A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing

被引:15
|
作者
Jia, Xiaoying [1 ]
Luo, Min [2 ,3 ]
Choo, Kim-Kwang Raymond [4 ,5 ]
Li, Li [2 ]
He, Debiao [2 ,3 ]
机构
[1] South Cent Univ Nationalities, Sch Math & Stat, Wuhan 430074, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[5] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2022年 / 9卷 / 12期
基金
中国国家自然科学基金;
关键词
Authentication; Security; Biometrics (access control); Servers; Public key; Password; Internet of Things; Anonymity; authentication and key agreement (AKA); mobile-edge computing (MEC); mobile user (MU); SECURE;
D O I
10.1109/JIOT.2021.3119517
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring the security and privacy of users and data in a mobile-edge computing (MEC) deployment, without affecting performance, latency and user quality of experience remain challenging. For example, in this article, we revisit an identity-based anonymous authentication scheme designed for MEC deployment. Then, we reveal that the scheme is vulnerable to impersonation, replay, and Denial-of-Service (DoS) attacks, contrary to their claims. It also does not achieve user untraceability, and the registration center must be online during authentication. We also observe that it is unclear from their scheme description, what encryption algorithm should be used in the authentication process. Therefore, we redesign the scheme in order to mitigate the weaknesses pointed out. Our redesigned protocol uses password and biometrics for authentication, which broadens the scope for real-world implementation. We also provide both formal security proof and heuristic security analysis to demonstrate that the proposed scheme achieves the desired security goals. A performance comparison shows that our scheme outperforms four other competing schemes in terms of computation and communication costs.
引用
收藏
页码:10108 / 10120
页数:13
相关论文
共 50 条
  • [1] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [2] A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Li, Yuting
    Cheng, Qingfeng
    Liu, Ximeng
    Li, Xinghua
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 935 - 946
  • [3] On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Shamshad, Salman
    Rana, Minahil
    Mahmood, Khalid
    Khan, Muhammad Khurram
    Obaidat, Mohammad S.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (01) : 283 - 292
  • [4] On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Salman Shamshad
    Minahil Rana
    Khalid Mahmood
    Muhammad Khurram Khan
    Mohammad S. Obaidat
    Wireless Personal Communications, 2022, 124 : 283 - 292
  • [5] Identity-Based Edge Computing Anonymous Authentication Protocol
    Kang, Naixin
    Ning, Zhenhu
    Zhang, Shiqiang
    Rehman, Sadaqat Ur
    Waqas
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 3931 - 3943
  • [6] Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing
    Zhu, Qiang
    You, Lin
    Hu, Gengran
    Wang, Shengguo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 33604 - 33623
  • [7] An Identity-Based Authentication Scheme With Full Anonymity and Unlinkability for Mobile Edge Computing
    Tian, Junfeng
    Wang, Yiting
    Shen, Yue
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 23561 - 23576
  • [8] A Group Signature and Authentication Scheme for Blockchain-Based Mobile-Edge Computing
    Zhang, Shijie
    Lee, Jong-Hyouk
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) : 4557 - 4565
  • [9] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [10] An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing
    Ma, Yuqian
    Cheng, Qingfeng
    IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 5604 - 5615