4.8 Article

A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 9, 期 12, 页码 10108-10120

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3119517

关键词

Authentication; Security; Biometrics (access control); Servers; Public key; Password; Internet of Things; Anonymity; authentication and key agreement (AKA); mobile-edge computing (MEC); mobile user (MU)

资金

  1. National Natural Science Foundation of China [61802445, 61972294, 61932016, 62172307]
  2. Natural Science Foundation of Hubei Province [2019CFB631, 2020CFA052]
  3. Fundamental Research Funds for the Central Universities [CZT20023]
  4. Major Scientific and Technological Innovation Project of Shandong Province [2020CXGC010115]
  5. Special Project on Science and Technology Program of Hubei Provience [2020AEA013]
  6. Wuhan Municipal Science and Technology Project [2020010601012187]
  7. Foundation of Guangxi Key Laboratory of Trusted Software [kx202001]
  8. Cloud Technology Endowed Professorship

向作者/读者索取更多资源

This article focuses on the security and privacy issues in mobile-edge computing (MEC) deployment and revisits an anonymous authentication scheme. It highlights the vulnerabilities in the scheme and presents a redesigned protocol using password and biometrics for authentication. Performance comparison shows that our scheme outperforms competing schemes in terms of computation and communication costs.
Ensuring the security and privacy of users and data in a mobile-edge computing (MEC) deployment, without affecting performance, latency and user quality of experience remain challenging. For example, in this article, we revisit an identity-based anonymous authentication scheme designed for MEC deployment. Then, we reveal that the scheme is vulnerable to impersonation, replay, and Denial-of-Service (DoS) attacks, contrary to their claims. It also does not achieve user untraceability, and the registration center must be online during authentication. We also observe that it is unclear from their scheme description, what encryption algorithm should be used in the authentication process. Therefore, we redesign the scheme in order to mitigate the weaknesses pointed out. Our redesigned protocol uses password and biometrics for authentication, which broadens the scope for real-world implementation. We also provide both formal security proof and heuristic security analysis to demonstrate that the proposed scheme achieves the desired security goals. A performance comparison shows that our scheme outperforms four other competing schemes in terms of computation and communication costs.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据