A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing

by   Kuljeet Kaur, et al.

With the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for real-time data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In this direction, Mobile Edge Computing (MEC) provides seamless services with reduced latency, enhanced mobility, and improved location awareness. Since MEC has evolved from Cloud Computing, it inherited numerous security and privacy issues from the latter. Further, decentralized architectures and diversified deployment environments used in MEC platforms also aggravate the problem; causing great concerns for the research fraternity. Thus, in this paper, we propose an efficient and lightweight mutual authentication protocol for MEC environments; based on Elliptic Curve Cryptography (ECC), one-way hash functions and concatenation operations. The designed protocol also leverages the advantages of discrete logarithm problems, computational Diffie-Hellman, random numbers and time-stamps to resist various attacks namely-impersonation attacks, replay attacks, man-in-the-middle attacks, etc. The paper also presents a comparative assessment of the proposed scheme relative to the current state-of-the-art schemes. The obtained results demonstrate that the proposed scheme incurs relatively less communication and computational overheads, and is appropriate to be adopted in resource constraint MEC environments.


page 1

page 2


Secure Lightweight Authentication for Multi User IoT Environment

The Internet of Things (IoT) is giving a boost to a plethora of new oppo...

Authentication Devices in Fog-Mobile Edge Computing Environments Through a Wireless Grid Resource Sharing Protocol

The rapid growth of the Internet of Things (IoT), cloud computing, Fog c...

Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems

Cyber-Physical Systems (CPS) connected in the form of Internet of Things...

Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems

Recent advancements in wireless charging technology, as well as the poss...

A Novel Efficient Signcryption Scheme for Resource-Constrained Smart Terminals in Cyber-Physical Power Systems

Most of the existing signcryption schemes generate pseudonym by key gene...

Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case

Today, the Internet of Things (IoT) is one of the emerging technologies ...

SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning for Autonomous Vehicles

Mobile edge computing (MEC) is an emerging technology to transform the c...

Please sign up or login with your details

Forgot password? Click here to reset