{"title":"移动边缘计算与区块链技术融合下的用户认证方案","authors":"Feng Xue, Fangju Li","doi":"10.4018/ijaci.327027","DOIUrl":null,"url":null,"abstract":"The safe and efficient authentication of users is the basis for the realization of the Internet of Things. A reliable and fast user authentication schema that combines mobile edge computing and blockchain technology is proposed. This schema adopts the polling hosting method to optimize the practical Byzantine Fault Tolerance (PBFT) algorithm, it reduces the impact of tokens in the algorithm, and ensures trusted authentication. The two-way authentication protocol between the cluster head and the base station, and the one-way authentication protocol between the base station and the sensor node are designed to effectively simplify the authentication process of sensor nodes, which further guarantees the security and speed of user authentication and effectively meets the security, reliability, and convenience requirements of the Internet of Things. Simulation experiments show that the schema can achieve efficient information verification, and the identity authentication time and protocol authentication times are only 23.58 ms and 25.06 ms, respectively, which has obvious performance advantages over the Paillier algorithm, the hybrid Paillier-blowfish algorithm, and the ElGamal algorithm.","PeriodicalId":51884,"journal":{"name":"International Journal of Ambient Computing and Intelligence","volume":"30 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A User Authentication Schema Under the Integration of Mobile Edge Computing and Blockchain Technology\",\"authors\":\"Feng Xue, Fangju Li\",\"doi\":\"10.4018/ijaci.327027\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The safe and efficient authentication of users is the basis for the realization of the Internet of Things. A reliable and fast user authentication schema that combines mobile edge computing and blockchain technology is proposed. This schema adopts the polling hosting method to optimize the practical Byzantine Fault Tolerance (PBFT) algorithm, it reduces the impact of tokens in the algorithm, and ensures trusted authentication. The two-way authentication protocol between the cluster head and the base station, and the one-way authentication protocol between the base station and the sensor node are designed to effectively simplify the authentication process of sensor nodes, which further guarantees the security and speed of user authentication and effectively meets the security, reliability, and convenience requirements of the Internet of Things. Simulation experiments show that the schema can achieve efficient information verification, and the identity authentication time and protocol authentication times are only 23.58 ms and 25.06 ms, respectively, which has obvious performance advantages over the Paillier algorithm, the hybrid Paillier-blowfish algorithm, and the ElGamal algorithm.\",\"PeriodicalId\":51884,\"journal\":{\"name\":\"International Journal of Ambient Computing and Intelligence\",\"volume\":\"30 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Ambient Computing and Intelligence\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijaci.327027\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Ambient Computing and Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijaci.327027","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
A User Authentication Schema Under the Integration of Mobile Edge Computing and Blockchain Technology
The safe and efficient authentication of users is the basis for the realization of the Internet of Things. A reliable and fast user authentication schema that combines mobile edge computing and blockchain technology is proposed. This schema adopts the polling hosting method to optimize the practical Byzantine Fault Tolerance (PBFT) algorithm, it reduces the impact of tokens in the algorithm, and ensures trusted authentication. The two-way authentication protocol between the cluster head and the base station, and the one-way authentication protocol between the base station and the sensor node are designed to effectively simplify the authentication process of sensor nodes, which further guarantees the security and speed of user authentication and effectively meets the security, reliability, and convenience requirements of the Internet of Things. Simulation experiments show that the schema can achieve efficient information verification, and the identity authentication time and protocol authentication times are only 23.58 ms and 25.06 ms, respectively, which has obvious performance advantages over the Paillier algorithm, the hybrid Paillier-blowfish algorithm, and the ElGamal algorithm.