Abstract

In the field of industrial control, edge computing puts forward higher requirements for the local processing ability of data. The traditional industrial Programmable Logic Controller (PLC) cannot complete this task. Edge Intelligent Controller (EIC) is developed according to the demand for edge computing. As the core component of edge computing, the security and reliable operation of EIC has great significance and influence on the promotion and development of edge computing. For the access authentication of EIC, an efficient revocable anonymous authentication scheme for EICs by utilizing a group signature technique is proposed in this paper, which can trace the identity information of the EIC and protect the privacy of the EIC, and apply an efficient revocation mechanism to revoke any illegal or abnormal EICs. Through security analysis, we prove the authentication scheme is anonymity, integrity, traceability, forward secrecy, resistance to the replay attack and efficient revocability. Furthermore, the performance analysis and comparisons show that the authentication scheme is efficient and feasible for EICs.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call