Abstract
Compared with cloud computing, Mobile Edge Computing (MEC) can sink some services and functions located in cloud servers to edge nodes to reduce network latency and provide real-time services. However, MEC not only inherits the security issues in cloud computing, but also faces new security risks. To ensure the security and privacy of messages transmitted in the channel, a secure Authentication and Key Agreement (AKA) protocol is essential. However, the existing AKA protocols are not lightweight enough or require a cloud server or a trusted third party to participate in the authentication process. Therefore, this paper designs a fast AKA protocol based on time-sensitive token for MEC. With this protocol, the terminal node can achieve fast authentication through the applied token, and the authentication process only requires a related edge node to participate. Simulation results based on ProVerif and informal security analysis show that our protocol can resist various common attacks. The comparison with related protocols shows that our protocol only needs to spend very little computational and communicational cost to authenticate a terminal node with a token.
This work is supported in part by the National Natural Science Foundation of China under Grants 61872138, in part by the Research Foundation of Education Bureau of Hunan Province, China (Grant 2020C0080 and Grant 19C0031), and in part by the Natural Science Foundation of Hunan Province under Grant 2020JJ5603.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chen, X., Liang, W., Xu, J., Wang, C., Li, K.C., Qiu, M.: An efficient service recommendation algorithm for cyber-physical-social systems. IEEE Trans. Netw. Sci. Eng. 1 (2021). https://doi.org/10.1109/TNSE.2021.3092204
Gope, P., Das, A.K., Kumar, N., Cheng, Y.: Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 15(9), 4957–4968 (2019). https://doi.org/10.1109/TII.2019.2895030
Gope, P., Sikdar, B.: Privacy-aware authenticated key agreement scheme for secure smart grid communication. IEEE Trans. Smart Grid 10(4), 3953–3962 (2019). https://doi.org/10.1109/TSG.2018.2844403
He, D., Wang, H., Khan, M.K., Wang, L.: Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun. 10(14), 1795–1802 (2016). https://doi.org/10.1049/iet-com.2016.0091
Jia, X., He, D., Kumar, N., Choo, K.K.R.: A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 14(1), 560–571 (2020). https://doi.org/10.1109/JSYST.2019.2896064
Jiang, Q., Ma, J., Wei, F.: On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 12(2), 2039–2042 (2018). https://doi.org/10.1109/JSYST.2016.2574719
Kaur, K., Garg, S., Kaddoum, G., Guizani, M., Jayakody, D.N.K.: A lightweight and privacy-preserving authentication protocol for mobile edge computing. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6 (2019). https://doi.org/10.1109/GLOBECOM38437.2019.9013856
Kumar, P., Gurtov, A., Sain, M., Martin, A., Ha, P.H.: Lightweight authentication and key agreement for smart metering in smart energy networks. IEEE Trans. Smart Grid 10(4), 4349–4359 (2019). https://doi.org/10.1109/TSG.2018.2857558
Li, X., Chen, T., Cheng, Q., Ma, S., Ma, J.: Smart applications in edge computing: overview on authentication and data security. IEEE Internet Things J. 8(6), 4063–4080 (2021). https://doi.org/10.1109/JIOT.2020.3019297
Li, Y., Cheng, Q., Liu, X., Li, X.: A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Syst. J. 15(1), 935–946 (2021). https://doi.org/10.1109/JSYST.2020.2979006
Liang, W., Ning, Z., Xie, S., Hu, Y., Lu, S., Zhang, D.: Secure fusion approach for the internet of things in smart autonomous multi-robot systems. Inf. Sci. 579, 468–482 (2021). https://doi.org/10.1016/j.ins.2021.08.035, https://www.sciencedirect.com/science/article/pii/S0020025521008355
Liang, W., Xiao, L., Zhang, K., Tang, M., He, D., Li, K.C.: Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. IEEE Internet Things J. 1 (2021). https://doi.org/10.1109/JIOT.2021.3053842
Liang, W., Zhang, D., Lei, X., Tang, M., Li, K.C., Zomaya, A.Y.: Circuit copyright blockchain: blockchain-based homomorphic encryption for IP circuit protection. IEEE Trans. Emerg. Topics Comput. 9(3), 1410–1420 (2021). https://doi.org/10.1109/TETC.2020.2993032
Odelu, V., Das, A.K., Wazid, M., Conti, M.: Provably secure authenticated key agreement scheme for smart grid. IEEE Trans. Smart Grid 9(3), 1900–1910 (2018). https://doi.org/10.1109/TSG.2016.2602282
Qiu, T., Chi, J., Zhou, X., Ning, Z., Atiquzzaman, M., Wu, D.O.: Edge computing in industrial internet of things: architecture, advances and challenges. IEEE Commun. Surv. Tutorials 22(4), 2462–2488 (2020). https://doi.org/10.1109/COMST.2020.3009103
Trimberger, S.M., Moore, J.J.: FPGA security: motivations, features, and applications. Proc. IEEE 102(8), 1248–1265 (2014). https://doi.org/10.1109/JPROC.2014.2331672
Tsai, J.L., Lo, N.W.: A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 9(3), 805–815 (2015). https://doi.org/10.1109/JSYST.2014.2322973
Wang, J., Wu, L., Choo, K.K.R., He, D.: Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Trans. Ind. Inform. 16(3), 1984–1992 (2020). https://doi.org/10.1109/TII.2019.2936278
Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., Lv, W.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608–1631 (2019). https://doi.org/10.1109/JPROC.2019.2918437
Xu, Z., Li, X., Xu, J., Liang, W., Choo, K.K.R.: A secure and computationally efficient authentication and key agreement scheme for internet of vehicles. Comput. Electr. Eng. 95, 107409 (2021). https://doi.org/10.1016/j.compeleceng.2021.107409
Xu, Z., Liang, W., Li, K.C., Xu, J., Jin, H.: A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles. J. Parallel Distrib. Comput. 149, 29–39 (2021). https://doi.org/10.1016/j.jpdc.2020.11.003
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Xu, Z., Liang, W., Wang, J., Xu, J., Kuang, LD. (2022). A Fast Authentication and Key Agreement Protocol Based on Time-Sensitive Token for Mobile Edge Computing. In: Lai, Y., Wang, T., Jiang, M., Xu, G., Liang, W., Castiglione, A. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2021. Lecture Notes in Computer Science(), vol 13157. Springer, Cham. https://doi.org/10.1007/978-3-030-95391-1_40
Download citation
DOI: https://doi.org/10.1007/978-3-030-95391-1_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-95390-4
Online ISBN: 978-3-030-95391-1
eBook Packages: Computer ScienceComputer Science (R0)