000 03808nlm0a2200529 4500
001 662276
005 20231030041815.0
035 _a(RuTPU)RU\TPU\network\33413
035 _aRU\TPU\network\33412
090 _a662276
100 _a20200707d2019 k y0engy50 ba
101 0 _aeng
102 _aUS
105 _ay z 100zy
135 _adrcn ---uucaa
181 0 _ai
182 0 _ab
200 1 _aA Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
_fK. Kaur, S. Garg, G. Kaddoum [et al.]
203 _aText
_celectronic
300 _aTitle screen
320 _a[References: 16 tit.]
330 _aWith the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for real-time data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In this direction, Mobile Edge Computing (MEC) provides seamless services with reduced latency, enhanced mobility, and improved location awareness. Since MEC has evolved from Cloud Computing, it inherited numerous security and privacy issues from the latter. Further, decentralized architectures and diversified deployment environments used in MEC platforms also aggravate the problem; causing great concerns for the research fraternity. Thus, in this paper, we propose an efficient and lightweight mutual authentication protocol for MEC environments; based on Elliptic Curve Cryptography (ECC), one-way hash functions and concatenation operations. The designed protocol also leverages the advantages of discrete logarithm problems, computational Diffie- Hellman, random numbers and time-stamps to resist various attacks namely-impersonation attacks, replay attacks, man-in-the-middle attacks, etc. The paper also presents a comparative assessment of the proposed scheme relative to the current state-of-the-art schemes. The obtained results demonstrate that the proposed scheme incurs relatively less communication and computational overheads, and is appropriate to be adopted in resource constraint MEC environments.
333 _aРежим доступа: по договору с организацией-держателем ресурса
463 _tIEEE Global Communications Conference (GLOBECOM 20192019)
_oproceedings, Waikoloa, HI, USA, December 9-13, 2019
_v[6 p.]
_d2019
610 1 _aтруды учёных ТПУ
610 1 _aэлектронный ресурс
610 1 _aservers
610 1 _aauthentication
610 1 _aprotocols
610 1 _aprivacy
610 1 _acloud computing
610 1 _aelliptic curve cryptography
610 1 _aсерверы
610 1 _aаутентификация
610 1 _aконфиденциальность
610 1 _aоблачные вычисления
610 1 _aкриптография
610 1 _aэллиптические кривые
701 1 _aKaur
_bK.
_gKuljeet
701 1 _aGarg
_bS.
_gSahil
701 1 _aKaddoum
_bG.
_gGeorges
701 1 _aGuizani
_bM.
_gMohsen
701 1 _aDzhayakodi (Jayakody) Arachshiladzh
_bD. N. K.
_cspecialist in the field of electronics
_cProfessor of Tomsk Polytechnic University
_f1983-
_gDushanta Nalin Kumara
_2stltpush
_3(RuTPU)RU\TPU\pers\37962
712 0 2 _aНациональный исследовательский Томский политехнический университет
_bИнженерная школа информационных технологий и робототехники
_bНаучно-образовательный центр "Автоматизация и информационные технологии"
_h8422
_2stltpush
_3(RuTPU)RU\TPU\col\27515
801 2 _aRU
_b63413507
_c20200707
_gRCR
856 4 0 _uhttps://doi.org/10.1109/GLOBECOM38437.2019.9013856
942 _cCF