PSMECS: A provably secure ID-based communication in mobile edge computing

被引:0
作者
Dharminder, Dharminder [1 ]
Mishra, Dheerendra [1 ]
机构
[1] LNM Inst Informat Technol, Dept Math, Jaipur 302031, India
关键词
cloud computing; edge server; mobile edge computing; security; privacy; AWARE AUTHENTICATION SCHEME; PROTOCOL;
D O I
10.1002/dac.4116
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Human-centered systems play an important role in the modern world, for example, driverless car, autonomous and smart vehicles, drones, and robotics. The internet of things environment demands a faster real-time response depending on the applications processed in a particular duration. Mobile edge computing (MEC) allows a user to get a real-time response as compared with cloud computing (CC), although ensuring a number of security attributes in MEC environment remains challenging. In this article, a protocol is designed to achieve mutual authentication, anonymous communication, and security against traceability, as these are very crucial factors to ensure the security of data and user's privacy. Moreover, the proposed scheme ensures mutual authentication between a mobile user and an edge server along with the user's anonymity and untraceability. The proof of security and evaluation of performance of the scheme validates that it ensures security attributes and improves efficiency in terms of communication and computation overheads.
引用
收藏
页数:10
相关论文
共 24 条
[1]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[2]   An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 :133-144
[3]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019
[4]   A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Giri, Debasis ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) :4650-4666
[5]  
[Anonymous], 2018, IEEE T INTELL TRANSP
[6]   A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges [J].
Cao, Xuefei ;
Kou, Weidong ;
Du, Xiaoni .
INFORMATION SCIENCES, 2010, 180 (15) :2895-2903
[7]  
Eun-Jun Yoon, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P633, DOI 10.1109/CSE.2009.363
[8]   Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services [J].
He, Debiao ;
Kumar, Neeraj ;
Khan, Muhammad Khurram ;
Wang, Lina ;
Shen, Jian .
IEEE SYSTEMS JOURNAL, 2018, 12 (02) :1621-1631
[9]   Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Wu, Wei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) :2052-2064
[10]  
Ibrahim Maged Ramada, 2016, International Journal of Network Security, V18, P1089