共 50 条
A Secure Batch Authentication Scheme for Multiaccess Edge Computing in 5G-Enabled Intelligent Transportation System
被引:4
|作者:
Kim, Myeonghyun
[1
]
Lee, Joonyoung
[1
]
Oh, Jihyeon
[1
]
Kwon, Deokkyu
[1
]
Park, Kisung
[2
]
Park, Youngho
[1
,3
]
Park, Kil Houm
[1
,3
]
机构:
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Elect & Telecommun Res Inst, Blockchain Technol Res Ctr, Daejeon 34129, South Korea
[3] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
来源:
基金:
新加坡国家研究基金会;
关键词:
Authentication;
Servers;
Security;
Handover;
Privacy;
Wireless communication;
Elliptic curve cryptography;
Edge computing;
Intelligent transportation systems;
Multi-access edge computing;
authentication and key agreement;
intelligent transportation system;
security;
KEY AGREEMENT PROTOCOL;
EFFICIENT;
FRAMEWORK;
VEHICLES;
D O I:
10.1109/ACCESS.2022.3205001
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
With the introduction of 5G technology in the intelligent transportation system (ITS), data bandwidth over communication channel is significantly increased. In the existing cloud-based ITS, a large-scale data is collected, stored, and analyzed to provide precise services to vehicle user, which creates a burden on the cloud service provider that can cause service delays or the inability to provide complex services. Multi-access edge computing (MEC) technology, which extends cloud capabilities to edge servers, is attracting attention in order to reduce the constraint of the cloud-based infrastructure. However, in ITS constructed on MEC, since vehicles exchange information through a wireless communication channel. It is vulnerable to various security attacks. This paper proposes a secure batch authentication scheme for multi-access edge computing in 5G-enabled ITS. The proposed scheme withstands common security attacks including impersonation, replay, man-in-the-middle, physical capture, offline password guessing attacks, and provides secure batch authentication, anonymity and confidentiality. We also consider the vehicle can cross the boundary between MEC servers for continuity of service. We analyze the security of the proposed scheme to show that the proposed scheme is secure against various security attacks, and performance analysis. Lastly, we conduct comparison with other related works.
引用
收藏
页码:96224 / 96238
页数:15
相关论文
相似文献