• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Lightweight Anonymous Device Authentication Scheme for Information-Centric Distribution Feeder Microgrid

    2021-12-15 08:13:12AnhaoXiangandJunZheng
    Computers Materials&Continua 2021年11期

    Anhao Xiang and Jun Zheng

    Department of Computer Science and Engineering,New Mexico Institute of Mining and Technology,Socorro,87801,NM,USA

    Abstract:Distribution feeder microgrid (DFM) built based on existing distributed feeder (DF),is a promising solution for modern microgrid.DFM contains a large number of heterogeneous devices that generate heavy network traffice and require a low data delivery latency.The information-centric networking(ICN)paradigm has shown a great potential to address the communication requirements of smart grid.However,the integration of advanced information and communication technologies with DFM make it vulnerable to cyber attacks.Adequate authentication of grid devices is essential for preventing unauthorized accesses to the grid network and defending against cyber attacks.In this paper,we propose a new lightweight anonymous device authentication scheme for DFM supported by named data networking(NDN),a representative implementation of ICN.We perform a security analysis to show that the proposed scheme can provide security features such as mutual authentication,session key agreement,defending against various cyber attacks,anonymity,and resilience against device capture attack.The security of the proposed scheme is also formally verified using the popular AVISPA(Automated Validation of Internet Security Protocols and Applications)tool.The computational and communication costs of the proposed scheme are evaluated.Our results demonstrate that the proposed scheme achieves significantly lower computational,communication and energy costs than other state-of-the-art schemes.

    Keywords:Mutual authentication;information-centric networking;named data networking;distribution feeder microgrid;smart devices;AVISPA;security

    1 Introduction

    Smart grids.provide a more reliable and efficient power supply than traditional power grids by incorporating advanced information and communication technologies (ICT) [1,2].Microgrids are a subset of smart grids that achieve grid deployment in small regions.A microgrid acts as a single controlled entity that is formed by a group of interconnected load and demand resources with communication and control capabilities [3].It has a well-defined electricity boundary with a limited number of connection points to the utility grid such that it can operate in either gridconnected or islanded mode.

    Distribution feeder microgrid (DFM) has been proposed as a solution of modern microgrid which is built based on existing distribution feeder (DF) [3,4].DFM utilizes advanced communication,control,and protection technologies to increase the sustainability,reliability,and resiliency of the grid and support very high penetration of distributed energy resources (DERs) [3,5].The architecture of DFM is illustrated in Fig.1,which contains a variety of demand and load entities such as consumer appliances,generators,energy storage,electrical vehicles (EVs),DERs,smart meters,synchrophasor devices etc.The DFM gateway (DG) serves as the central control and management entity that connects the DFM to the utility grid.

    Figure 1:System architecture of DFM

    One of the major technical challenges faced by DFM is the communication demand of a large number of heterogeneous devices.A scalable networking and communication architecture is needed that can meet requirements such as low data delivery latency and heavy network traffic [6].The information centric networking (ICN) paradigm has been explored recently to address the requirements of smart grid communication [6-9].Unlike the host-centric IP-based networking architecture,ICN adopts a content-centric communication model with novel features like data caching in network edge,data provenance,inherent multicast support,etc.which make it suitable for smart grid applications.C-DAX (Cyber-secure Data and Control Cloud) is an ICN-based solution proposed for the monitoring and control of smart grids [8].Tourani et al.[6]proposed an ICN-based smart grid networking architecture called iCenS,which was shown to be effective in serving various types of smart grid traffic.Yu et al.[9]proposed a Content-Centric Networking(CCN) based advanced metering system (CCN-AMI) for smart grids.The CCN-AMI system is comprised of several components such as smart meters,demand response management system(DRMS),which provides better traffic congestion control,mobility and cyber security.Ravikumar et al.[7]proposed an ICN-based smart grid architecture that consists of a three-level hierarchy for information flow including physical level,aggregation level,and computation level.The hierarchy specifies constituents and the interaction mechanism at each level.The proposed architecture adopts IEC 61850 as underlying communication stack for backward compatibility and adds the Information-Centric Network Protocol (ICNP) layer.Both work of [7,9]and have conducted a comprehensive performance analysis of the proposed ICN architectures and the results show a great potential of applying ICN for smart grids.

    In this paper,we consider a named data networking (NDN) based architecture to address the communication demand of DFM.NDN is a representative ICN architecture which has been shown as a promising solution for not only smart grid communication [6,7]but also the communication needs of applications of smart cities [10],smart campus [11],smart home [12],and smart healthcare [13].In addition to communication requirements,another key technical challenge faced by DFM is to ensure the security and privacy of the grid.The integration of advanced ICT technologies in DFM makes it vulnerable to a number of cyber attacks such as man-inthe-middle (MITM) attacks,reply attacks,impersonation attacks,etc.Adequate authentication is essential for preventing unauthorized access to the grid network and defending against cyber attacks.There are lots of authentication and key agreement protocols proposed for smart grids based on IP networking architecture.For example,Garg et al.[14]proposed an ECC (Elliptic Curve Cryptography) and FHMQV (Fully Hashed Menezes-Qu-Vanstone) based authentication scheme for smart metering infrastructure (SMI).Kumar et al.[15]proposed another ECC-based authentication scheme for smart grid device and utility center communication.Chen et al.[16]proposed an ECC and bilinear pairing-based authentication scheme for smart grid communication.Zhang et al.[17]proposed a lightweight authentication scheme using symmetric cryptography,hash,and other lightweight operations.

    There are some works on authentication protocols designed for ICN-based networking architectures,mainly for supporting various IoT communication scenarios.Similar to IP-based networking architecture,authentication also brings significant security benefits to ICN-based networking architecture [18].Compagno et al.[18]proposed a secure IoT device onboarding protocol for ICN called OnboardICNg based on symmetric-key cryptography.It was shown in [19]that OnboardICNg incurs significant lower time and energy overheads compared with the design based on asymmetric-key cryptography.LASeR,a secure IoT device authentication and routing scheme for NDN-based smart cities,was proposed in [20].The device authentication of LASeR is based on the Pre-Shared Key Extensible Authentication Protocol (EAP-PSK).For ICN based DFM,the authentication scheme should provide various security features including mutual authentication,session key agreement,defending against various attacks,anonymity,and resilience against device capture attack [15].In addition,majority of smart devices in DFM are resource-limited which requires the authentication scheme to have low computational,communication,and energy costs.

    The contributions of this paper are:(1) we propose a lightweight anonymous device authentication scheme for NDN-based DFM;(2) we perform an analysis of security requirements satisfied by the proposed scheme and formally verify its security by using the popular AVISPA (Automated Validation of Internet Security Protocols and Applications) tool [21];and (3) we conduct a performance comparison of the proposed scheme with existing schemes to demonstrate that the proposed scheme achieves lower computational,communication,and energy costs.

    The rest of this paper is organized as follows:Section 2 introduces system models and assumptions adopted in this paper.The proposed device authentication scheme for NDN-based DFM is presented in Section 3.In Section 4,we analyze security requirements satisfied by the proposed scheme followed by a formal security verification with the AVISPA tool.The performance of the proposed scheme in terms of computational,communication,and energy costs is evaluated and compared with other state-of-the-art schemes in Section 5.Finally,the conclusion of this paper is drawn in Section 6.

    2 System Models and Assumptions

    In this section,we introduce the network model of NDN based DFM,the threat model,and their assumptions after an overview of NDN.

    2.1 NDN Overview

    NDN is a new ICN paradigm proposed as a candidate for future internet architecture.NDN assigns a unique name to a trunk of data or a so-called content object.NDN has two types of packets:InterestandDatapackets.TheInterestpacket is issued by a consumer to request the desired data content using the unique name.The network will forward theInterestpacket to the provider of the data content.The provider will reply with aDatapacket back to the consumer which contains the name and actual content of the data.InterestandDatapackets can have other fields besides the name of the data content.In our scheme,we only consider thenamefield in theInterestpacket,and thename,content,andsignaturefields in theDatapacket.

    Routing of NDN is done through three data structures maintained by each NDN router:a Pending Interest Table (PIT),a Forwarding Information Base (FIB),and a Content Store (CS).The CS serves as the data cache of an NDN router.When anInterestpacket arrives,the router will check if the name of the requested data content matches any record in the CS and serves the data if there is a match.Otherwise,the router will check the PIT table to avoid forwarding duplicatedInterestpacket.If no PIT entry can be found,the router will use the FIB table to determine the appropriate interface to forward theInterestpacket.In the meantime,the PIT table will also be updated to indicate that theInterestpacket is forwarded.The routing of the correspondingDatapacket will simply use the reverse path identified in the PIT.

    In NDN,aDatapacket usually contains the name of the correspondingInterestpacket.This duplication will tremendously increase the size of aDatapacket when a long name is used for the correspondingInterestpacket.This causes a significant problem when transmitting an NDN packet over a low power wireless link such as an IEEE 802.15.4 link due to its limited maximum physical packet size.Solutions relying on fragmentation and reassembly [22]could result in a significant increase in memory storage,processing complexity,and traffic amount.In this paper,we adopt a solution proposed in [23]that replaces a longInterestname with a short 1-byte HopID.The solution extends the PIT table with two new columns:HIDiandHIDo.For anInterestpacket,each hop generates a 1-byte HopID and includes it in the name.The HopID will be stored in theHIDocolumn which should be unique within the local PIT table and has the same lifetime as the corresponding PIT entry.When anInterestpacket arrives at a hop,the HopID will be extracted from theInterestname and stored in theHIDicolumn of the corresponding PIT entry.A new HopID will then be generated by the hop and stored in theHIDocolumn of the same PIT entry.The new HopID will be included in the name of the outgoingInterestpacket.This process will be performed in each intermediate hop until theInterestis served by the producer.The producer will extract HopID from theHIDicolumn and use it as the name of the respondedDatapacket.Intermediate hops that forward theDatapacket will simply extract the HopID and lookupHIDocolumn of the PIT table for a match.If a match is found,the hop will replace the HopID of theDatapacket with the new HopID from theHIDicolumn of the matched PIT entry before forwarding theDatapacket.

    2.2 Network Model and Assumptions

    We consider that all entities of a DFM shown in Fig.1 are wirelessly connected to form a mesh network topology.The load and demand entities with communication and control capabilities in a DFM are referred as smart devices.The majority of them have limited computational,memory,and energy resources.Each device has a unique and immutable real identity such as a Silicon-ID number [24].The deployment of smart devices is done over time.The connection of a DFM to the utility grid is done through the DG,which is considered as resource un-constrained.A smart device in a DFM may connect to the DG through a multi-hop path with the help of other devices.We also assume that a Trust Authority (TA) is existed to serve DFMs of a utility service provider as shown in Fig.1.The TA provides authentication and authorization services to bootstrap new smart devices into a DFM network.

    2.3 Threat Model and Assumptions

    The basic adversary model considered for the proposed scheme is the widely used Dolev-Yao(DY) model [25].According to the model,all entities including smart devices and DG are not trustworthy.The messages between the entities are transferred through an open channel which can be eavesdropped,intercepted,and modified by an adversary.In addition,we assume that an adversary can compromise a session key and session states according to Canetti and Krawczyk(CK) adversary model [26].The adversary can also physically capture a device to extract the stored secret credentials by using the sophisticated power analysis attacks [27].Finally,we assume that the TA is a fully trusted entity and can’t be compromised.

    Based on the threat model and assumptions,the proposed scheme aims to satisfy security requirements including message integrity,mutual authentication and session key agreement,perfect forward secrecy,anonymity,and resistance to various attacks.

    3 Proposed Scheme

    The proposed scheme consists of two phases:(1) device registration phase;(2) network discovery and authentication phase.Note that the TA is only involved in the device registration phase.Tab.1 lists the notations and their descriptions used in this paper.

    3.1 Device Registration Phase

    Before deployed in a DFM,a smart deviceS(SDS)needs to be registered offline at the TA by the owner who brings the device to the TA’s office to complete the registration through a secure channel [28].During the registration process,SDSfirst sends its real identityIDSto TA.TA then generates a master secretkSand two random numbersrTA-DG,andrTA-SDSforSDS.The pseudo-identity ofSDSis then computed asPIDS=H(IDS||kS).TA also computes two secretsAS=H(IDG||PIDS||rTA-DG)andBS=H(IDS||PIDG||rTA-SDS).Note thatIDGandPIDGare the real identity and pseudo-identity of DG,respectively.Finally,TA sendsPIDS,AS,andrTA-SDStoSDS,and then sendsPIDS,BS,andrTA-DGto DG.The device registration phase is illustrated in Fig.2.

    Table 1:Notations and their descriptions used in this paper

    Figure 2:An illustration of device registration phase

    3.2 Network Discovery and Authentication Phase

    After the registration,SDSperforms the network discovery and authentication phase to join the trusted network of a DFM.The procedure of this phase is illustrated in Fig.3 and described as follows:

    ·SDSgenerates a random numberrSDs-DGand a HopIDHopIDS,and then computesC1=EAS(rSDS-DG)andS1=SAS(PIDS||rSDS-DG).After that,SDSgenerates anInterestwith the name as/Discover/PIDS/C1/S1/HopIDS.A PIT entry will be created with name prefix/Discover/PIDS/C1/S1andHopIDSis stored in theHIDocolumn of this entry.ThisInterestwill then be broadcast to all neighbors ofSDS.

    · Upon receiving the broadcastInterest,a trusted neighbor deviceN(SDN)can choose to help the network discovery and authentication process ofSDSor not.IfSDNwants to help the process,it will extractHopIDSandS1from the receivedInterest.A PIT entry for the receivedInterestis created with name prefix/Discover/PIDS/C1/S1and theHIDicolumn asHopIDS.SDNthen generates a new HopIDHopIDNand stores it in theHIDocolumn of the newly created PIT entry.A signatureS2will be computed asSSKSDN-DG(S1||PIDG||PIDN),whereSKSDN-DGis the session key shared betweenSDNandDG,andPIDNis the pseudo-identity ofSDN.Finally,a newInterestis generated and sent toDGwith the name as/Auth/PIDG/PIDS/C1/PIDN/S2/HopIDN.Note that a mapping from the newInterestname/Auth/PIDG/PIDS/C1/PIDN/S2to the broadcastInterestname/Discover/PIDS/C1/S1must be established atSDN.

    When the newInterestis forwarded through the trusted network of the DFM toDG,the HopID part of theInterestname will be replaced by a new HopID generated at each hop.Supposing the hop beforeDGis a smart deviceM(SDM)and its generated HopID isHopIDM,the name of theInterestreceived byDGwill be/Auth/PIDG/PIDS/C1/PIDN/S2/HopIDM.Without loss of generality,we assume that theInterestsent bySDNwill be received byDGdirectly.

    · WhenDGreceives theInterest,a PIT entry with the name prefix/Auth/PIDG/PIDS/C1/PIDN/S2will be created with the correspondingHIDiset asHopIDN.It extractsPID*SandC*1from theInterestname.ThenA*Sis computed asA*S=H(IDG||PID*S||rTA-DG)which is used to decryptC*1to obtainrSDs-DG*=DA*S(C*1).After that,DGcomputesS*1=SA*S(PID*S||rSDS-DG*),andS*2=SSKSDN-DG(S*1||PIDG||PID*N).It then checks ifS*2==S2.If not,the authentication process will be aborted.Otherwise,SDSis authenticated atDGwhich will then generate two random numbersrDG-SDSandrSDs-SDN.The two random numbers are used to generate the session key betweenSDSandSDNasSKSDS-SDN=H(A*S||BS||rSDs-DG*||rSDs-SDN)and the session key betweenSDSandDGasSKSDS-DG=H(A*S||BS||rSDs-DG*||rDG-SDS).DGwill prepare theDatapacket by computingC2=ESKSDN-DG(SKSDS-SDN),C3=EBS(rDG-SDs||rSDS-SDN),andS3=SBS(rDG-SDS||rSDS-SDN||PIDG||PIDN),which are included as the content.DGwill generate a signature for theDatapacket asS4=SSKSDN-DG(C3||S3||SKSDS-SDN).ThenHopIDNis retrieved from theHIDicolumn of the corresponding PIT entry which will be used as the name of theDatapacket.TheDatapacket will be sent back toSDN.

    · WhenSDNreceives theDatapacket,it first extractsHopIDNfrom the name and look up theHIDicolumn of the matched PIT entry to find the next hop’s HopIDHopIDS,which will be used as the name of the newDatapacket sent back toSDS.ThenSDNwill extractC*2,C*3,S*3from the content of the receivedDataand obtain the session keySKSDS-SDNby decryptingC*2withSKSDN-DG.After that,it generatesS*4=SSKSDN-DG(C*3||S*3||SK*SDS-SDN)and verifies ifS*4==S4.If not,the authentication process will be aborted.Otherwise,SDNsends aDatapacket toSDSwhose content includesPIDG,PIDN,andC3with the name asHopIDSand the signature asS3.

    · Upon receiving theDatapacket fromSDN,SDSfirst computesB*S=H(IDS||PID*G||rTA-SDS)and obtainsr*DG-SDSandr*SDS-SDNby decryptingC*3withB*S.ThenSDScomputesS*3=SB*S(r*DG-SDS||r*SDS-SDN||PID*G||PID*N)and verifies ifS*3==S3.If not,the authentication process will be aborted.Otherwise,SDSauthenticatesDGas legitimate and computes the two session keysSKSDS-SDN=H(AS||B*S||rSDs-DG||r*SDs-SDN),andSKSDS-DG=H(AS||B*S||rSDs-DG||r*DG-SDS).

    Note that there could be multiple neighboring devices helping the authentication ofSDS.ForInterestpackets received from different neighboring devices,DGwill keep using the samerDG-SDSso that the session key betweenSDSandDGremains the same.DGwill generate differentrSDS-SDNfor neighboring devices so that the session keys betweenSDSand neighboring devices are different.

    Figure 3:An illustration of network discovery and authentication phase

    4 Security Analysis

    In this section,we perform an analysis of security requirements satisfied by the proposed scheme and formally verify its security by using the AVISPA tool.

    4.1 Informal Security Analysis

    Based on the threat model specified in Section 2.3,the proposed scheme can satisfy the following security requirements.

    1)Message integrity:The proposed scheme generates a message signature by using the AESCMAC algorithm to ensure message integrity.SecretsAS,BSand secure session keySKSDSN-DGare used as keys for the AES-CMAC algorithm.Since an adversary can’t obtain these cryptographic materials from intercepted messages,they can’t forge a legitimate message signature after modifying a message.

    2) Mutual authentication and session key agreement:Mutual authentication is performed to verify the legitimacy of participating entities.In the proposed scheme,the mutual authentication betweenSDSandDGis achieved by using secretsASandBS.DGauthenticatesSDSby verifyingS*2with secretASand session keySKSDSN-DG.Similarly,SDSauthenticatesDGby verifyingS*3with secretBS.

    In the proposed scheme,after performing mutual authentication for a session,a symmetric session key is established betweenSDSandDGasSKSDS-DG=H(AS||BS||rSDs-DG||rDG-SDS),which can be used to encrypt subsequent communication.Similarly,a symmetric session key betweenSDSand its neighborSDNis established asSKSDS-SDN=H(AS||BS||rSDs-DG||rSDS-SDN),which can be used to support secure communication between neighboring devices.

    3) Perfect forward secrecy:Perfect forward secrecy ensures that the compromising of longterm secret information of legitimate entities (smart devices andDG) by an adversary should not compromise the session keys established in previous sessions.The proposed scheme generates three random numbersrSDs-DG,rDG-SDS,andrSDS-SDNto compute the two session keysSKSDS-DGandSKSDS-SDNin each session.Without knowing the random numbers,the adversary can’t obtain the session keys of previous sessions.Thus,perfect forward secrecy is held by the proposed scheme.

    4)Anonymity:Anonymity ensures that the real identity of an entity can’t be revealed by an adversary through intercepted messages.The proposed scheme uses a pseudo-identity for each entity that is computed from the real identity and a master secret generated by the TA.It’s infeasible for an adversary to compute the real identity without the knowledge of the master secret.Thus,anonymity is satisfied by the proposed scheme.

    5) Resistance to impersonation attacks:We consider three cases of impersonation attacks for the proposed scheme:

    ·New device impersonation attack:To impersonate a legitimate new smart deviceSDS,an adversary needs to generate a validInterestas the network discovery and authentication request broadcast to neighboring devices.However,the adversary doesn’t have the knowledge ofASto computeC1andS1to generate a validInterest.Thus,the proposed scheme can resist the new device impersonation attack.

    ·Neighboring device impersonation attack:To impersonate a legitimate neighboring device,an adversary needs to generate a validInterestsent toDG.However,the adversary doesn’t have the knowledge ofSKSDSN-DGto computeS2to generate a validInterest.Thus,the proposed scheme can resist the neighboring device impersonation attack.

    ·DG impersonation attack:To impersonate a legitimateDG,an adversary needs to interpret a receivedInterestand generate a validDataas the response which is impossible since the adversary doesn’t have the knowledge ofASandBS.Thus,it’s infeasible for an adversary to launch theDGimpersonation attack.

    6)Resistance to replay attacks:An adversary can intercept the transmitted messages and reply them back in a later time.In the proposed scheme,the adversary can’t generate the session keys from the intercepted messages.To generate the session keys,the adversary needs to knowASandBS,and the three random numbersrSDs-DG,rDG-SDS,andrSDS-SDNwhich can’t be obtained from the intercepted messages.Therefore,the proposed scheme can resist replay attacks.

    7)Resistance of MITM attacks:An adversary can launch MITM attacks by intercepting the transmitted messages and try to make two legitimate entities believe that they communicate with each other directly.To make this happen,the adversary has to knowASandBS,orSKSDN-DGwhich are infeasible to be obtained from the intercepted messages.Thus,the proposed scheme can resist MITM attacks.

    8)Resilience against devices capture attack:A smart device deployed in the wild could be physically captured by an adversary.Based on the threat model discussed in Section 2.3,the adversary can obtain the secret credentials for authentication such asPIDS,AS,andBSfrom a stolen device by using the power analysis attacks [27].Such side-channel attacks are difficult to defend unless the device is tamper-resistant [29].However,the computation of the secret credentials such asASandBSinvolvesIDS,a unique and immutable identity,so that they are distinct for all smart devices in the DFM network.Thus,the adversary can’t compute the session keys betweenDGand other non-compromising devices using the secret credentials of the captured device.Such security property is called unconditional security against device capture attack [15,24,30-32].Therefore,the proposed scheme is resilient against device capture attack.

    4.2 Formal Security Verification

    In this section,we formally verify the security of the proposed scheme by using the AVISPA tool,which is designed for the analysis of large-scale internet security-sensitive protocols [21].

    In AVISPA,the protocol actions and security requirements are described with a language called the High-Level Protocol Specification Language (HLPSL).AVISPA generates an intermediate file (IF) from the input HLPSL file by using the HLPSL2IF translator and passes the intermediate file to an AVISPA backend.The backend will verify the protocol security and generates a security report.AVISPA has four different backends:On-the-fly Model-Checker(OFMC),CL-based Attack Searcher (CL-AtSe),SAT-based Model-Check (SATMC),and Tree Automata-based Protocol Analyzer (TA4SP).User can choose suitable backends for protocol security verification.

    HLPSL is a role-based language that contains two types of roles:basic role and composition role.Figs.4-6 describe the initial parameters,states,and transitions for the three basic roles(SDS,SDN,andDG) involved in the authentication process.The composition roles are specified in Fig.7.The session role instantiates the parameters of the basic roles.The environment role contains the global variables and specifies the sessions of the protocol.Finally,the security goals of the proposed scheme are also specified in Fig.7,which test the strength of session keys against various attacks and verify the establishment of mutual authentication.Fig.8 shows the outputs of the OFMC and CL-AtSe backends,which prove the proposed scheme is safe against both backends.

    5 Performance Analysis

    In the following sections,we evaluate the communication,computation,and energy costs of the proposed scheme and compare them with those of OnboardICNg [18]and LASeR [20].OnboardICNg and LASeR adopt similar system architectures as the proposed scheme.Tab.2 shows the mapping of the entities of OnboardICNg and LASeR to those of the proposed scheme.SinceDGis resource-unconstrained,our analysis concentrates on resource-limited smart devices.We assume that there arenneighbor devices helping the authentication process.

    5.1 Communication Cost

    In this section,we evaluate the communication cost of the proposed scheme during the network discovery and authentication phase in terms of the number of exchanged messages and the number of bytes sent and received by smart devices.We use IEEE 802.15.4 as the underlying link-layer which has a maximum frame size of 127 bytes.

    Figure 4:Specification of the SDS role

    Figure 5:Specification of the SDN role

    Figure 6:Specification of the DG role

    Since the communication betweenSDSandSDNis untrusted during the authentication process,an 802.15.4 frame exchanged betweenSDSandSDNdoes not carry the signature which results in a size of 36 bytes for the header and footer.On the other hand,a frame exchanged within the trusted network of DFM requires the full 52-byte 802.15.4 header and footer.In addition,we consider the 1+0 encoding proposed for NDN packets [33].Tab.3 shows the fields and their corresponding sizes for NDNInterestandDatapackets,whereSTis the total size of name components TL (1B * number of name components),SNis the total size of the name values,andSCis the total size of the content.We assume that ID and PID are 4 bytes,a random number is 8 bytes,and outputs of electric signature,hash,and encryption operations are 16 bytes.Prefixes (/Discoverand/Auth) are encoded in 1 byte.Based on the above assumptions,we compare the communication cost of the proposed scheme with those of OnboardICNg and LASeR in Tab.4.For the two reference schemes,we compute the number of bytes sent and received by smart devices with and without HopID implemented.It can be seen that HopID can significantly reduce the communication overheads of the reference schemes,especially for LASeR which also has longInterestnames.Overall,the results show that the proposed scheme is significantly lightweight than the two reference schemes in terms of the number of exchanged messages and the number of bytes sent/received by smart devices.

    Figure 7:Specification of the Environment and Session role

    5.2 Computational Cost

    Tab.5 compares the cryptographic operations performed by the proposed scheme with those of OnboardICNg and LASeR.In the table,‘TH’,‘TE’,‘TD’,‘TM’,and ‘THM’represent execution times of operations of hash.AES-128 encryption and decryption,AES-CMAC,and HMAC,respectively.To measure the computation times of cryptographic operations,we used a Raspberry Pi 3 board as the smart device running OpenSSL C programming language libraries.The measured computation times of AES-128 encryption,AES-128 decryption,SHA-256,AES-CMAC,and HMAC are 4.36μs,4.47μs,2.69μs,5.54μs,and 10.9μs,respectively.We then compared the computation time of the proposed scheme with those of OnboardICNg and LASeR.As shown in Tab.5,both the proposed scheme and LASeR are more computationally efficient than OnboardICNg.The new joining device of the proposed scheme has a lower computational time than that of LASeR whennis less than 18.Note that LASeR does not establish session keys between the new joining device and its neighbor devices.

    Figure 8:Outputs of OFMC and CL-AtSe backends

    Table 2:Mapping of entities in different schemes

    Table 3:NDN Interest(I) and Data(D) packets

    5.3 Energy Cost

    We estimated the computational energy cost by using the formulaE=V*I*t,whereVis the voltage of the input power,Iis the current of the circuit,andtis the computation time.BothVandIwere obtained from the Raspberry Pi data sheet [34,35].We estimated the communication energy cost by using the energy cost of sending and receiving one bit on the Raspberry Pi,which was measured as 0.029μJand 0.033μJ,respectively.Fig.9 compares the energy costs of a new joining device of the three schemes under different number of neighbor devices.Note that the communication costs of OnboardICNg and LASeR in Fig.9 were estimated with HopID implemented for a fair comparison.The results show that the proposed scheme is more energyfriendly than the two reference schemes.

    Table 4:Comparison of communication costs

    Table 5:Comparison of computation costs

    Figure 9:Comparison of energy costs (dj:OnboardICNg [18],SN2:LASeR [20],SDS:proposed scheme)

    6 Conclusion

    In this paper,we propose a new lightweight anonymous device authentication scheme for NDN-based DFM.We perform an informal analysis of security requirements satisfied by the proposed scheme.Formal security verification of the proposed is also carried out by using the popular AVISPA tool.We conduct a performance evaluation to compare the computational,communication,and energy costs of the proposed scheme with those of other schemes.The results of our security analysis and performance evaluation reveal that the proposed scheme has lower computational and communication overheads than other state-of-the-art schemes.In future,we plan to develop an efficient group key agreement scheme for smart devices in information-centric DMF.We will also research how to perform secure and reliable access control of smart devices in information-centric DMF.

    Funding Statement:This material is based upon work funded by the National Science Foundation EPSCoR Cooperative Agreement OIA-1757207.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    女的被弄到高潮叫床怎么办| 久久久久免费精品人妻一区二区| 亚洲最大成人中文| 男人舔奶头视频| 久久亚洲精品不卡| 观看美女的网站| 在线免费观看不下载黄p国产| 日本一本二区三区精品| 亚洲欧美精品自产自拍| 国产高清视频在线观看网站| 国产片特级美女逼逼视频| 观看免费一级毛片| 国产精品1区2区在线观看.| av天堂在线播放| 十八禁网站免费在线| 一边摸一边抽搐一进一小说| 又爽又黄a免费视频| 欧美不卡视频在线免费观看| 欧美日韩精品成人综合77777| 我要搜黄色片| 国产视频内射| 日韩国内少妇激情av| 人人妻,人人澡人人爽秒播| 国产成人福利小说| 亚洲欧美日韩高清专用| 99热精品在线国产| 男女啪啪激烈高潮av片| 听说在线观看完整版免费高清| 国产人妻一区二区三区在| 观看免费一级毛片| 成人毛片a级毛片在线播放| 久久久久久久久久黄片| 午夜免费激情av| 国产精品永久免费网站| 变态另类成人亚洲欧美熟女| 色吧在线观看| 国产亚洲精品久久久com| 精品人妻一区二区三区麻豆 | 亚洲精品一区av在线观看| 女生性感内裤真人,穿戴方法视频| 好男人在线观看高清免费视频| 久久人妻av系列| 日本成人三级电影网站| 亚洲av.av天堂| 亚洲精品久久国产高清桃花| av在线老鸭窝| 国产一级毛片七仙女欲春2| 国产精品,欧美在线| 久久天躁狠狠躁夜夜2o2o| 色尼玛亚洲综合影院| 精品福利观看| 久久99热这里只有精品18| 亚洲婷婷狠狠爱综合网| 精品久久久久久久久久久久久| 看十八女毛片水多多多| 国产一区二区在线观看日韩| 欧美成人a在线观看| 免费黄网站久久成人精品| 99久久九九国产精品国产免费| 91av网一区二区| 男女之事视频高清在线观看| 日本三级黄在线观看| 网址你懂的国产日韩在线| 少妇丰满av| 女人十人毛片免费观看3o分钟| 国产单亲对白刺激| 熟妇人妻久久中文字幕3abv| 少妇被粗大猛烈的视频| 一本久久中文字幕| 天堂网av新在线| 日本黄大片高清| 亚洲国产欧洲综合997久久,| 亚洲最大成人手机在线| 可以在线观看毛片的网站| 成人av一区二区三区在线看| 激情 狠狠 欧美| 久久久久性生活片| 搞女人的毛片| 黄片wwwwww| 男女边吃奶边做爰视频| 午夜老司机福利剧场| 日本黄色片子视频| 免费看日本二区| 乱码一卡2卡4卡精品| 成人欧美大片| 内射极品少妇av片p| 九九在线视频观看精品| 中文字幕av成人在线电影| 欧美日韩精品成人综合77777| 亚洲,欧美,日韩| 熟女电影av网| 中文字幕av成人在线电影| 日韩人妻高清精品专区| 国产成人91sexporn| 国产精品爽爽va在线观看网站| 99久国产av精品国产电影| 国产视频内射| 婷婷精品国产亚洲av| 日韩欧美一区二区三区在线观看| 国内精品宾馆在线| 国产午夜精品论理片| 午夜福利18| 一夜夜www| 中文字幕免费在线视频6| 三级经典国产精品| 亚洲av免费在线观看| av女优亚洲男人天堂| 精品久久久久久久人妻蜜臀av| 97碰自拍视频| 亚洲国产精品成人综合色| 国产久久久一区二区三区| 精品不卡国产一区二区三区| 一级毛片电影观看 | 日韩强制内射视频| 国产精品永久免费网站| 日本免费一区二区三区高清不卡| 淫秽高清视频在线观看| 中出人妻视频一区二区| 久久精品91蜜桃| 亚洲av成人av| 欧美中文日本在线观看视频| 九九在线视频观看精品| 黄色视频,在线免费观看| 亚洲欧美精品综合久久99| 网址你懂的国产日韩在线| 国产精品,欧美在线| 别揉我奶头~嗯~啊~动态视频| 国产亚洲精品综合一区在线观看| 五月伊人婷婷丁香| 国模一区二区三区四区视频| 国产亚洲精品综合一区在线观看| 亚洲美女视频黄频| 简卡轻食公司| 国产伦在线观看视频一区| 成人三级黄色视频| 男女视频在线观看网站免费| 免费人成在线观看视频色| 久久热精品热| 色播亚洲综合网| 中文在线观看免费www的网站| 三级国产精品欧美在线观看| 欧美日韩乱码在线| 级片在线观看| 色在线成人网| 给我免费播放毛片高清在线观看| 亚洲丝袜综合中文字幕| eeuss影院久久| 一边摸一边抽搐一进一小说| 色5月婷婷丁香| 国产精品av视频在线免费观看| 男插女下体视频免费在线播放| 真人做人爱边吃奶动态| 亚洲精品成人久久久久久| 久久天躁狠狠躁夜夜2o2o| 99热精品在线国产| 草草在线视频免费看| 久久九九热精品免费| 91在线观看av| 一a级毛片在线观看| 亚洲精品国产av成人精品 | a级一级毛片免费在线观看| 欧美一区二区精品小视频在线| 舔av片在线| 欧美成人精品欧美一级黄| 在线观看66精品国产| 五月玫瑰六月丁香| 国产v大片淫在线免费观看| 国产高清不卡午夜福利| 淫秽高清视频在线观看| 国产精品一区二区免费欧美| 美女大奶头视频| 男插女下体视频免费在线播放| 国产精品人妻久久久久久| 精品人妻偷拍中文字幕| 97超视频在线观看视频| 欧美成人a在线观看| 久久久国产成人精品二区| 欧美一级a爱片免费观看看| 亚洲色图av天堂| 天天躁夜夜躁狠狠久久av| 久久精品国产清高在天天线| 一边摸一边抽搐一进一小说| 成人永久免费在线观看视频| 天堂动漫精品| 校园春色视频在线观看| 婷婷精品国产亚洲av在线| 岛国在线免费视频观看| 啦啦啦观看免费观看视频高清| 亚洲成人精品中文字幕电影| 成人av在线播放网站| 久久精品国产亚洲av涩爱 | 春色校园在线视频观看| 少妇的逼水好多| 在线观看一区二区三区| 99热6这里只有精品| 黄色日韩在线| 欧美一区二区亚洲| 大又大粗又爽又黄少妇毛片口| 亚洲乱码一区二区免费版| 欧美xxxx黑人xx丫x性爽| 亚洲中文日韩欧美视频| 精品乱码久久久久久99久播| 特大巨黑吊av在线直播| 又粗又爽又猛毛片免费看| 毛片一级片免费看久久久久| av专区在线播放| 亚洲成人中文字幕在线播放| 在现免费观看毛片| 婷婷亚洲欧美| 一级毛片电影观看 | 午夜免费激情av| 搡老熟女国产l中国老女人| 日韩制服骚丝袜av| 国产亚洲欧美98| 国产亚洲精品久久久久久毛片| 免费高清视频大片| 少妇人妻精品综合一区二区 | 国产精品不卡视频一区二区| 国产精品久久久久久亚洲av鲁大| 亚洲无线在线观看| 午夜免费激情av| 99riav亚洲国产免费| 99久国产av精品| 亚洲精华国产精华液的使用体验 | 最近手机中文字幕大全| 女人被狂操c到高潮| 亚洲国产日韩欧美精品在线观看| av在线蜜桃| 99热只有精品国产| 一级毛片我不卡| 亚洲图色成人| 亚洲经典国产精华液单| 黄片wwwwww| 亚洲五月天丁香| 久久久久久久久久久丰满| 亚洲成人久久性| av视频在线观看入口| 99久久精品一区二区三区| 男人舔女人下体高潮全视频| 51国产日韩欧美| 亚洲av二区三区四区| 欧美性猛交黑人性爽| 免费黄网站久久成人精品| 亚洲av中文av极速乱| 18禁在线无遮挡免费观看视频 | 卡戴珊不雅视频在线播放| 大又大粗又爽又黄少妇毛片口| 午夜a级毛片| 一进一出抽搐动态| 悠悠久久av| 国产精品久久视频播放| 一个人看视频在线观看www免费| 国产精品一区二区三区四区久久| 久久久久精品国产欧美久久久| 日产精品乱码卡一卡2卡三| 最后的刺客免费高清国语| 18+在线观看网站| 美女大奶头视频| 麻豆精品久久久久久蜜桃| 午夜福利成人在线免费观看| 国产午夜精品论理片| 日本与韩国留学比较| 亚洲av免费高清在线观看| 国产探花极品一区二区| 国产精品爽爽va在线观看网站| 国产高清三级在线| 美女免费视频网站| 午夜激情福利司机影院| 22中文网久久字幕| 在现免费观看毛片| 亚洲电影在线观看av| 岛国在线免费视频观看| 国产探花极品一区二区| 国产精品女同一区二区软件| 亚洲欧美成人精品一区二区| 麻豆国产97在线/欧美| av黄色大香蕉| avwww免费| 热99re8久久精品国产| 国产极品精品免费视频能看的| 日韩av在线大香蕉| 一个人看视频在线观看www免费| 久久久久久国产a免费观看| 十八禁国产超污无遮挡网站| 久久久成人免费电影| 最新在线观看一区二区三区| 亚洲精品日韩在线中文字幕 | 久久久精品大字幕| 久久中文看片网| 老司机福利观看| 国产男靠女视频免费网站| 久久久国产成人免费| 一级黄色大片毛片| 国产成人a∨麻豆精品| 亚洲无线观看免费| 中文字幕熟女人妻在线| 麻豆一二三区av精品| 久久久久久久久久黄片| av在线老鸭窝| 我的女老师完整版在线观看| 在线播放国产精品三级| 日韩欧美一区二区三区在线观看| 久久精品国产亚洲av天美| 日本色播在线视频| 又爽又黄无遮挡网站| 神马国产精品三级电影在线观看| 狂野欧美白嫩少妇大欣赏| 婷婷亚洲欧美| 国产亚洲91精品色在线| 午夜精品在线福利| 国产伦一二天堂av在线观看| 一区福利在线观看| 性欧美人与动物交配| 大型黄色视频在线免费观看| 能在线免费观看的黄片| 22中文网久久字幕| 精品人妻熟女av久视频| 日韩人妻高清精品专区| 三级毛片av免费| 午夜福利在线观看免费完整高清在 | 中文字幕熟女人妻在线| 国产亚洲精品综合一区在线观看| 色哟哟·www| 啦啦啦观看免费观看视频高清| 亚洲av.av天堂| 亚洲精品乱码久久久v下载方式| 深夜a级毛片| 欧美色欧美亚洲另类二区| 一进一出抽搐gif免费好疼| 日本欧美国产在线视频| 日本-黄色视频高清免费观看| 国产精品久久视频播放| 国产视频一区二区在线看| 亚洲五月天丁香| 少妇高潮的动态图| 亚洲高清免费不卡视频| 成人亚洲欧美一区二区av| 99久久无色码亚洲精品果冻| 国产精品1区2区在线观看.| 欧美zozozo另类| 欧美激情国产日韩精品一区| 午夜亚洲福利在线播放| 欧美+日韩+精品| 久久久精品欧美日韩精品| 亚洲人成网站在线观看播放| 嫩草影院精品99| 亚洲av中文字字幕乱码综合| 国产精品爽爽va在线观看网站| 天堂av国产一区二区熟女人妻| 国产精品一区二区三区四区久久| 免费观看精品视频网站| 少妇的逼好多水| 青春草视频在线免费观看| 免费不卡的大黄色大毛片视频在线观看 | 免费观看精品视频网站| 精品国产三级普通话版| 国产精品久久视频播放| 久久鲁丝午夜福利片| 搡老妇女老女人老熟妇| 国内精品一区二区在线观看| 99久久无色码亚洲精品果冻| 小说图片视频综合网站| 毛片女人毛片| 亚洲国产高清在线一区二区三| 亚洲va在线va天堂va国产| av天堂中文字幕网| 久久国内精品自在自线图片| 日本黄大片高清| 亚洲欧美日韩高清专用| ponron亚洲| 国产真实乱freesex| 亚洲中文字幕一区二区三区有码在线看| 最近手机中文字幕大全| 两个人的视频大全免费| 美女 人体艺术 gogo| 此物有八面人人有两片| 国产视频内射| 3wmmmm亚洲av在线观看| 国产精品永久免费网站| 日韩三级伦理在线观看| 联通29元200g的流量卡| 欧美性猛交黑人性爽| 在线国产一区二区在线| 欧美性感艳星| 国产精品国产高清国产av| 免费人成视频x8x8入口观看| av天堂中文字幕网| 日本欧美国产在线视频| 91午夜精品亚洲一区二区三区| 非洲黑人性xxxx精品又粗又长| 天美传媒精品一区二区| 少妇熟女aⅴ在线视频| а√天堂www在线а√下载| 亚洲最大成人中文| 一区二区三区免费毛片| 国产熟女欧美一区二区| 日韩亚洲欧美综合| 天天躁夜夜躁狠狠久久av| 中文字幕精品亚洲无线码一区| 蜜臀久久99精品久久宅男| 国产日本99.免费观看| 亚洲精品一区av在线观看| 欧美3d第一页| 一区福利在线观看| 国产高清三级在线| 97在线视频观看| 在线国产一区二区在线| 日本爱情动作片www.在线观看 | 国产亚洲精品久久久com| 亚洲一区二区三区色噜噜| 成人性生交大片免费视频hd| 大型黄色视频在线免费观看| 最新在线观看一区二区三区| 一级a爱片免费观看的视频| 亚洲av电影不卡..在线观看| 日日撸夜夜添| 国产探花在线观看一区二区| 九九热线精品视视频播放| 免费av观看视频| 观看美女的网站| 欧美不卡视频在线免费观看| 春色校园在线视频观看| 在线观看66精品国产| 搡老妇女老女人老熟妇| 天堂网av新在线| 国产一区亚洲一区在线观看| 色av中文字幕| 人人妻人人澡欧美一区二区| 99在线视频只有这里精品首页| 亚洲第一区二区三区不卡| av在线播放精品| 欧美绝顶高潮抽搐喷水| 欧美性猛交╳xxx乱大交人| 国产精品人妻久久久久久| 噜噜噜噜噜久久久久久91| 亚洲中文日韩欧美视频| 国产黄a三级三级三级人| 99热这里只有精品一区| 美女大奶头视频| 女人被狂操c到高潮| 男女啪啪激烈高潮av片| 麻豆国产av国片精品| 少妇高潮的动态图| 偷拍熟女少妇极品色| 不卡视频在线观看欧美| 成人无遮挡网站| 永久网站在线| a级毛色黄片| av国产免费在线观看| 日本三级黄在线观看| 国产精品人妻久久久影院| 亚洲人成网站在线观看播放| 一区二区三区四区激情视频 | 久久99热这里只有精品18| 午夜精品一区二区三区免费看| 欧美性猛交黑人性爽| 伊人久久精品亚洲午夜| 成人无遮挡网站| 国产高清视频在线播放一区| 欧美中文日本在线观看视频| 久久精品国产清高在天天线| 午夜视频国产福利| 日本爱情动作片www.在线观看 | 国产麻豆成人av免费视频| 波多野结衣巨乳人妻| 国产私拍福利视频在线观看| 成人鲁丝片一二三区免费| 1000部很黄的大片| 天天躁日日操中文字幕| 国产精品乱码一区二三区的特点| 亚洲国产精品成人综合色| 精品熟女少妇av免费看| 午夜激情福利司机影院| 国内揄拍国产精品人妻在线| 中文字幕久久专区| 欧美一区二区亚洲| 在线观看免费视频日本深夜| 在线免费十八禁| 欧美日本亚洲视频在线播放| 九九爱精品视频在线观看| 欧美精品国产亚洲| 91狼人影院| 18禁在线无遮挡免费观看视频 | 夜夜夜夜夜久久久久| 亚洲欧美成人综合另类久久久 | 久久精品国产亚洲av天美| 免费高清视频大片| 久久精品国产亚洲av涩爱 | 丝袜喷水一区| 久久久久久大精品| 婷婷亚洲欧美| 麻豆成人午夜福利视频| 成人三级黄色视频| 亚洲在线自拍视频| 美女xxoo啪啪120秒动态图| 免费av不卡在线播放| 可以在线观看的亚洲视频| 亚洲国产精品sss在线观看| 午夜久久久久精精品| 精品久久久久久久久av| 日韩国内少妇激情av| 日本一二三区视频观看| 神马国产精品三级电影在线观看| 久久精品国产亚洲av天美| 亚洲内射少妇av| 亚洲欧美日韩东京热| 亚洲精品国产av成人精品 | 日本在线视频免费播放| 精品久久国产蜜桃| 成年版毛片免费区| 国产精品美女特级片免费视频播放器| 搡老岳熟女国产| 亚洲av成人精品一区久久| 最近视频中文字幕2019在线8| 伦理电影大哥的女人| 久久久色成人| 久久热精品热| 99热全是精品| ponron亚洲| 久久精品夜色国产| 国产爱豆传媒在线观看| 最新在线观看一区二区三区| 美女黄网站色视频| 欧美人与善性xxx| 免费观看的影片在线观看| 亚洲乱码一区二区免费版| 国产大屁股一区二区在线视频| 激情 狠狠 欧美| 国产老妇女一区| 久久久久性生活片| 免费电影在线观看免费观看| 在线播放无遮挡| 99riav亚洲国产免费| 国产av在哪里看| 久久久久精品国产欧美久久久| 露出奶头的视频| 小说图片视频综合网站| 99热这里只有是精品在线观看| www.色视频.com| 国产精品不卡视频一区二区| 高清毛片免费观看视频网站| av在线观看视频网站免费| 国产 一区 欧美 日韩| 欧美一区二区亚洲| 国产午夜福利久久久久久| 一级av片app| 国产亚洲91精品色在线| 婷婷亚洲欧美| 美女 人体艺术 gogo| 久久久久久伊人网av| 久久久久免费精品人妻一区二区| 国产精华一区二区三区| 搡老岳熟女国产| 欧美最黄视频在线播放免费| 欧美在线一区亚洲| 国内少妇人妻偷人精品xxx网站| 蜜桃久久精品国产亚洲av| 亚洲无线在线观看| 熟女电影av网| 蜜桃亚洲精品一区二区三区| 精品久久久久久久久av| 欧美最新免费一区二区三区| 中文字幕精品亚洲无线码一区| 亚洲综合色惰| 色5月婷婷丁香| 在现免费观看毛片| 日韩精品有码人妻一区| 看片在线看免费视频| 嫩草影院入口| 人人妻人人澡欧美一区二区| 天堂网av新在线| 91久久精品国产一区二区成人| 久久精品人妻少妇| 中文字幕人妻熟人妻熟丝袜美| 免费大片18禁| 两个人的视频大全免费| 日本三级黄在线观看| 成人漫画全彩无遮挡| 亚洲第一区二区三区不卡| 人妻久久中文字幕网| 国产一区二区在线av高清观看| 免费av不卡在线播放| 色视频www国产| 日日撸夜夜添| 一级毛片aaaaaa免费看小| a级毛片a级免费在线| 日日啪夜夜撸| av女优亚洲男人天堂| 成人毛片a级毛片在线播放| 午夜激情欧美在线| 久久人人精品亚洲av| 特大巨黑吊av在线直播| eeuss影院久久| 欧美高清性xxxxhd video| 亚洲国产精品sss在线观看| 免费黄网站久久成人精品| 成人国产麻豆网| 18禁黄网站禁片免费观看直播| 国产久久久一区二区三区| 亚洲精品色激情综合| 小蜜桃在线观看免费完整版高清| 一个人免费在线观看电影| 三级男女做爰猛烈吃奶摸视频| 99在线视频只有这里精品首页| av中文乱码字幕在线| 成年女人毛片免费观看观看9| 免费av毛片视频| 青春草视频在线免费观看| 欧美一区二区亚洲| 国产精品1区2区在线观看.| 给我免费播放毛片高清在线观看| 久久久久久九九精品二区国产| 内地一区二区视频在线| 免费看美女性在线毛片视频| 老熟妇仑乱视频hdxx|