A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing

被引:71
作者
Li, Yuting [1 ,2 ]
Cheng, Qingfeng [1 ,2 ]
Liu, Ximeng [3 ]
Li, Xinghua [4 ]
机构
[1] Strateg Support Force Informat Engn Univ, Zhengzhou 450001, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[4] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 01期
关键词
Authentication; Edge computing; Computer architecture; Protocols; Computational modeling; Cloud computing; Communication; edge devices; mobile edge computing (MEC); security properties; user anonymity; EFFICIENT;
D O I
10.1109/JSYST.2020.2979006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile edge computing (MEC) provides computing and data storage capabilities within the range of the wireless access network close to the users, which is driving the need for new type of security technologies. Faced with rapid traffic growth and increasing user experience requirements, the existing security schemes can no longer meet the new requirements of real time and lightweight. New solutions that do not require complex calculations, such as identity-based cryptography, attract great attention from researchers. To meet these demands, we design a new authentication architecture for MEC environment, which provides secure and efficient communication. Based on this authentication architecture, an anonymous identity-based scheme is proposed for lightweight devices. In the meantime, user anonymity is also fully protected. The proposed scheme is proved to be secure under a specific security model. In addition, we describe the security properties our scheme meets. The comparisons of time consumption and communicational cost are given at the end of the article, to demonstrate that our scheme performs prior to several previous schemes.
引用
收藏
页码:935 / 946
页数:12
相关论文
共 28 条
[1]   Mobile Edge Computing: A Survey [J].
Abbas, Nasir ;
Zhang, Yan ;
Taherkordi, Amir ;
Skeie, Tor .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :450-465
[2]   Mobile Edge Computing: Opportunities, solutions, and challenges [J].
Ahmed, Ejaz ;
Rehmani, Mubashir Husain .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 70 :59-63
[3]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[4]  
Almajali S, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P58, DOI 10.1109/FMEC.2018.8364045
[5]   Mobile Edge Computing Empowers Internet of Things [J].
Ansari, Nirwan ;
Sun, Xiang .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (03) :604-619
[6]   A secure authenticated and key exchange scheme for fog computing [J].
Chen, Chien-Ming ;
Huang, Yanyu ;
Wang, King-Hang ;
Kumari, Saru ;
Wu, Mu-En .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) :1200-1215
[7]  
Ibrahim Maged Ramada, 2016, International Journal of Network Security, V18, P1089
[8]   Simulation Study of Low Latency Network Architecture Using Mobile Edge Computing [J].
Intharawijitr, Krittin ;
Iida, Katsuyoshi ;
Koga, Hiroyuki .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (05) :963-972
[9]   An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services [J].
Irshad, Azeem ;
Sher, Muhammad ;
Ahmad, Hafiz Farooq ;
Alzahrani, Bander A. ;
Chaudhry, Shehzad Ashraf ;
Kumar, Rahul .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12) :5529-5552
[10]   A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing [J].
Jia, Xiaoying ;
He, Debiao ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
IEEE SYSTEMS JOURNAL, 2020, 14 (01) :560-571