We found a match
Your institution may have rights to this item. Sign in to continue.
- Title
A provably secure lightweight authentication protocol in mobile edge computing environments.
- Authors
Wu, Tsu-Yang; Meng, Qian; Yang, Lei; Guo, Xinglan; Kumari, Saru
- Abstract
Mobile edge computing can meet the needs of users in real time by pushing cloud resources, such as computing, network, and storage, to the edge of a mobile network. Although mobile edge technology has brought many conveniences to mobile services, many security problems, such as mutual authentication between mobile users and servers, and the impersonation of mobile users or servers, have not been properly solved. In this paper, we propose a lightweight and secure authentication protocol to solve such security problems. We conducted a formal security analysis of our protocol using ProVerif and the Real-or-Random model to prove its correctness and security, and even if the registration center is attacked, our protocol is still secure. At the end of this paper, by comparing the communication and computing costs with other existing protocols, we prove the security and efficiency of our protocol.
- Subjects
MOBILE computing; EDGE computing; PROBLEM solving; IMPERSONATION; KEY agreement protocols (Computer network protocols)
- Publication
Journal of Supercomputing, 2022, Vol 78, Issue 12, p13893
- ISSN
0920-8542
- Publication type
Article
- DOI
10.1007/s11227-022-04411-9