Identity-Based Edge Computing Anonymous Authentication Protocol

被引:0
|
作者
Kang, Naixin [1 ]
Ning, Zhenhu [1 ]
Zhang, Shiqiang [1 ]
Rehman, Sadaqat Ur [2 ]
Waqas [1 ,3 ]
机构
[1] Beijing Univ Technol, Beijing 100124, Peoples R China
[2] Univ Aberdeen, Dept Nat & Comp Sci, Aberdeen, Scotland
[3] Edith Cowan Univ, Sch Engn, Perth, WA 6027, Australia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 02期
关键词
Identity authentication; anonymous authentication; edge computing;
D O I
10.32604/cmc.2023.029711
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of sensor technology and wireless communication technology, edge computing has a wider range of applications. The privacy protection of edge computing is of great significance. In the edge computing system, in order to ensure the credibility of the source of terminal data, mobile edge computing (MEC) needs to verify the signature of the terminal node on the data. During the signature process, the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance. Therefore, it is very necessary to improve efficiency through computational offloading. Therefore, this paper proposes an identity-based edge computing anonymous authentication protocol. The protocol realizes mutual authentication and obtains a shared key by encrypting the mutual information. The encryption algorithm is implemented through a thresholded identity-based proxy ring signature. When a large number of terminals offload computing, MEC can set the priority of offloading tasks according to the user's identity and permissions, thereby improving offloading efficiency. Security analysis shows that the scheme can guarantee the anonymity and unforgeability of signatures. The probability of a malicious node forging a signature is equivalent to cracking the discrete logarithm puzzle. According to the efficiency analysis, in the case of MEC offloading, the computational complexity is significantly reduced, the computing power of edge devices is liberated, and the signature efficiency is improved.
引用
收藏
页码:3931 / 3943
页数:13
相关论文
共 50 条
  • [1] A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing
    Jia, Xiaoying
    Luo, Min
    Choo, Kim-Kwang Raymond
    Li, Li
    He, Debiao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 10108 - 10120
  • [2] A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Li, Yuting
    Cheng, Qingfeng
    Liu, Ximeng
    Li, Xinghua
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 935 - 946
  • [3] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [4] An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing
    Ma, Yuqian
    Cheng, Qingfeng
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 5604 - 5615
  • [5] On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Shamshad, Salman
    Rana, Minahil
    Mahmood, Khalid
    Khan, Muhammad Khurram
    Obaidat, Mohammad S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (01) : 283 - 292
  • [6] On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Salman Shamshad
    Minahil Rana
    Khalid Mahmood
    Muhammad Khurram Khan
    Mohammad S. Obaidat
    [J]. Wireless Personal Communications, 2022, 124 : 283 - 292
  • [7] A Note on An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing
    Liu, Lihua
    [J]. IEEE Systems Journal, 2024, 18 (04): : 2169 - 2172
  • [8] LIAP: A local identity-based anonymous message authentication protocol in VANETs
    Wang, Shibin
    Yao, Nianmin
    [J]. COMPUTER COMMUNICATIONS, 2017, 112 : 154 - 164
  • [9] Identity-Based Authentication for Cloud Computing
    Li, Hongwei
    Dai, Yuanshun
    Tian, Ling
    Yang, Haomiao
    [J]. CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 157 - 166
  • [10] Identity-based authentication protocol for grid
    Li Hongwei
    [J]. Journal of Systems Engineering and Electronics, 2008, (04) : 860 - 865