190, Peoples R China.
Univ Chinese Acad Sci, Beijing 100049, Peoples R China.
语种:
英文
关键词:
Authentication;fog computing;Internet of Things;security
期刊:
IEEE Systems Journal
ISSN:
1932-8184
年:
2021
卷:
15
期:
4
页码:
5057-5066
基金类别:
10.13039/501100013290-National Key R&D Program of China (Grant Number: 2017YFB0802000) 10.13039/501100001809-National Natural Science Foundation of China (Grant Number: 61802376) 10.13039/501100012226-Fundamental Research Funds for the Central Universities (Grant Number: CCNU19ZN008)
机构署名:
本校为其他机构
院系归属:
计算机学院
摘要:
Fog computing can effectively provide a variety of application support for the fast-growing number of Internet of Things devices. However, the unique characteristics of fog computing also bring new security problems, especially the identity authentication in fog computing will face new challenges: Low latency (cloud servers should not be involved in authentication); fog servers are not completely trusted; robustness (no user reregistration is required when a fog server leaves fog) and lightweight (fog devices have constrained resources). In order to solve these problems faced by identity authe...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com