2020
DOI: 10.1016/j.jisa.2020.102648
|View full text |Cite
|
Sign up to set email alerts
|

A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…Table 4 shows the comparative security performance of the MMECRA protocol and the related security schemes of Mishra et al [5] and Alsmirat et al [12]. Among them," √ ","×" and "-" indicate that possess , no, and not mentioned respectively.…”
Section: Security Performancementioning
confidence: 99%
See 2 more Smart Citations
“…Table 4 shows the comparative security performance of the MMECRA protocol and the related security schemes of Mishra et al [5] and Alsmirat et al [12]. Among them," √ ","×" and "-" indicate that possess , no, and not mentioned respectively.…”
Section: Security Performancementioning
confidence: 99%
“…Among them," √ ","×" and "-" indicate that possess , no, and not mentioned respectively. 1) Comparison of privacy protection capabilities: Mishra et al [5] and Alsmirat et al [12] merely use the private key to encrypt MMEC data, but they don't consider that devices whose integrity status is compromised will participate in authentication at all. For this reason,the problem of device privacy breaches abounds in Mishra et al [5] and Alsmirat et al [12].…”
Section: Security Performancementioning
confidence: 99%
See 1 more Smart Citation
“…In key exchange using only hash functions, the registration center shares pre-shared key with the service providers to authenticate them. In 2020, Mishra et al [ 13 ] proposed a dynamic ID-based authenticated key agreement scheme for mobile edge computing without a trusted third party. The proposed scheme guarantees mutual authentication between user and edge servers and achieves important security properties such as secure communication, mutual authentication, user anonymity, and session key agreement.…”
Section: Introductionmentioning
confidence: 99%
“…Research has mainly focused on lightweight and security enhancement. The research for lightweight is based on non-cryptographics [1][2][3][4][5][6][7][8][9][10][11][12][13][24][25][26][27][28][29][30][31][32] that only uses hash function and XOR operation, and the research for security performance improvement is mainly based on public key encryption [14][15][16][17][18][19][20][21][32][33][34][35][36][37].…”
Section: Introductionmentioning
confidence: 99%