首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT
【2h】

DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT

机译:物联网中微服务的基于DNS / DANE冲突的分布式和动态身份验证

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

IoT devices provide real-time data to a rich ecosystem of services and applications. The volume of data and the involved subscribeotify signaling will likely become a challenge also for access and core networks. To alleviate the core of the network, other technologies like fog computing can be used. On the security side, designers of IoT low-cost devices and applications often reuse old versions of development frameworks and software components that contain vulnerabilities. Many server applications today are designed using microservice architectures where components are easier to update. Thus, IoT can benefit from deploying microservices in the fog as it offers the required flexibility for the main players of ubiquitous computing: nomadic users. In such deployments, IoT devices need the dynamic instantiation of microservices. IoT microservices require certificates so they can be accessed securely. Thus, every microservice instance may require a newly-created domain name and a certificate. The DNS-based Authentication of Named Entities (DANE) extension to Domain Name System Security Extensions (DNSSEC) allows linking a certificate to a given domain name. Thus, the combination of DNSSEC and DANE provides microservices’ clients with secure information regarding the domain name, IP address, and server certificate of a given microservice. However, IoT microservices may be short-lived since devices can move from one local fog to another, forcing DNSSEC servers to sign zones whenever new changes occur. Considering DNSSEC and DANE were designed to cope with static services, coping with IoT dynamic microservice instantiation can throttle the scalability in the fog. To overcome this limitation, this article proposes a solution that modifies the DNSSEC/DANE signature mechanism using chameleon signatures and defining a new soft delegation scheme. Chameleon signatures are signatures computed over a chameleon hash, which have a property: a secret trapdoor function can be used to compute collisions to the hash. Since the hash is maintained, the signature does not have to be computed again. In the soft delegation schema, DNS servers obtain a trapdoor that allows performing changes in a constrained zone without affecting normal DNS operation. In this way, a server can receive this soft delegation and modify the DNS zone to cope with frequent changes such as microservice dynamic instantiation. Changes in the soft delegated zone are much faster and do not require the intervention of the DNS primary servers of the zone.
机译:物联网设备可为丰富的服务和应用生态系统提供实时数据。数据量以及所涉及的订阅/通知信令也可能成为接入网和核心网的挑战。为了减轻网络的核心,可以使用其他技术,例如雾计算。在安全方面,IoT低成本设备和应用程序的设计人员经常重用包含漏洞的开发框架和软件组件的旧版本。如今,许多服务器应用程序都是使用微服务架构设计的,其中组件更易于更新。因此,物联网可以从雾中部署微服务中受益,因为它为普适计算的主要参与者(游牧用户)提供了所需的灵活性。在这样的部署中,IoT设备需要动态微服务实例化。物联网微服务需要证书,以便可以安全地访问它们。因此,每个微服务实例都可能需要新创建的域名和证书。对域名系统安全扩展(DNSSEC)的基于DNS的命名实体身份验证(DANE)扩展允许将证书链接到给定的域名。因此,DNSSEC和DANE的组合为微服务的客户端提供了有关给定微服务的域名,IP地址和服务器证书的安全信息。但是,物联网微服务的寿命可能很短,因为设备可以从一个本地雾移动到另一个本地雾,从而每当发生新变化时都迫使DNSSEC服务器对区域进行签名。考虑到DNSSEC和DANE被设计为应对静态服务,因此应对IoT动态微服务实例化可以限制雾中的可扩展性。为了克服此限制,本文提出了一种解决方案,该解决方案使用变色龙签名修改了DNSSEC / DANE签名机制,并定义了新的软委托方案。变色龙签名是在变色龙哈希上计算的签名,它具有以下属性:秘密活板门函数可用于计算与哈希的冲突。由于保留了哈希,因此不必再次计算签名。在软委派架构中,DNS服务器获得了一个活板门,该活板门允许在受限区域中执行更改,而不会影响正常的DNS操作。这样,服务器可以接收此软委托并修改DNS区域以应对诸如微服务动态实例化之类的频繁更改。软委派区域中的更改要快得多,并且不需要区域的DNS主服务器的干预。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号