Abstract

For the simplicity and feasibility, password-based authentication and key agreement scheme has gradually become a popular way to protect network security. In order to achieve mutual authentication between users and edge cloud servers during data collection, password-based key agreement scheme has attracted much attention from researchers and users. However, security and simplicity are a contradiction, which is one of the biggest difficulties in designing a password-based key agreement scheme. Aimed to provide secure and efficient key agreement schemes for data collecting in edge cloud, we propose an efficient and secure key agreement in this paper. Our proposed scheme is proved by rigorous security proof, and the proposed scheme can be protected from various attacks. By comparing with other similar password-based key agreement schemes, our proposed scheme has lower computational and communication costs and has higher security.

Highlights

  • With the dawn of the Internet of everything, Internet of things (IoT) has become to obtain the leading strategic position in research and development in the world

  • In the era of Internet of ings, mobile devices are no longer simple mobile phones, tablets, etc., but include more abundant augmented/virtual reality devices, intelligent medical device, and moving vehicle. e application scenario transfers from voice/video communication and other services to virtual space experience, intelligent manufacturing, and the Internet of vehicles [3, 4]

  • Edge computing data provides format conversion, caching, processing, analysis, and transmission services, and the load of cloud servers improves the efficiency of data processing. e edge cloud includes IoT gateways and collectors. ese devices together form an edge node network and provide lightweight computing power for the edge layer of the system

Read more

Summary

Introduction

With the dawn of the Internet of everything, Internet of things (IoT) has become to obtain the leading strategic position in research and development in the world. E scheme was based on mobile devices communication and ID authentication with key agreement protocol. E proposed pKAS can ensure the security of the message and the authentication of the user identity when two parties communicate. We list our contributions as follows: First, we put forward a secure password-based key agreement pKAS based on ECC for mutual authentication between the user and edge server. E proposed pKAS only needs to deliver the message twice, which greatly saves communication bandwidth In this scheme, we use signcryption, signature verification, and hash operation etc., to ensure the confidentiality and integrity of the message, as well as the anonymity of the identity.

Related Works
Preliminaries
System Model and Security Model
Security and Performance Analysis
Conclusion and Future Work
Conflicts of Interest
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call