Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication with Application Mobility Support

by   Asad Ali, et al.

Multi-Access or Mobile Edge Computing (MEC) is being deployed by 4G/5G operators to provide computational services at lower latencies. Federating MECs across operators expands capability, capacity, and coverage but gives rise to two issues - third-party authentication and application mobility - for continuous service during roaming without re-authentication. In this work, we propose a Federated State transfer and 3rd-party Authentication (FS3A) mechanism that uses a transparent proxy to transfer the information of both authentication and application state across operators to resolve these issues. The FS3A proxy is kept transparent, with virtual counterparts, to avoid any changes to the existing MEC and cellular architectures. FS3A provides users with a token, when authenticated by an MEC, which can be reused across operators for faster authentication. Prefetching of subscription and state is also proposed to further reduce the authentication and application mobility latencies. We evaluated FS3A on an OpenAirInterface (OAI)-based testbed and the results show that token reuse and subscription prefetching reduce the authentication latency by 53-65 state prefetching reduces application mobility latency by 51-91 no prefetching. Overall, FS3A reduces the service interruption time by 33 compared to no token reuse and prefetching.


page 2

page 3

page 4

page 5

page 6

page 7

page 8

page 13


Provisioning Fog Services to 3GPP Subscribers: Authentication and Application Mobility

Multi-Access Edge computing (MEC) and Fog computing provide services to ...

Reliable Distributed Authentication in Multi-Access Mobile Edge Computing

The fifth generation (5G) mobile telecommunication network is expected t...

Enabling Mobility in LTE-Compatible Mobile-edge Computing with Programmable Switches

Network softwarization triggered a new wave of innovation in modern netw...

Smart Contract Federated Identity Management without Third Party Authentication Services

Federated identity management enables users to access multiple systems u...

True2F: Backdoor-resistant authentication tokens

We present True2F, a system for second-factor authentication that provid...

AI-Oriented Two-Phase Multi-Factor Authentication in SAGINs: Prospects and Challenges

Space-air-ground integrated networks (SAGINs), which have emerged as an ...

The online learning architecture with edge computing for high-level control for assisting patients

The prevalence of mobility impairments due to conditions such as spinal ...

Please sign up or login with your details

Forgot password? Click here to reset