Abstract

Edge computing has played an important role in enabling 5G technology which supports a great number of connected narrow-band IoT devices. In an edge computing architecture enabled with global mobile network, edge or IoT devices are wirelessly connected to the edge of the network. Data acquisition and processing will be handled at or close to the edge of the network in a distributed way. Since edge computing is a heterogeneous distributed interactive system with multiple domains and entities, it might suffer from potential attacks and threats. To provide a trusted edge computing, there must have a robust scheme that allows all participants to mutually authenticate in a secure and privacy-preserved way. With the rapid development of IoT technologies, mobile networks and edge computing architecture, single server has been unable to meet the needs of users. In this paper, we propose a privacy-preserved end-to-end password-based authenticated key exchange protocol for multi-server architecture in edge computing networks. Our protocol allows an end user to use an easy-to-remember password to login to the server, then through foreign agent compute a shared key with another end user for specific use of services. The proposed protocol provides strong user anonymity during communication process. Besides, the proposed protocol is proved to be secure using BAN logic and AVISPA tool. Furthermore, performance analysis shows that the proposed protocol gains stronger security and better computational efficiency. Providing lightweight computation with short key size of ECC, our work is a solution to lower latency and improve efficiency in edge computing networks.

Highlights

  • Development of ubiquitous computing technologies and wireless sensing devices has driven various innovative services and applications of the Internet of Things (IoT), such as smart home, smart healthcare, smart city, intelligent transportation, and etc

  • With the rapid development of IoT technologies, global mobile networks and edge computing networks, single server has been unable to meet the needs of users

  • REVIEW OF GOPE AND HWANG’S SCHEME we briefly describe Gope and Hwang’s scheme, which consists of three phases: registration phase, mutual authentication and key agreement phase, and password update phase

Read more

Summary

INTRODUCTION

Development of ubiquitous computing technologies and wireless sensing devices has driven various innovative services and applications of the Internet of Things (IoT), such as smart home, smart healthcare, smart city, intelligent transportation, and etc. We propose a privacy-preserved end-toend authenticated key exchange protocol for multi-server architecture in distributed edge computing networks. Edge computing network enables 5G technology architecture that supports a massive number of connected NB-IoT devices The users of these devices may want to directly connect to each other for specific purposes such as sharing services, establishing common subscriptions, etc. To this end, our proposed scheme allows end users to communicate with each other and compute a shared key through the help of home server and foreign agent. We point out some weaknesses of their protocol

REGISTRATION PHASE
PASSWORD UPDATE PHASE
MUTUAL AUTHENTICATION AND KEY EXCHANGE PHASE
LOGICAL ANALYSIS USING BAN LOGIC
2: Uj by using the same arguments of
INFORMAL SECURITY ANALYSIS
RESISTS REPLAY ATTACK
PERFORMANCE ANALYSIS
VIII. CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.