| Time: 2026-04-28 | Counts: |
LIN F, SUN Y, YANG S Q, et al.A secure and privacy-preserving trust evaluation scheme for RFID-based edge computing services[J].Journal of Henan Polytechnic University(Natural Science) ,2026,45(3):41-48.
doi:10.16186/j.cnki.1673-9787.2024080014
Received:2025/02/10
Revised:2025/04/07
Published:2026/04/28
A secure and privacy-preserving trust evaluation scheme for RFID-based edge computing services
Lin Feng1,2, Sun Yu3, Yang Shiqiang2, Sun Wenjie2, Wang Jian4, Cao Mingsheng5
1.Yunnan Transportation Science Research Institute Co., Ltd., Kunming 650041, Yunnan, China;2.Yunnan Traffic Engineering Quality Inspection Co., Ltd., Kunming 650041, Yunnan, China;3.Yunnan Communications Investment & Constructions Group Co., Ltd. Kunming 650041, Yunnan, China;4.Yunnan Dali Research Institute, Shanghai Jiao Tong University, Dali 671006, Yunnan, China;5.School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 611731, Sichuan, China
Abstract: Objectives In the Internet of Things (IoT), radio frequency identification (RFID), as one of the most key technologies, relies on edge computing services (ECS) to address the limitation of constrained resources. However, due to the diversity, uncertainty, and dynamic nature of quality of service (QoS) in edge computing environments, existing trust management models are vulnerable to security and privacy breaches. Methods A secure and privacy-preserving trust evaluation scheme for RFID-based edge computing services is proposed. The scheme employs the SM3 hash algorithm and SM2 digital signature algorithm to construct a highly reliable data interaction protocol, ensuring the integrity and non-repudiation of evaluation data. In addition, an efficient privacy-preserving trust evaluation method based on non-interactive range zero-knowledge proofs is designed to protect the privacy of QoS monitoring data during usage. Results Extensive experiments demonstrate that the proposed scheme achieves low time and communication overhead. Compared with traditional trust evaluation schemes, it introduces only an additional delay of 100 ms while ensuring data integrity, non-repudiation, and privacy during data interactions. Conclusions The proposed scheme can effectively evaluate the trust levels of edge computing services and ensure data security and privacy during the evaluation process, thereby providing technical support for RFID applications to select reliable services and improving system usability.
Key words:edge computing services;RFID systems;privacy protection;trust evaluation