引用本文: |
-
毛锐,纪鹤鸣,黄伟庆,王晓宇,王妍,孙德刚.大规模网络中的身份认证关键技术探讨[J].信息安全学报,已采用 [点击复制]
- MAO Rui,Ji Heming,Huang Weiqing,WANG Xiaoyu,WANG Yan,SUN Degang.Discussion on key technologies of identity authentication in large-scale networks[J].Journal of Cyber Security,Accept [点击复制]
|
|
|
|
本文已被:浏览 2547次 下载 327次 |
|
大规模网络中的身份认证关键技术探讨 |
|
|
(1.中国科学院大学网络空间安全学院,中国科学院信息工程研究所;2.中国科学院大学网络空间安全学院;3.中国科学院大学网络空间安全学院,中国科学院信息工程研究所;4.中国科学院信息工程研究所) |
|
摘要: |
近年来,随着大规模网络的快速发展,大量新型的攻击方式及其伴随而来的安全问题频繁发生,其中,身份认证技术作为网络安全的第一条防线,始终面临着严峻挑战,大量由于身份认证过程不够安全或用于认证的隐私信息存储不当而引发的安全问题层出不穷,引发了学者们对于身份认证技术的长期探索与关注。如何有效地解决大规模网络中的身份认证问题,针对不同的场景以及不同的业务需求选择合适有效的身份认证技术、提升相应场景下身份认证环节的安全性,已成为当前亟需解决的问题。本文针对移动互联网、车联网、物联网、云计算四种常见的大规模网络面临的身份认证安全问题进行分析,并对身份认证关键技术的发展以及在大规模网络中的重点应用方案进行了综述。首先,本文分析了大规模网络身份认证技术面临的主要问题和安全需求。其次,在分析身份认证协议及技术原理的基础上,对大规模网络中五大类十五种身份认证技术进行了归纳,并对其特点及优缺点进行了分析和比较。随后,总结并分析了四种大规模网络中身份认证技术的典型应用方案,具体包括:移动互联网中基于人脸识别的持续认证、基于触摸动力学的持续认证和生物特征与设备结合的持续认证;车联网中基于假名的认证、基于群签名的认证和基于区块链的认证;物联网中基于匿名的认证、基于无线传感器的轻量级认证和基于层次化的认证;云计算中基于访问控制的认证、基于生物特征的认证和基于移动云计算的认证,并对以上场景中身份认证技术解决的关键问题、安全性以及性能进行了探讨和对比。最后,对大规模网络身份认证技术的研究热点、面临的新挑战以及发展的新趋势进行了讨论和展望。 |
关键词: 身份认证 网络安全 物联网 移动互联网 车联网 云计算 |
DOI:10.19363/J.cnki.cn10-1380/tn.2023.08.44 |
投稿时间:2021-09-14修订日期:2021-11-30 |
基金项目: |
|
Discussion on key technologies of identity authentication in large-scale networks |
MAO Rui1,2,3,3,4,5,3,3,6,7,8,3,3,4,5,3,3,6, Ji Heming1, Huang Weiqing1,9,10, WANG Xiaoyu1, WANG Yan11, SUN Degang1
|
(1.School of Cyber Security,University of Chinese Academy of Sciences;2.&3.amp;4.lt;5.br /&6.gt;7.Institute of Information Engineering,Chinese Academy of Sciences;8.China&9. Institute of Information Engineering,Chinese Academy of Sciences;10.China ;11.Institute of Information Engineering, Chinese Academy of Sciences) |
Abstract: |
With the rapid development of large-scale networks in recent years, many attack methods and accompanying security problems have occurred frequently. Among them, identity authentication technology, as the first line of defense in network security, always faces serious challenges. Many security problems have emerged one after another due to insecure identity authentication processes or improper storage of private information used for authentication. These above issues arouse long-term exploration and attention on identity authentication technology for scholars. How to solve the problem of identity authentication in large-scale networks effectively, choose appropriate and effective identity authentication technology for different scenarios and different business demands, and improve the security of identity authentication in corresponding scenarios have become the problems that need to be solved urgently. This paper analyzes the security problems of identity authentication faced by four common large-scale networks of mobile Internet, Internet of Vehicles, Internet of Things, and cloud computing. And then, we summarize the development of critical technologies for identity authentication and critical application schemes in large-scale networks. Firstly, we analyze the main problems and security requirements faced by large-scale network identity authentication technology. Secondly, based on the analysis of identity authentication protocols and technological theories, we summarized five types of fifteen identity authentication technologies in large-scale networks, simultaneously analyzing and comparing their features, advantages, and disadvantages. Subsequently, we summarize and analyze typical application schemes of identity authentication technologies in four large-scale networks, which are as follows: Continuous authentication based on face recognition, continuous authentication based on touch dynamics, and continuous authentication combined with biometrics and devices for the mobile internet; Authentication based on pseudonyms, authentication based on group signatures, and authentication based on blockchain for the Internet of Vehicles; Anonymity-based authentication, wireless sensor-based lightweight authentication, and hierarchical-based authentication for the Internet of Things; Authentication based on access control, authentication based on biometrics, and authentication based on mobile cloud computing for cloud computing. Based on the above scenarios, we discuss and compare the critical problems that have been solved, security, and performance of identity authentication technologies. Finally, we discuss and look forward to the research hotspots, new challenges, and identity authentication technology development trends in large-scale networks. |
Key words: identity authentication cyber security Internet of things mobile Internet Internet of vehicles cloud computing networks |
|
|
|
|
|