2022
DOI: 10.1007/s11227-022-04411-9
|View full text |Cite
|
Sign up to set email alerts
|

A provably secure lightweight authentication protocol in mobile edge computing environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 34 publications
0
16
0
Order By: Relevance
“…In previous years, to achieve efficient authentication, the literature [27,28] adopted the cloud computing architecture to different environments. Later, researchers found that fog computing is more suitable for the IoV than cloud computing with a large amount of real-time data to process.…”
Section: Related Workmentioning
confidence: 99%
“…In previous years, to achieve efficient authentication, the literature [27,28] adopted the cloud computing architecture to different environments. Later, researchers found that fog computing is more suitable for the IoV than cloud computing with a large amount of real-time data to process.…”
Section: Related Workmentioning
confidence: 99%
“…There has been much research on the security of the cloud architecture for the IoV. Reference [10] proposed a multifactor authentication mechanism in the cloud computing scenario. On this basis, Reference [11] designed a four-layer architecture based on a symmetric encryption algorithm and fog computing for the IoV authentication protocol.…”
Section: Iov Security Architecture Based On Cloud Computing Scenariosmentioning
confidence: 99%
“…The receiver receives the data packet from the new address. The address update can be detected by evaluating the network card serial number in the header, and the shared key material is recalculated as Equation (10).…”
Section: Mobile Supportmentioning
confidence: 99%
“…Starting with personal data and media content, data protection at the edge is an effective strategy to assure edge safety and confidentiality 1 . Personal or biometric data, such as an individual's face photos that can use for individual exchange or applications like facial recognition for banking services, must be protected to enable private sharing for personal use and safe banking and other services 2 . Edge computing's inherent properties allow additional computational capabilities required for privacy and security‐sensitive applications 3 .…”
Section: Introductionmentioning
confidence: 99%