LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for N-Times Computing Offloading in IoT

被引:29
|
作者
Wang, Fei [1 ]
Xu, Yongjun [1 ]
Zhu, Liehuang [2 ]
Du, Xiaojiang [3 ]
Guizani, Mohsen [4 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing 100190, Peoples R China
[2] Beijing Inst Technol, Sch Comp Sci, Beijing 100081, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Qatar Univ, Coll Engn, Doha, Qatar
来源
IEEE INTERNET OF THINGS JOURNAL | 2019年 / 6卷 / 03期
基金
中国国家自然科学基金;
关键词
Authentication; computing offloading (CO); Internet of Things (IoT); privacy preserving; EFFICIENT; SECURITY; INTERNET; EDGE;
D O I
10.1109/JIOT.2018.2888636
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays in many application scenarios of Internet of Things (IoT), low latency is achieved at the cost of computing-complexity which is beyond the capabilities of IoT devices. Offloading the computing intensive tasks to more powerful edge devices is expected to provide new generation computing-intensive and delay-sensitive services. In the three hierarchy architecture user/IoT-edge-cloud, private and secure mutual authentication are necessary between user, IoT device, and edge device. However, in the emerging computing paradigms, such as mobile transparent computing, edge computing, fog computing, and several threats, such as edge device compromise, privacy leaking, and denial of service (DoS) might crash the security of the system. Here, we propose a lightweight anonymous mutual authentication scheme for n-times computing offloading (CO) in IoT. In our novel scheme, through a smartcard as token and an edge device as a security proxy, a user is able to subscribe or renew n-times CO service and consume it securely in daily use. Moreover, both IoT and edge devices authenticate each other anonymously without leaking user's sensitive information, which will preserve the privacy even when an edge device is comprised. Finally, our scheme is based on lightweight one-way hash function and MAC function, therefore the adversary is not able to perform a DoS attack. To evaluate the solution, a security analysis and a performance analysis are presented. Compared with similar schemes, our approach achieves all designed security features and achieves a 1.66 x and 2.87x of computing speed on IoT and edge devices, respectably.
引用
收藏
页码:4462 / 4471
页数:10
相关论文
共 50 条
  • [1] Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services
    Gope, Prosanta
    Das, Ashok Kumar
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1764 - 1772
  • [2] Lightweight, Anonymous and Mutual Authentication in IoT Infrastructure
    Janbabaei, Shadi
    Gharaee, Hossein
    Mohammadzadeh, Naser
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 162 - 166
  • [3] LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments
    Hamada, Mariam
    Salem, Sameh A.
    Salem, Fatty M.
    [J]. AIN SHAMS ENGINEERING JOURNAL, 2022, 13 (06)
  • [4] A lightweight and anonymous mutual authentication and key agreement scheme for WBAN
    Marandi, Saba
    Moazami, Farokhlagha
    Malekinezhad, Amir
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (04) : 2555 - 2571
  • [5] A lightweight anonymous mutual authentication and key agreement scheme for WBAN
    Xu, Zisang
    Xu, Cheng
    Chen, Haixian
    Yang, Fang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (14):
  • [6] A lightweight anonymous authentication scheme for secure cloud computing services
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (02): : 1693 - 1713
  • [7] A lightweight anonymous authentication scheme for secure cloud computing services
    Hamza Hammami
    Sadok Ben Yahia
    Mohammad S. Obaidat
    [J]. The Journal of Supercomputing, 2021, 77 : 1693 - 1713
  • [8] Lightweight anonymous and mutual authentication scheme for wireless body area networks
    Attir, Azeddine
    Nait-Abdesselam, Farid
    Faraoun, Kamel Mohamed
    [J]. COMPUTER NETWORKS, 2023, 224
  • [9] Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services
    Olakanmi, Oladayo Olufemi
    Odeyemi, Kehinde
    [J]. COMPUTERS & SECURITY, 2021, 108
  • [10] A Lightweight Mutual Authentication Scheme for Power Edge Computing system
    Chen, Yi
    Xu, Ai-dong
    Wen, Hong
    Jiang, Yi-xin
    Zhang, Teng-yue
    [J]. 2019 INTERNATIONAL CONFERENCE ON ENERGY, POWER, ENVIRONMENT AND COMPUTER APPLICATION (ICEPECA 2019), 2019, 334 : 72 - 76