研究目的
To design an aggregated-proof based hierarchical authentication scheme (APHA) for the layered networks in the U2IoT architecture, focusing on security protection through backward and forward anonymous data transmission, mutual authentication, and hierarchical access control.
研究成果
The APHA scheme provides bottom-up security protection for the U2IoT architecture through two sub-protocols for unit IoT and ubiquitous IoT. It ensures data confidentiality and integrity, establishes trust relationships via lightweight mechanisms, and achieves session freshness with dynamically hashed values, making it suitable for the U2IoT architecture.
研究不足
The paper does not explicitly mention limitations, but potential areas for optimization could include scalability in larger IoT networks and the computational overhead of cryptographic operations.
1:Experimental Design and Method Selection:
The APHA scheme is designed based on aggregated-proofs, directed path descriptors, homomorphism functions, and Chebyshev chaotic maps for mutual authentication and hierarchical access control.
2:Sample Selection and Data Sources:
The study considers an industry-oriented scenario with heterogeneous sensors (S) and targets (T), unit data centers (DC), industrial data centers (iDC), and a national data center (nDC).
3:List of Experimental Equipment and Materials:
Not explicitly mentioned.
4:Experimental Procedures and Operational Workflow:
The protocol involves challenge-response mechanisms, verification processes, and the establishment of backward and forward aggregated-proofs for anonymous data transmission.
5:Data Analysis Methods:
The BAN logic is used for formal analysis to prove the scheme's correctness and security.
独家科研数据包,助您复现前沿成果,加速创新突破
获取完整内容