An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment

被引:24
|
作者
Huang, Haiping [1 ]
Wu, Yuhan [1 ]
Xiao, Fu [1 ]
Malekian, Reza [2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Peoples R China
[2] Malmo Univ, Dept Comp Sci & Media Technol, S-21119 Malmo, Sweden
[3] Univ Pretoria, Dept Elect Elect & Comp Engn, ZA-0028 Pretoria, South Africa
基金
中国国家自然科学基金;
关键词
Security; Internet of Things; Authentication; Edge computing; Cryptography; Computer architecture; Pollution; Batch verification; certificateless signature; Internet of Things (IoT); mobile edge computing (MEC); named data networking (NDN); NAMED DATA NETWORKING; SECURITY; INTERNET; ATTACK;
D O I
10.1109/TCSS.2021.3076209
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Named data networking (NDN) is an emerging information-centric networking paradigm, in which the Internet of Things (IoT) achieves excellent scalability. Recent literature proposes the concept of NDN-IoT, which maximizes the expansion of IoT applications by deploying NDN in the IoT. In the NDN, the security is built into the network by embedding a public signature in each data package to verify the authenticity and integrity of the content. However, signature schemes in the NDN-IoT environment are facing several challenges, such as signing security challenge for resource-constrained IoT end devices (EDs) and verification efficiency challenge for NDN routers. This article mainly studies the data package authentication scheme in the package-level security mechanism. Based on mobile edge computing (MEC), an efficient certificateless group signature scheme featured with anonymity, unforgeability, traceability, and key escrow resilience is proposed. The regional and edge architecture is utilized to solve the device management problem of IoT, reducing the risks of content pollution attacks from the data source. By offloading signature pressure to MEC servers, the contradiction between heavy overhead and shortage of ED resources is avoided. Moreover, the verification efficiency in NDN router is much improved via batch verification in the proposed scheme. Both security analysis and experimental simulations show that the proposed MEC-based certificateless group signature scheme is provably secure and practical.
引用
收藏
页码:1108 / 1120
页数:13
相关论文
共 50 条
  • [1] An anonymous and efficient certificateless signature scheme based on blockchain in NDN-IoT environments
    Wang, Cong
    Deng, Xu
    Ma, Maode
    Li, Qiang
    Bai, Hongpeng
    Zhang, Yanan
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04):
  • [2] RETRACTED: Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment (Retracted Article)
    Sun, Jianzhao
    [J]. JOURNAL OF FUNCTION SPACES, 2022, 2022
  • [4] An Efficient Software Defined Data Transmission Scheme based on Mobile Edge Computing for the Massive IoT Environment
    Kim, EunGyeong
    Kim, Seokhoon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 974 - 987
  • [5] NDN-based IoT with Edge computing
    Wang, Xiaonan
    Wang, Xingwei
    Li, Yanli
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 : 397 - 405
  • [6] Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing
    Zhang, Jianhong
    Bai, Wenle
    Wang, Yuehai
    [J]. IEEE ACCESS, 2019, 7 : 37865 - 37875
  • [7] Power Efficient Clustering Scheme for 5G Mobile Edge Computing Environment
    Jaewon Ahn
    Joohyung Lee
    Sangdon Park
    Hong-Shik Park
    [J]. Mobile Networks and Applications, 2019, 24 : 643 - 652
  • [8] Efficient Task Offloading Scheme of Body Area Networks in Mobile Edge Computing Environment
    Zhu, Changhong
    Liao, Dongsen
    Yu, Qiqi
    Ren, Junyu
    Wan, Haibin
    Qin, Tuanfa
    [J]. Computer Engineering and Applications, 2023, 59 (16) : 248 - 255
  • [9] Power Efficient Clustering Scheme for 5G Mobile Edge Computing Environment
    Ahn, Jaewon
    Lee, Joohyung
    Park, Sangdon
    Park, Hong-Shik
    [J]. MOBILE NETWORKS & APPLICATIONS, 2019, 24 (02): : 643 - 652
  • [10] A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing
    Junwei Yan
    Tao Jiang
    Liwei Lin
    Zhengyu Wu
    Xiucai Ye
    Mengke Tian
    Yong Wang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2023