计算机科学
撤销
GSM演进的增强数据速率
认证(法律)
计算机安全
匿名
控制器(灌溉)
重放攻击
访问控制
边缘计算
密码
前向保密
公钥密码术
加密
人工智能
农学
操作系统
生物
架空(工程)
作者
Zhong Cao,Zhuo Chen,Wenli Shang,Yongdong Zhu
标识
DOI:10.1109/jiot.2023.3237609
摘要
In the field of industrial control, edge computing puts forward higher requirements for the local processing ability of data. The traditional industrial programmable logic controller (PLC) cannot complete this task. The edge intelligent controller (EIC) is developed according to the demand for edge computing. As the core component of edge computing, the security and reliable operation of EIC has great significance and influence on the promotion and development of edge computing. For the access authentication of EIC, an efficient revocable anonymous authentication scheme for EICs by utilizing a group signature technique is proposed in this article, which can trace the identity information of the EIC and protect the privacy of the EIC, and apply an efficient revocation mechanism to revoke any illegal or abnormal EICs. Through security analysis, we prove that the authentication scheme is anonymity, integrity, traceability, forward secrecy, resistance to the replay attack, and efficient revocability. Furthermore, the performance analysis and comparisons show that the authentication scheme is efficient and feasible for EICs.
科研通智能强力驱动
Strongly Powered by AbleSci AI