A Privacy-Preserved E2E Authenticated Key Exchange Protocol for Multi-Server Architecture in Edge Computing Networks

被引:15
作者
Hsu, Chien-Lung [1 ,2 ,3 ,4 ,5 ]
Tuan-Vinh Le [2 ]
Lu, Chung-Fu [6 ]
Lin, Tzu-Wei [2 ]
Chuang, Tzu-Hsien [1 ]
机构
[1] Chang Gung Univ, Dept Informat Management, Taoyuan 33302, Taiwan
[2] Chang Gung Univ, Grad Inst Business & Management, Taoyuan 33302, Taiwan
[3] Chang Gung Univ, Hlth Aging Res Ctr, Taoyuan 33302, Taiwan
[4] Ming Chi Univ Technol, Dept Visual Commun Design, Taoyuan 24301, Taiwan
[5] Taoyuan Chang Gung Mem Hosp, Dept Nursing, Taoyuan 33044, Taiwan
[6] Chihlee Univ Technol, Dept Informat Management, New Taipei 24243, Taiwan
关键词
Edge computing; Protocols; Servers; Authentication; Computer architecture; Smart cards; Password; IoT; end-to-end; privacy protection; password-based; key exchange; ROAMING SERVICE; ACCESS-CONTROL; SMART CARDS; SCHEME; SECURE; EFFICIENT; INTERNET; ATTACK;
D O I
10.1109/ACCESS.2020.2976431
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing has played an important role in enabling 5G technology which supports a great number of connected narrow-band IoT devices. In an edge computing architecture enabled with global mobile network, edge or IoT devices are wirelessly connected to the edge of the network. Data acquisition and processing will be handled at or close to the edge of the network in a distributed way. Since edge computing is a heterogeneous distributed interactive system with multiple domains and entities, it might suffer from potential attacks and threats. To provide a trusted edge computing, there must have a robust scheme that allows all participants to mutually authenticate in a secure and privacy-preserved way. With the rapid development of IoT technologies, mobile networks and edge computing architecture, single server has been unable to meet the needs of users. In this paper, we propose a privacy-preserved end-to-end password-based authenticated key exchange protocol for multi-server architecture in edge computing networks. Our protocol allows an end user to use an easy-to-remember password to login to the server, then through foreign agent compute a shared key with another end user for specific use of services. The proposed protocol provides strong user anonymity during communication process. Besides, the proposed protocol is proved to be secure using BAN logic and AVISPA tool. Furthermore, performance analysis shows that the proposed protocol gains stronger security and better computational efficiency. Providing lightweight computation with short key size of ECC, our work is a solution to lower latency and improve efficiency in edge computing networks.
引用
收藏
页码:40791 / 40808
页数:18
相关论文
共 38 条
[1]  
Adams C., 2005, ENCY CRYPTOGRAPHY SE, P286
[2]   Design Considerations for a 5G Network Architecture [J].
Agyapong, Patrick Kwadwo ;
Iwamura, Mikio ;
Staehle, Dirk ;
Kiess, Wolfgang ;
Benjebbour, Anass .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (11) :65-75
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], [No title captured]
[5]  
[Anonymous], [No title captured], DOI [10.12785/amis/090156, DOI 10.12785/amis/090156]
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], [No title captured]
[8]   Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution [J].
Aslan, HK .
COMPUTERS & SECURITY, 2004, 23 (04) :290-299
[9]   Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Kumar, Neeraj ;
Park, Youngho ;
Tanwar, Sudeep .
IEEE ACCESS, 2018, 6 :20673-20693
[10]   A PUF-based mutual authentication scheme for Cloud-Edges IoT systems [J].
Barbareschi, Mario ;
De Benedictis, Alessandra ;
La Montagna, Erasmo ;
Mazzeo, Antonino ;
Mazzocca, Nicola .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 :246-261