A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing

被引:30
|
作者
Kaur, Kuljeet [1 ]
Garg, Sahil [1 ]
Kaddoum, Georges [1 ]
Guizani, Mohsen [2 ]
Jayakody, Dushantha Nalin K. [3 ]
机构
[1] Ecole Technol Super, Elect Engn Dept, Montreal, PQ H3C 1K3, Canada
[2] Qatar Univ, Comp Sci & Engn, Doha, Qatar
[3] Natl Res Tomsk Polytech Univ, Sch Comp Sci & Robot, Tomsk, Russia
关键词
Authentication protocol; Elliptic Curve Cryptography; Mobile Edge Computing; Mobile server; Privacy preserving; and Security features; SCHEME; SECURITY;
D O I
10.1109/GLOBECOM38437.2019.9013856
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for realtime data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In this direction, Mobile Edge Computing (MEC) provides seamless services with reduced latency, enhanced mobility, and improved location awareness. Since MEC has evolved from Cloud Computing, it inherited numerous security and privacy issues from the latter. Further, decentralized architectures and diversified deployment environments used in MEC platforms also aggravate the problem; causing great concerns for the research fraternity. Thus, in this paper, we propose an efficient and lightweight mutual authentication protocol for MEC environments; based on Elliptic Curve Cryptography (ECC), one-way hash functions and concatenation operations. The designed protocol also leverages the advantages of discrete logarithm problems, computational Diffi-eHellman, random numbers and time-stamps to resist various attacks namely-impersonation attacks, replay attacks, man-in-the-middle attacks, etc. The paper also presents a comparative assessment of the proposed scheme relative to the current state-of-the-art schemes. The obtained results demonstrate that the proposed scheme incurs relatively less communication and computational overheads, and is appropriate to be adopted in resource constraint MEC environments.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Lightweight Privacy-Preserving Authentication Protocol for VANETs
    Li, Xiong
    Liu, Tian
    Obaidat, Mohammad S.
    Wu, Fan
    Vijayakumar, Pandi
    Kumar, Neeraj
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3547 - 3557
  • [2] Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services
    Xiong, Ling
    Peng, Daiyuan
    Peng, Tu
    Liang, Hongbin
    [J]. Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2019, 54 (01): : 202 - 210
  • [3] Lightweight Privacy-Preserving Equality Query in Edge Computing
    Wu, Qiyu
    Zhou, Fucai
    Xu, Jian
    Feng, Da
    Li, Bao
    [J]. IEEE ACCESS, 2019, 7 : 182588 - 182599
  • [4] Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing
    Ma, Zhuoran
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Yang, Ruikang
    Wang, Xiangyu
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (03) : 1606 - 1618
  • [5] A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems
    Fan, Xinxin
    Gong, Guang
    Engels, Daniel W.
    Smith, Eric M.
    [J]. 2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, : 1083 - 1087
  • [6] A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment
    Xie, Qingyun
    Ding, Zixuan
    Xie, Qi
    [J]. MATHEMATICS, 2023, 11 (18)
  • [7] An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing
    Ji, Sai
    Yuan, Yang
    Shen, Jian
    Lai, Chin-Feng
    Chen, Bofan
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (03): : 437 - 448
  • [8] An Ultralightweight and Privacy-Preserving Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Li, Hui
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1864 - 1869
  • [9] Collusion-resistant, Lightweight and Privacy-preserving Authentication Protocol for IoV
    Lalouani, Wassila
    Younis, Mohamed
    [J]. 2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [10] Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing
    Yin, Jiaqi
    Zhu, Huibiao
    Fei, Yuan
    [J]. MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06): : 2258 - 2271