Summary
Device identity authentication is the first line of defense for edge computing security mechanisms. Many authentication schemes are often accompanied by high communication and computational overhead. In addition, due to the continuous enhancement of network virtualization and dynamics, the security requirements for logical boundaries of many enterprise information systems “cloudification,” and the huge data security challenges faced by enterprise core assets, all make the original "one‐time authentication, all the way" trust model no longer reliable. Therefore, the paper proposes a local identity authentication and roaming identity authentication protocol based on a zero‐trust architecture. First, we propose a revocable group signature scheme, the expiration time is bound to the key of each edge terminal device. According to this solution, since the identity authentication token generated by the expired key is invalid, it does not need to be included in the revocation list, which improves the efficiency of revocation checking. Compared with the current identity authentication protocol, this article not only builds a model based on the zero trust architecture, effectively solves the shortcomings of the network security protection architecture, but also considers the unforgeability of the expiration time, and realizes effective revocation and more efficient identity authentication.
Smart grid is a highly integrated power system, which combines modern advanced information communication, sensor measurement and automatic control technology, including a large number of smart devices, with the advantages of reliability, reliability, safety and self-healing, providing a great service. However, when collecting, processing, and transmitting large amounts of data, devices such as smart dashboards in the network face the problem of discovering user-specific issues. In order to solve this problem, a scheme based on improved group signature and homomorphic encryption is proposed here. The improved group signature is used to determine the public and private keys of the smart meter and the signature of the electricity consumption data, and the homomorphic encryption is used for the electricity consumption. Data is encrypted and aggregated. In the end, the electricity consumption data is always in cipher text during the data transmission process. The forward-secure group signature scheme can avoid the harm caused by the interference of the private key, thus realizing the protection effect.
Remotely data storage in cloud computing faces great challenge. Data possession checking ensures the data integrity and availability. In this paper, a cloud data possession checking model has been presented. Based on Paillier cryptosystem and elliptic curve cryptograph (ECC),we designed a data possession checking scheme, where the user asks the server to compute a checking value of randomly appointed data blocks, and then makes a decision by proof verification. The homomorphic verification tag (HVT) generated based on Paillier cryptosystem to achieve unlimited queried times. Extensive evaluation and analysis shows the proposed scheme is efficient and secure with the features: a high confidence level, un-forged HVTs, a small constant overhead, etc.
This paper presents a signal direction-of-arrival (DOA) estimation approach that possesses excellent performance in spatial and temporal correlated signals environments. Firstly, an algebraic solution of the null subspace is derived based on the Vandermonde structured steering vectors of uniform linear array when all the sources possess identical nonzero mean value, and then, the DOA estimation is obtained with a polynomial rooting method. The novel algorithm performs much better than the conventional algorithms in the situation that the sources are closely spaced or correlated, and simulations have verified the validity of the algorithm.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.