RAP-MEC: Robust Authentication Protocol for the Mobile Edge Computing Services

被引:0
|
作者
Alotaibi, Faisal Mohammed [1 ]
Maghrabi, Louai A. [2 ]
Tanveer, Muhammad [3 ]
Ahmad, Musheer [4 ]
Naith, Qamar H. [5 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Dept Comp Sci, Riyadh 16278, Saudi Arabia
[2] Univ Business & Technol, Coll Engn, Dept Software Engn, Jeddah, Saudi Arabia
[3] Univ Management & Technol, Sch Syst & Technol SST, Lahore 54770, Pakistan
[4] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[5] Univ Jeddah, Coll Comp Sci & Engn, Dept Software Engn, Jeddah 23218, Saudi Arabia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Protocols; Servers; Security; Authentication; Passwords; Costs; Internet of Things; security; mobile edge computing; session key; SCHEME; INTERNET; ARCHITECTURE; SECURITY;
D O I
10.1109/ACCESS.2024.3438618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of edge computing has revolutionized the landscape of modern applications, offering remarkable advantages such as low-latency and high-bandwidth abilities by decentralizing computation closer to data sources. Despite these advantages, providing secure software regarding communication between users and mobile edge computing (MEC) servers introduces a challenge owing to the sensitive nature of the transmitted data. In response, numerous authentication protocols have been proposed to maintain the reliability of software communication within the MEC environment. In this paper, we introduce RAP-MEC, a novel technique developed to enhance software quality by setting up session key for encrypted communication between users and MEC server. RAP-MEC incorporates functionalities for password change and single sign-on, enabling seamless access to MEC server services. Leveraging physical unclonable functions, symmetric encryption, elliptic curve cryptography, and hash functions, RAP-MEC aims to significantly reduce communication cost [24.85% to 72.73%] and execution time [34.66% to 76.64%]. Through rigorous security analysis, we assess RAP-MEC's resilience against various threats, including DoS, replay, man-in-the-middle, and impersonation attacks. Our findings underscore RAP-MEC's robustness, ensuring the integrity and confidentiality of communications within the MEC environment.
引用
收藏
页码:109673 / 109689
页数:17
相关论文
共 50 条
  • [1] A seamless anonymous authentication protocol for mobile edge computing infrastructure
    Mahmood, Khalid
    Ayub, Muhammad Faizan
    Hassan, Syed Zohaib
    Ghaffar, Zahid
    Lv, Zhihan
    Chaudhry, Shehzad Ashraf
    [J]. COMPUTER COMMUNICATIONS, 2022, 186 : 12 - 21
  • [2] An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing
    Ma, Yuqian
    Cheng, Qingfeng
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 5604 - 5615
  • [3] An improved authentication protocol for distributed mobile cloud computing services
    Jannati, Hoda
    Bahrak, Behnam
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2017, 19 : 59 - 67
  • [4] A provably secure lightweight authentication protocol in mobile edge computing environments
    Tsu-Yang Wu
    Qian Meng
    Lei Yang
    Xinglan Guo
    Saru Kumari
    [J]. The Journal of Supercomputing, 2022, 78 : 13893 - 13914
  • [5] A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
    Kaur, Kuljeet
    Garg, Sahil
    Kaddoum, Georges
    Guizani, Mohsen
    Jayakody, Dushantha Nalin K.
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [6] A provably secure lightweight authentication protocol in mobile edge computing environments
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Guo, Xinglan
    Kumari, Saru
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (12): : 13893 - 13914
  • [7] Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services
    Xiong, Ling
    Peng, Daiyuan
    Peng, Tu
    Liang, Hongbin
    [J]. Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2019, 54 (01): : 202 - 210
  • [8] A robust protocol for authentication of mobile users
    El-Fishway, N
    Nofal, M
    Tadros, A
    [J]. 2002 IEEE PROCEEDINGS OF THE NINETEENTH NATIONAL RADIO SCIENCE CONFERENCE, VOLS 1 AND 2, 2002, : 255 - 261
  • [9] Multimodal biometric authentication for mobile edge computing
    Sarier, Neyire Deniz
    [J]. INFORMATION SCIENCES, 2021, 573 : 82 - 99
  • [10] Achieving Deterministic Service in Mobile Edge Computing (MEC) Networks
    Wu, Binwei
    Wang, Jiasen
    Wang, Yanyan
    Tan, Weiqian
    Huang, Yudong
    [J]. 2021 IEEE 29TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2021), 2021,