A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party

被引:22
|
作者
Mishra, Dheerendra [1 ]
Dharminder, Dharminder [2 ]
Yadav, Preeti [3 ]
Rao, Y. Sreenivasa [4 ]
Vijayakumar, Pandi [5 ]
Kumar, Neeraj [6 ,7 ,8 ]
机构
[1] Maulana Azad Natl Inst Technol, Dept Math, Bhopal, India
[2] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Math, Chennai Campus, Chennai, Tamil Nadu, India
[3] LNM Inst Informat Technol, Dept Math, Jaipur, Rajasthan, India
[4] Natl Inst Technol Warangal, Dept Math, Warangal, Andhra Pradesh, India
[5] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Villupuram, India
[6] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala, Punjab, India
[7] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun, Uttarakhand, India
[8] Asia Univ, Dept Comp Sci & Informat Sci, Taichung, Taiwan
关键词
Edge computing; Mobile edge computing; Elliptic curve cryptography; Key agreement; Security; Privacy; SCHEME; PROTOCOL;
D O I
10.1016/j.jisa.2020.102648
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Edge Computing (MEC) is an emergent paradigm that brings computation, storage, and network resources close to mobile users. It allows applications to execute near the user, which are delay-sensitive and content-aware. Since the MEC systems comprise distributed edge devices managed by self-governing people, they are more liable to security and privacy threats. Therefore, acure and efficient authentication mechanism is required for MEC. In this paper, we construct a mutual authentication and key agreement scheme without the involvement of a trusted third party for MEC, which ensures mutual authentication between a user and edge servers and generates a secure session key. This scheme achieves important security attributes such as secure communication, user anonymity in mutual authentication and session key agreement. The performance analysis of the proposed protocol indicates better efficiency. Moreover, we prove the security of the protocol in the random oracle model and simulate the protocols using AVISPA simulator. The analysis of security shows that the proposed protocol is safe against known attacks.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] An efficient and provably secure authenticated key agreement scheme for mobile edge computing
    Rakeei, Mohammadamin
    Moazami, Farokhlagha
    [J]. WIRELESS NETWORKS, 2022, 28 (07) : 2983 - 2999
  • [2] An efficient and provably secure authenticated key agreement scheme for mobile edge computing
    Mohammadamin Rakeei
    Farokhlagha Moazami
    [J]. Wireless Networks, 2022, 28 : 2983 - 2999
  • [3] PSMECS: A provably secure ID-based communication in mobile edge computing
    Dharminder, Dharminder
    Mishra, Dheerendra
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (12)
  • [4] Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision
    Abbasinezhad-Mood, Dariush
    Mazinani, Sayyed Majid
    Nikooghadam, Morteza
    Ostad-Sharif, Arezou
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1227 - 1238
  • [5] A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow
    Hou, Mengbo
    Xu, Qiuliang
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 487 - 490
  • [6] ID-Based Authenticated Dynamic Group Key Agreement
    王莺洁
    潘军
    诸鸿文
    [J]. Journal of Shanghai Jiaotong University(Science), 2005, (03) : 236 - 241
  • [7] Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments
    Liu, Chao-Liang
    Tsai, Wang-Jui
    Chang, Ting-Yi
    Liu, Ta-Ming
    [J]. SYMMETRY-BASEL, 2018, 10 (04):
  • [8] A Dynamic ID-based Authenticated Group Key Agreement Protocol
    Zheng, Jun
    Yang, Cheng
    Xue, Jinrong
    Zhang, Can
    [J]. PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1079 - 1084
  • [9] Provably Secure ID-Based Signature without Trusted PKG for Smart Grid
    Peng, Wei
    Bai, Xia
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 517 - 520
  • [10] A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles
    田海博
    Willy Susilo
    明洋
    王育民
    [J]. Journal of Computer Science & Technology, 2008, (05) : 832 - 842