计算机科学
密码
重放攻击
认证(法律)
安全性分析
计算机安全
计算机网络
移动边缘计算
身份验证协议
方案(数学)
服务器
数学
数学分析
作者
Xiaoying Jia,Min Luo,Kim‐Kwang Raymond Choo,Li Li,Debiao He
出处
期刊:IEEE Internet of Things Journal
[Institute of Electrical and Electronics Engineers]
日期:2022-06-15
卷期号:9 (12): 10108-10120
被引量:6
标识
DOI:10.1109/jiot.2021.3119517
摘要
Ensuring the security and privacy of users and data in a mobile-edge computing (MEC) deployment, without affecting performance, latency and user quality of experience remain challenging. For example, in this article, we revisit an identity-based anonymous authentication scheme designed for MEC deployment. Then, we reveal that the scheme is vulnerable to impersonation, replay, and Denial-of-Service (DoS) attacks, contrary to their claims. It also does not achieve user untraceability, and the registration center must be online during authentication. We also observe that it is unclear from their scheme description, what encryption algorithm should be used in the authentication process. Therefore, we redesign the scheme in order to mitigate the weaknesses pointed out. Our redesigned protocol uses password and biometrics for authentication, which broadens the scope for real-world implementation. We also provide both formal security proof and heuristic security analysis to demonstrate that the proposed scheme achieves the desired security goals. A performance comparison shows that our scheme outperforms four other competing schemes in terms of computation and communication costs.
科研通智能强力驱动
Strongly Powered by AbleSci AI