A provably secure lightweight authentication protocol in mobile edge computing environments

被引:0
|
作者
Tsu-Yang Wu
Qian Meng
Lei Yang
Xinglan Guo
Saru Kumari
机构
[1] Shandong University of Science and Technology,College of Computer Science and Engineering
[2] Chaudhary Charan Singh University,Department of Mathematics
来源
关键词
Mobile edge computing; Authentication; Security; User anonymity;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile edge computing can meet the needs of users in real time by pushing cloud resources, such as computing, network, and storage, to the edge of a mobile network. Although mobile edge technology has brought many conveniences to mobile services, many security problems, such as mutual authentication between mobile users and servers, and the impersonation of mobile users or servers, have not been properly solved. In this paper, we propose a lightweight and secure authentication protocol to solve such security problems. We conducted a formal security analysis of our protocol using ProVerif and the Real-or-Random model to prove its correctness and security, and even if the registration center is attacked, our protocol is still secure. At the end of this paper, by comparing the communication and computing costs with other existing protocols, we prove the security and efficiency of our protocol.
引用
收藏
页码:13893 / 13914
页数:21
相关论文
共 50 条
  • [1] A provably secure lightweight authentication protocol in mobile edge computing environments
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Guo, Xinglan
    Kumari, Saru
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (12): : 13893 - 13914
  • [2] A Provably Secure, Lightweight Protocol for Anonymous Authentication
    Katz, Jonathan
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 271 - 288
  • [3] Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments
    Lee, Hakjun
    Ryu, Jihyeon
    Won, Dongho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5798 - 5815
  • [4] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE ACCESS, 2017, 5 : 25808 - 25825
  • [5] A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
    Kaur, Kuljeet
    Garg, Sahil
    Kaddoum, Georges
    Guizani, Mohsen
    Jayakody, Dushantha Nalin K.
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [6] Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs
    Yang, Xu
    Yi, Xun
    Khalil, Ibrahim
    Luo, Junwei
    Bertino, Elisa
    Nepal, Surya
    Huang, Xinyi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) : 12563 - 12572
  • [7] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [8] Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
    Moon, Jongho
    Lee, Youngsook
    Kim, Jiye
    Won, Dongho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [9] Secure and Lightweight Authentication Protocol for Mobile RFID Privacy
    Lee, Hyeong-Chan
    Eom, TaeYang
    Yi, Jeong Hyun
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 421 - 426
  • [10] Active attack against HB+:: a provably secure lightweight authentication protocol
    Gilbert, H
    Robshaw, M
    Sibert, H
    [J]. ELECTRONICS LETTERS, 2005, 41 (21) : 1169 - 1170