2019 IEEE Global Communications Conference (GLOBECOM) 2019
DOI: 10.1109/globecom38437.2019.9013856
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing

Abstract: With the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for realtime data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In this direction, Mobile Edge Computing (MEC) provides seamless services with reduced latency, enhanced mobility, and improved location awareness. Since MEC has evolved from Cloud Computing, it inherited numerous security and privacy issues from the latter. Further, decentralized architectures and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(18 citation statements)
references
References 14 publications
0
18
0
Order By: Relevance
“…So, the raw information (e.g., personal data including healthcare information) must be encrypted or processed. Secondly, raw information can be removed prior to reaching the edge cloud to ensure privacy [83], [84].…”
Section: Security and Privacymentioning
confidence: 99%
“…So, the raw information (e.g., personal data including healthcare information) must be encrypted or processed. Secondly, raw information can be removed prior to reaching the edge cloud to ensure privacy [83], [84].…”
Section: Security and Privacymentioning
confidence: 99%
“…Otherwise, the adversary will track the user by collecting the user's identity information. Some interesting bilinear pairing-based and ECC-based key agreement protocols were proposed in recent years [33][34][35][36]. Irshad et al [33] presented the scheme which used bilinear pairing operations in the interaction between mobile devices and servers.…”
Section: Related Workmentioning
confidence: 99%
“…But later, the program was verified to have some security issues, such as no anonymity, no resistance to replay attacks, and no guarantee of data confidentiality. Recently, a key agreement scheme based on ECC was presented by Kaur et al [36], and they stated their scheme can overcome many kinds of attacks. Nonetheless, we strictly analyzed and found the scheme of Kaur et al proposed suffered from no resistance forgery attack and insider attack.…”
Section: Related Workmentioning
confidence: 99%
“…Mobile Edge Computing (MEC) is another field which has evolved from cloud computing and also faces similar security threats [3]. A light weight authentication protocol using elliptical cryptography, oneway hash function and concatenation operations have been studied for MEC [4]. User authentication and anonymity has been achieved by a method called privacy preserving authentication scheme [5] using a group signature.…”
Section: Introductionmentioning
confidence: 99%