• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

物联网中基于DNS/DANE冲突的微服务分布式动态认证

DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT .

作者信息

Díaz-Sánchez Daniel, Marín-Lopez Andrés, Almenárez Mendoza Florina, Arias Cabarcos Patricia

机构信息

University Carlos III de Madrid, 28911 Leganés, Spain.

University of Mannheim, 68161 Mannheim, Germany.

出版信息

Sensors (Basel). 2019 Jul 26;19(15):3292. doi: 10.3390/s19153292.

DOI:10.3390/s19153292
PMID:31357487
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6695896/
Abstract

IoT devices provide real-time data to a rich ecosystem of services and applications. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core networks. To alleviate the core of the network, other technologies like fog computing can be used. On the security side, designers of IoT low-cost devices and applications often reuse old versions of development frameworks and software components that contain vulnerabilities. Many server applications today are designed using microservice architectures where components are easier to update. Thus, IoT can benefit from deploying microservices in the fog as it offers the required flexibility for the main players of ubiquitous computing: nomadic users. In such deployments, IoT devices need the dynamic instantiation of microservices. IoT microservices require certificates so they can be accessed securely. Thus, every microservice instance may require a newly-created domain name and a certificate. The DNS-based Authentication of Named Entities (DANE) extension to Domain Name System Security Extensions (DNSSEC) allows linking a certificate to a given domain name. Thus, the combination of DNSSEC and DANE provides microservices' clients with secure information regarding the domain name, IP address, and server certificate of a given microservice. However, IoT microservices may be short-lived since devices can move from one local fog to another, forcing DNSSEC servers to sign zones whenever new changes occur. Considering DNSSEC and DANE were designed to cope with static services, coping with IoT dynamic microservice instantiation can throttle the scalability in the fog. To overcome this limitation, this article proposes a solution that modifies the DNSSEC/DANE signature mechanism using chameleon signatures and defining a new soft delegation scheme. Chameleon signatures are signatures computed over a chameleon hash, which have a property: a secret trapdoor function can be used to compute collisions to the hash. Since the hash is maintained, the signature does not have to be computed again. In the soft delegation schema, DNS servers obtain a trapdoor that allows performing changes in a constrained zone without affecting normal DNS operation. In this way, a server can receive this soft delegation and modify the DNS zone to cope with frequent changes such as microservice dynamic instantiation. Changes in the soft delegated zone are much faster and do not require the intervention of the DNS primary servers of the zone.

摘要

物联网设备为丰富的服务和应用生态系统提供实时数据。数据量以及所涉及的订阅/通知信令对于接入网和核心网来说可能也会成为一项挑战。为了减轻网络核心的负担,可以使用雾计算等其他技术。在安全方面,物联网低成本设备和应用的设计者常常重复使用包含漏洞的旧版本开发框架和软件组件。如今许多服务器应用是使用微服务架构设计的,其中组件更易于更新。因此,物联网可以从在雾中部署微服务中受益,因为它为普适计算的主要参与者——游牧用户提供了所需的灵活性。在这种部署中,物联网设备需要微服务的动态实例化。物联网微服务需要证书以便能够被安全访问。因此,每个微服务实例可能都需要一个新创建的域名和一个证书。域名系统安全扩展(DNSSEC)的基于域名的命名实体认证(DANE)扩展允许将证书链接到给定的域名。这样,DNSSEC和DANE的组合为微服务的客户端提供了有关给定微服务的域名、IP地址和服务器证书的安全信息。然而,物联网微服务可能是短暂存在的,因为设备可能从一个本地雾转移到另一个本地雾,这迫使DNSSEC服务器每当有新变化发生时就得对区域进行签名。考虑到DNSSEC和DANE是设计用于应对静态服务的,应对物联网动态微服务实例化可能会限制雾中的可扩展性。为了克服这一限制,本文提出了一种解决方案,即使用变色龙签名修改DNSSEC/DANE签名机制并定义一种新的软委托方案。变色龙签名是在变色龙哈希上计算的签名,它具有一个特性:可以使用一个秘密陷门函数来计算与该哈希的碰撞。由于哈希得以保留,签名就不必再次计算。在软委托模式中,DNS服务器获得一个陷门,该陷门允许在受限区域内进行更改而不影响正常的DNS操作。通过这种方式,一台服务器可以接收此软委托并修改DNS区域以应对诸如微服务动态实例化之类的频繁变化。软委托区域中的更改要快得多,并且不需要该区域的DNS主服务器进行干预。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/20bd4b09f52b/sensors-19-03292-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/adf61cb5a0a4/sensors-19-03292-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/b32425d1acad/sensors-19-03292-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/1fd83c8da2f8/sensors-19-03292-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/0c70d0d759d5/sensors-19-03292-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/69e7c2ac1ac1/sensors-19-03292-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/49877e599062/sensors-19-03292-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/fe7825221fcf/sensors-19-03292-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/20bd4b09f52b/sensors-19-03292-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/adf61cb5a0a4/sensors-19-03292-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/b32425d1acad/sensors-19-03292-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/1fd83c8da2f8/sensors-19-03292-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/0c70d0d759d5/sensors-19-03292-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/69e7c2ac1ac1/sensors-19-03292-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/49877e599062/sensors-19-03292-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/fe7825221fcf/sensors-19-03292-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/062b/6695896/20bd4b09f52b/sensors-19-03292-g008.jpg

相似文献

1
DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT .物联网中基于DNS/DANE冲突的微服务分布式动态认证
Sensors (Basel). 2019 Jul 26;19(15):3292. doi: 10.3390/s19153292.
2
Microservice Security Agent Based On API Gateway in Edge Computing.基于 API 网关的边缘计算中微服务安全代理。
Sensors (Basel). 2019 Nov 10;19(22):4905. doi: 10.3390/s19224905.
3
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge.哈希链雾/边缘:一种基于模式的哈希链,用于在雾/边缘中使用零知识证明的安全相互认证协议。
Sensors (Basel). 2022 Jan 13;22(2):607. doi: 10.3390/s22020607.
4
BMDD: a novel approach for IoT platform (broker-less and microservice architecture, decentralized identity, and dynamic transmission messages).BMDD:物联网平台的一种新方法(无代理和微服务架构、去中心化身份以及动态传输消息)。
PeerJ Comput Sci. 2022 Apr 22;8:e950. doi: 10.7717/peerj-cs.950. eCollection 2022.
5
Relevant Cybersecurity Aspects of IoT Microservices Architectures Deployed over Next-Generation Mobile Networks.物联网微服务架构在下一代移动网络上部署的相关网络安全方面。
Sensors (Basel). 2022 Dec 24;23(1):189. doi: 10.3390/s23010189.
6
Enabling secure mutual authentication and storage checking in cloud-assisted IoT.在云辅助物联网中实现安全的相互认证和存储检查。
Math Biosci Eng. 2022 Aug 2;19(11):11034-11046. doi: 10.3934/mbe.2022514.
7
Smart Containers Schedulers for Microservices Provision in Cloud-Fog-IoT Networks. Challenges and Opportunities.智能容器调度器在云雾物联网网络中提供微服务。挑战和机遇。
Sensors (Basel). 2020 Mar 19;20(6):1714. doi: 10.3390/s20061714.
8
An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things.一种基于物联网哈希函数组合器的有效多因素认证机制。
Sensors (Basel). 2019 Aug 23;19(17):3663. doi: 10.3390/s19173663.
9
Microservice-Oriented Platform for Internet of Big Data Analytics: A Proof of Concept.面向大数据分析的互联网的微服务平台:概念验证。
Sensors (Basel). 2019 Mar 6;19(5):1134. doi: 10.3390/s19051134.
10
IRRISENS: An IoT Platform Based on Microservices Applied in Commercial-Scale Crops Working in a Multi-Cloud Environment.IRRISENS:一个基于微服务的物联网平台,应用于多云计算环境中的商业规模作物。
Sensors (Basel). 2020 Dec 14;20(24):7163. doi: 10.3390/s20247163.

引用本文的文献

1
Exploring the Potential of Microservices in Internet of Things: A Systematic Review of Security and Prospects.探索微服务在物联网中的潜力:安全与前景的系统综述
Sensors (Basel). 2024 Oct 21;24(20):6771. doi: 10.3390/s24206771.
2
Microservice security: a systematic literature review.微服务安全:一项系统的文献综述。
PeerJ Comput Sci. 2022 Jan 5;8:e779. doi: 10.7717/peerj-cs.779. eCollection 2022.
3
MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices.MUP:借助MQTT简化受限物联网设备的安全空中更新

本文引用的文献

1
A Survey on Wireless Body Area Networks for eHealthcare Systems in Residential Environments.针对住宅环境中电子医疗保健系统的无线体域网调查。
Sensors (Basel). 2016 Jun 7;16(6):831. doi: 10.3390/s16060831.
2
Computing: secure the internet.计算:保障互联网安全。
Nature. 2012 Nov 15;491(7424):325-6. doi: 10.1038/491325a.
Sensors (Basel). 2020 Dec 22;21(1):10. doi: 10.3390/s21010010.
4
Ubiquitous Computing and Ambient Intelligence-UCAmI.无处不在的计算和环境智能-UCAMI。
Sensors (Basel). 2019 Sep 19;19(18):4034. doi: 10.3390/s19184034.