IoT Security 2019
DOI: 10.1002/9781119527978.ch6
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Anonymous Mutual Authentication Protocol in Multi‐Access Edge Computing (MEC) Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…In addition, it transforms into a two-way proftable platform by which both the consumer and farmer get beneftted. In the existing system, even though user authentication is provided [4,5], there may be a chance of identity theft of the user, resulting in a loss of privacy and protection for entities. Some malevolent users can gain access to the network of authenticated users by stealing information from authorised users.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, it transforms into a two-way proftable platform by which both the consumer and farmer get beneftted. In the existing system, even though user authentication is provided [4,5], there may be a chance of identity theft of the user, resulting in a loss of privacy and protection for entities. Some malevolent users can gain access to the network of authenticated users by stealing information from authorised users.…”
Section: Introductionmentioning
confidence: 99%
“…Traditionally, the authentication was handled based on the security credentials of individual users, that is, authentication factor. A two-factor authentication scheme was proposed [17]. e two factors are user identity and password.…”
Section: Related Workmentioning
confidence: 99%
“…The security industry offers Security Orchestration, Automation and Response (SOAR) frameworks to provide an automated and proactive security approach to this type of critical threat [33]. • Man-in-the-Middle: The MitM attack is characterised by the presence of a malicious third party interposed between two or more communicating parties, and secretly relaying or intercepting the communication between the parties [79], [101]. For the MEC scenario, a MitM attack is categorised as an infrastructure attack, where the malicious attacker tries to hijack a specific network segment and begins to launch attacks, such as eavesdropping and phishing, on connected devices [98], [100].…”
Section: Homomorphic Encryption Social Participatory Sensing Pattern Clusteringmentioning
confidence: 99%