Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments

被引:6
|
作者
Lee, Hakjun [1 ]
Ryu, Jihyeon [2 ]
Won, Dongho [3 ]
机构
[1] Kyungnam Univ, Dept Comp Engn, Chang Won 631701, Gyeongsangnam, South Korea
[2] Kwangwoon Univ, Sch Comp & Informat Engn, Seoul 01897, South Korea
[3] Sungkyunkwan Univ, Dept Comp Sci & Engn, Suwon 16419, Gyeonggi, South Korea
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 04期
基金
新加坡国家研究基金会;
关键词
Authentication; Security; Servers; Cloud computing; Internet of Things; Cryptography; Protocols; Internet of Things (IoT); key agreement; mobile edge computing (MEC); PROTOCOL; INTERNET;
D O I
10.1109/JIOT.2023.3308568
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is progressively being integrated into everyday life, with cloud computing systems being widely employed to monitor and manage IoT devices. Cloud servers offer centralized high-performance processing of large-scale data utilizing millions of connected sensors and geographically distributed devices. Distributed data processing with low latency is important for autonomous driving, healthcare, virtual reality, and augmented reality in cloud services based on 5G technology. mobile edge computing (MEC) infrastructure enables cloud services at the edge of the network in a 5G ecosystem, allowing for real-time processing of large amounts of data. MEC involves an open infrastructure that allows for access by heterogeneous devices, increasing the complexity of security challenge. This, in turn, brings the potential risk of attacks that could result in information leakage and compromise the privacy of users. In extreme cases, attacks may even pose a risk to human life. Thus, an effective authentication mechanism is required to prevent attacks and protect privacy in MEC environments. To address this issue, we propose a secure and anonymous authentication scheme that enhances security in MEC environments. In the proposed scheme, the user and MEC server establish a secure session key without the need of a trusted third party. The proposed scheme is designed to be secure from various known attacks attempted by internal and external adversaries. We have conducted both formal and informal analyses to prove the security of the proposed scheme and compared its performance with related schemes to validate its effectiveness and practical application.
引用
收藏
页码:5798 / 5815
页数:18
相关论文
共 50 条
  • [1] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [2] A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Li, Yuting
    Cheng, Qingfeng
    Liu, Ximeng
    Li, Xinghua
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 935 - 946
  • [3] On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Shamshad, Salman
    Rana, Minahil
    Mahmood, Khalid
    Khan, Muhammad Khurram
    Obaidat, Mohammad S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (01) : 283 - 292
  • [4] On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Salman Shamshad
    Minahil Rana
    Khalid Mahmood
    Muhammad Khurram Khan
    Mohammad S. Obaidat
    [J]. Wireless Personal Communications, 2022, 124 : 283 - 292
  • [5] Seamless secure anonymous authentication for cloud-based mobile edge computing
    Deebak, B. D.
    Al-Turjman, Fadi
    Mostarda, Leonardo
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 87
  • [6] A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Giri, Debasis
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4650 - 4666
  • [7] A provably secure lightweight authentication protocol in mobile edge computing environments
    Tsu-Yang Wu
    Qian Meng
    Lei Yang
    Xinglan Guo
    Saru Kumari
    [J]. The Journal of Supercomputing, 2022, 78 : 13893 - 13914
  • [8] A provably secure lightweight authentication protocol in mobile edge computing environments
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Guo, Xinglan
    Kumari, Saru
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (12): : 13893 - 13914
  • [9] An anonymous and provably secure authentication scheme for mobile user
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1529 - 1544
  • [10] A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing
    Jia, Xiaoying
    Luo, Min
    Choo, Kim-Kwang Raymond
    Li, Li
    He, Debiao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 10108 - 10120