LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing

Photo from wikipedia

As a novel communication architecture, mobile edge computing (MEC) not only satisfies customers’ needs in real-time data processing and analysis, but also alleviates the inherent limitations in cloud computing. However,… Click to show full abstract

As a novel communication architecture, mobile edge computing (MEC) not only satisfies customers’ needs in real-time data processing and analysis, but also alleviates the inherent limitations in cloud computing. However, the MEC inherits some security and privacy challenges from cloud computing, most of the existing security solutions in the literature cannot meet the requirements of increasing user experience. To further address the aforementioned issues, in this article, an efficient identity authenticated protocol with provable security and anonymity is created for the MEC. The proposed protocol ensures that users remain anonymous during communication, and its security can be rigorously proved based on the classic complexity assumptions in the random oracle model. The experiment results demonstrate that our scheme enjoys relatively fewer overheads in computation costs. Therefore, our protocol is more suitable for efficient application requirement of identity authentication in the MEC.

Keywords: mobile edge; provable security; identity; efficient identity; security; edge computing

Journal Title: IEEE Systems Journal
Year Published: 2023

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.