LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context

被引:39
|
作者
Wang, Qixu [1 ]
Chen, Dajiang [1 ,2 ]
Zhang, Ning [2 ]
Qin, Zhen [1 ]
Qin, Zhiguang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 611731, Peoples R China
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
来源
IEEE ACCESS | 2017年 / 5卷
基金
中国博士后科学基金; 加拿大自然科学与工程研究理事会; 美国国家科学基金会;
关键词
5G; Internet of things; fog node; caching; access control; authentication; WIRELESS; GENERATION; INTERNET;
D O I
10.1109/ACCESS.2017.2678510
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to massive mobile terminal devices and ubiquitous communication, the Internet of things (IoT) has become an inevitable trend. Given that the fifth generation (5G) wireless networks expects to drive the proliferation of the IoT and may extend the access functions and systems of the IoT, it makes the IoT a vitally important part in future 5G wireless networks. Simultaneously, the limit of the bandwidth and power of the 5G would adversely affect the widespread promotion of the IoT. However, wireless caching techniques could remarkably resolve this issue. Recently, using fog nodes to improve the capacity of caching has become a trend in caching system. However, node-based caching systems may suffer from malicious access and destruction. To protect caching from sabotage and to further ensure its reliability, we propose a new lightweight label-based access control scheme (LACS) that authenticates the authorized fog nodes to ensure protection. Specifically, the LACS can authenticate the fog nodes by verifying the integrity of the shared files that are embedded label values, and only the authenticated fog nodes can access the caching service. The analysis shows that the proposed scheme is verifiable (the malicious fog node cannot cheat the caching server to pretend to be a legal node) and efficient in both computation and verification. Moreover, simulation experiments show that the LACS can reach the millisecond-level verification and it has a good accuracy.
引用
收藏
页码:4018 / 4027
页数:10
相关论文
共 50 条
  • [1] The IoT-based Transition Strategy towards 5G
    Suryanegara, Muhammad
    Arifin, Ajib Setyo
    Asvial, Muhamad
    [J]. INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2017), 2017, : 186 - 190
  • [2] Context Caching for IoT-Based Applications: Opportunities and Challenges
    Weerasinghe, Shakthi
    Zaslavsky, Arkady
    Loke, Seng W.
    Medvedev, Alexey
    Abken, Amin
    Hassani, Alireza
    [J]. IEEE Internet of Things Magazine, 2023, 6 (04): : 96 - 102
  • [3] Intelligence in IoT-Based 5G Networks: Opportunities and Challenges
    Javaid, Nadeem
    Sher, Arshad
    Nasir, Hina
    Guizani, Nadra
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (10) : 94 - 100
  • [4] A Group Handover Scheme for Supporting Drone Services in IoT-Based 5G Network Architectures
    Skondras, Emmanouil
    Kosmopoulos, Ioannis
    Michailidis, Emmanouel T.
    Michalas, Angelos
    Vergados, Dimitrios D.
    [J]. DRONES, 2022, 6 (12)
  • [5] Poster: Attribute Based Access Control for IoT Devices in 5G Networks
    Kaven, Sascha
    Skwarek, Volker
    [J]. PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, : 51 - 53
  • [6] Label-based access control policy enforcement and management
    Zhou, Wei
    Raja, Vinesh H.
    Meinel, Christoph
    Ahmad, Munir
    [J]. SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 395 - +
  • [7] Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology
    Minahil
    Ayub, Muhammad Faizan
    Mahmood, Khalid
    Kumari, Saru
    Sangaiah, Arun Kumar
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (02) : 235 - 244
  • [8] Lightweight IoT-based authentication scheme in cloud computing circumstance
    Zhou, Lu
    Li, Xiong
    Yeh, Kuo-Hui
    Su, Chunhua
    Chiu, Wayne
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 : 244 - 251
  • [9] Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology
    Minahil
    Muhammad Faizan Ayub
    Khalid Mahmood
    Saru Kumari
    Arun Kumar Sangaiah
    [J]. Digital Communications and Networks, 2021, 7 (02) : 235 - 244
  • [10] IoT-based Disaster Management System on 5G uRLLC Network
    Franchi, F.
    Marotta, A.
    Rinaldi, C.
    Graziosi, F.
    D'Errico, L.
    [J]. 2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019), 2019,