检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Yu Luo Kai Fan Xingmiao Wang Hui Li Yintang Yang
机构地区:[1]State Key Laboratory of Integrated Service Networks,School of Cyber Engineering,Xidian University,Xi’an 710071,China [2]Key Lab.of the Minist.of Educ.for Wide Band-Gap Semiconductor Materials and Devices,Xidian University,Xi’an 710071,China
出 处:《China Communications》2022年第7期197-213,共17页中国通信(英文版)
基 金:supported in part by the “Pioneer” and “Leading Goose” R&D Program of Zhejiang (Grant No. 2022C03174);the National Natural Science Foundation of China (No. 92067103);the Key Research and Development Program of Shaanxi (No.2021ZDLGY06- 02);the Natural Science Foundation of Shaanxi Province (No.2019ZDLGY12-02);the Shaanxi Innovation Team Project (No.2018TD007);the Xi’an Science and technology Innovation Plan (No.201809168CX9JC10);National 111 Program of China B16037
摘 要:Cloud computing provides powerful processing capabilities for large-scale intelligent Internet of things(IoT)terminals.However,the massive realtime data processing requirements challenge the existing cloud computing model.The edge server is closer to the data source.The end-edge-cloud collaboration offloads the cloud computing tasks to the edge environment,which solves the shortcomings of the cloud in resource storage,computing performance,and energy consumption.IoT terminals and sensors have caused security and privacy challenges due to resource constraints and exponential growth.As the key technology of IoT,Radio-Frequency Identification(RFID)authentication protocol tremendously strengthens privacy protection and improves IoT security.However,it inevitably increases system overhead while improving security,which is a major blow to low-cost RFID tags.The existing RFID authentication protocols are difficult to balance overhead and security.This paper designs an ultra-lightweight encryption function and proposes an RFID authentication scheme based on this function for the end-edge-cloud collaborative environment.The BAN logic proof and protocol verification tools AVISPA formally verify the protocol’s security.We use VIVADO to implement the encryption function and tag’s overhead on the FPGA platform.Performance evaluation indicates that the proposed protocol balances low computing costs and high-security requirements.
关 键 词:end-edge-cloud orchestration mutual authentication ULTRA-LIGHTWEIGHT RFID random rearrangement block matrix IoT
分 类 号:TN915.04[电子电信—通信与信息系统] TP391.44[电子电信—信息与通信工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.33