RAP-MEC: Robust Authentication Protocol for the Mobile Edge Computing Services

被引:0
|
作者
Alotaibi, Faisal Mohammed [1 ]
Maghrabi, Louai A. [2 ]
Tanveer, Muhammad [3 ]
Ahmad, Musheer [4 ]
Naith, Qamar H. [5 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Dept Comp Sci, Riyadh 16278, Saudi Arabia
[2] Univ Business & Technol, Coll Engn, Dept Software Engn, Jeddah, Saudi Arabia
[3] Univ Management & Technol, Sch Syst & Technol SST, Lahore 54770, Pakistan
[4] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[5] Univ Jeddah, Coll Comp Sci & Engn, Dept Software Engn, Jeddah 23218, Saudi Arabia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Protocols; Servers; Security; Authentication; Passwords; Costs; Internet of Things; security; mobile edge computing; session key; SCHEME; INTERNET; ARCHITECTURE; SECURITY;
D O I
10.1109/ACCESS.2024.3438618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of edge computing has revolutionized the landscape of modern applications, offering remarkable advantages such as low-latency and high-bandwidth abilities by decentralizing computation closer to data sources. Despite these advantages, providing secure software regarding communication between users and mobile edge computing (MEC) servers introduces a challenge owing to the sensitive nature of the transmitted data. In response, numerous authentication protocols have been proposed to maintain the reliability of software communication within the MEC environment. In this paper, we introduce RAP-MEC, a novel technique developed to enhance software quality by setting up session key for encrypted communication between users and MEC server. RAP-MEC incorporates functionalities for password change and single sign-on, enabling seamless access to MEC server services. Leveraging physical unclonable functions, symmetric encryption, elliptic curve cryptography, and hash functions, RAP-MEC aims to significantly reduce communication cost [24.85% to 72.73%] and execution time [34.66% to 76.64%]. Through rigorous security analysis, we assess RAP-MEC's resilience against various threats, including DoS, replay, man-in-the-middle, and impersonation attacks. Our findings underscore RAP-MEC's robustness, ensuring the integrity and confidentiality of communications within the MEC environment.
引用
收藏
页码:109673 / 109689
页数:17
相关论文
共 50 条
  • [31] A Survey on Secure Deployment of Mobile Services in Edge Computing
    Cui, Mengmeng
    Fei, Yiming
    Liu, Yin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [32] A Robust and Effective Two-Factor Authentication (2FA) Protocol Based on ECC for Mobile Computing
    Liu, Kaijun
    Zhou, Zhou
    Cao, Qiang
    Xu, Guosheng
    Wang, Chenyu
    Gao, Yuan
    Zeng, Weikai
    Xu, Guoai
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [33] Mobile Edge Computing: An enabler for latency-sensitive mobile services; [Mobile Edge Computing: Ein Enabler für latenzsensitive Mobilfunk-Services]
    Beck M.T.
    Feld S.
    Linnhoff-Popien C.
    Pützschler U.
    [J]. Informatik-Spektrum, 2016, 39 (2) : 108 - 114
  • [34] Mobile Edge Computing: An enabler for latency-sensitive mobile services
    Mobile Edge Computing: Ein Enabler für latenzsensitive Mobilfunk-Services
    [J]. Beck, Michael Till, 1600, Springer Verlag (39):
  • [35] SKAFS: Symmetric Key Authentication Protocol With Forward Secrecy for Edge Computing
    Seifelnasr, Mohamed
    Altawy, Riham
    Youssef, Amr
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01): : 510 - 525
  • [36] A Lightweight Authentication and Inter-cloud Payment Protocol for Edge Computing
    Seifelnasr, Mohamed
    Nakkar, Mouna
    Youssef, Amr
    AlTawy, Riham
    [J]. 2020 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2020,
  • [37] Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing
    Alhassan, Maryam
    Khan, Abdul Raouf
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (02): : 2727 - 2740
  • [38] Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication
    Liao, Run-Fa
    Wen, Hong
    Wu, Jinsong
    Pan, Fei
    Xu, Aidong
    Song, Huanhuan
    Xie, Feiyi
    Jiang, Yixin
    Cao, Minggui
    [J]. IEEE ACCESS, 2019, 7 : 116390 - 116401
  • [39] Lightweight anonymous authentication and key agreement protocols for mobile edge computing
    Zhang Yukun
    Wei Wenxue
    [J]. Peer-to-Peer Networking and Applications, 2022, 15 : 1994 - 2006
  • [40] Lightweight anonymous authentication and key agreement protocols for mobile edge computing
    Zhang Yukun
    Wei Wenxue
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (04) : 1994 - 2006