As a novel communication architecture, mobile edge computing (MEC) not only satisfies customers’ needs in real-time data processing and analysis, but also alleviates the inherent limitations in cloud computing. However,… Click to show full abstract
As a novel communication architecture, mobile edge computing (MEC) not only satisfies customers’ needs in real-time data processing and analysis, but also alleviates the inherent limitations in cloud computing. However, the MEC inherits some security and privacy challenges from cloud computing, most of the existing security solutions in the literature cannot meet the requirements of increasing user experience. To further address the aforementioned issues, in this article, an efficient identity authenticated protocol with provable security and anonymity is created for the MEC. The proposed protocol ensures that users remain anonymous during communication, and its security can be rigorously proved based on the classic complexity assumptions in the random oracle model. The experiment results demonstrate that our scheme enjoys relatively fewer overheads in computation costs. Therefore, our protocol is more suitable for efficient application requirement of identity authentication in the MEC.
               
Click one of the above tabs to view related content.