A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing

Бібліографічні деталі
Parent link:IEEE Global Communications Conference (GLOBECOM 20192019): proceedings, Waikoloa, HI, USA, December 9-13, 2019. [6 p.].— , 2019
Співавтор: Национальный исследовательский Томский политехнический университет Инженерная школа информационных технологий и робототехники Научно-образовательный центр "Автоматизация и информационные технологии"
Інші автори: Kaur K. Kuljeet, Garg S. Sahil, Kaddoum G. Georges, Guizani M. Mohsen, Dzhayakodi (Jayakody) Arachshiladzh D. N. K. Dushanta Nalin Kumara
Резюме:Title screen
With the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for real-time data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In this direction, Mobile Edge Computing (MEC) provides seamless services with reduced latency, enhanced mobility, and improved location awareness. Since MEC has evolved from Cloud Computing, it inherited numerous security and privacy issues from the latter. Further, decentralized architectures and diversified deployment environments used in MEC platforms also aggravate the problem; causing great concerns for the research fraternity. Thus, in this paper, we propose an efficient and lightweight mutual authentication protocol for MEC environments; based on Elliptic Curve Cryptography (ECC), one-way hash functions and concatenation operations. The designed protocol also leverages the advantages of discrete logarithm problems, computational Diffie- Hellman, random numbers and time-stamps to resist various attacks namely-impersonation attacks, replay attacks, man-in-the-middle attacks, etc. The paper also presents a comparative assessment of the proposed scheme relative to the current state-of-the-art schemes. The obtained results demonstrate that the proposed scheme incurs relatively less communication and computational overheads, and is appropriate to be adopted in resource constraint MEC environments.
Режим доступа: по договору с организацией-держателем ресурса
Мова:Англійська
Опубліковано: 2019
Предмети:
Онлайн доступ:https://doi.org/10.1109/GLOBECOM38437.2019.9013856
Формат: Електронний ресурс Частина з книги
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=662276

MARC

LEADER 00000naa0a2200000 4500
001 662276
005 20250812105842.0
035 |a (RuTPU)RU\TPU\network\33413 
035 |a RU\TPU\network\33412 
090 |a 662276 
100 |a 20200707d2019 k y0engy50 ba 
101 0 |a eng 
102 |a US 
135 |a drcn ---uucaa 
181 0 |a i  
182 0 |a b 
200 1 |a A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing  |f K. Kaur, S. Garg, G. Kaddoum [et al.] 
203 |a Text  |c electronic 
300 |a Title screen 
320 |a [References: 16 tit.] 
330 |a With the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for real-time data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In this direction, Mobile Edge Computing (MEC) provides seamless services with reduced latency, enhanced mobility, and improved location awareness. Since MEC has evolved from Cloud Computing, it inherited numerous security and privacy issues from the latter. Further, decentralized architectures and diversified deployment environments used in MEC platforms also aggravate the problem; causing great concerns for the research fraternity. Thus, in this paper, we propose an efficient and lightweight mutual authentication protocol for MEC environments; based on Elliptic Curve Cryptography (ECC), one-way hash functions and concatenation operations. The designed protocol also leverages the advantages of discrete logarithm problems, computational Diffie- Hellman, random numbers and time-stamps to resist various attacks namely-impersonation attacks, replay attacks, man-in-the-middle attacks, etc. The paper also presents a comparative assessment of the proposed scheme relative to the current state-of-the-art schemes. The obtained results demonstrate that the proposed scheme incurs relatively less communication and computational overheads, and is appropriate to be adopted in resource constraint MEC environments. 
333 |a Режим доступа: по договору с организацией-держателем ресурса 
463 |t IEEE Global Communications Conference (GLOBECOM 20192019)  |o proceedings, Waikoloa, HI, USA, December 9-13, 2019  |v [6 p.]  |d 2019 
610 1 |a труды учёных ТПУ 
610 1 |a электронный ресурс 
610 1 |a servers 
610 1 |a authentication 
610 1 |a protocols 
610 1 |a privacy 
610 1 |a cloud computing 
610 1 |a elliptic curve cryptography 
610 1 |a серверы 
610 1 |a аутентификация 
610 1 |a конфиденциальность 
610 1 |a облачные вычисления 
610 1 |a криптография 
610 1 |a эллиптические кривые 
701 1 |a Kaur  |b K.  |g Kuljeet 
701 1 |a Garg  |b S.  |g Sahil 
701 1 |a Kaddoum  |b G.  |g Georges 
701 1 |a Guizani  |b M.  |g Mohsen 
701 1 |a Dzhayakodi (Jayakody) Arachshiladzh  |b D. N. K.  |c specialist in the field of electronics  |c Professor of Tomsk Polytechnic University  |f 1983-  |g Dushanta Nalin Kumara  |3 (RuTPU)RU\TPU\pers\37962  |9 20606 
712 0 2 |a Национальный исследовательский Томский политехнический университет  |b Инженерная школа информационных технологий и робототехники  |b Научно-образовательный центр "Автоматизация и информационные технологии"  |3 (RuTPU)RU\TPU\col\27515 
801 2 |a RU  |b 63413507  |c 20200707  |g RCR 
856 4 0 |u https://doi.org/10.1109/GLOBECOM38437.2019.9013856 
942 |c CF