000 | 03808nlm0a2200529 4500 | ||
---|---|---|---|
001 | 662276 | ||
005 | 20231030041815.0 | ||
035 | _a(RuTPU)RU\TPU\network\33413 | ||
035 | _aRU\TPU\network\33412 | ||
090 | _a662276 | ||
100 | _a20200707d2019 k y0engy50 ba | ||
101 | 0 | _aeng | |
102 | _aUS | ||
105 | _ay z 100zy | ||
135 | _adrcn ---uucaa | ||
181 | 0 | _ai | |
182 | 0 | _ab | |
200 | 1 |
_aA Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing _fK. Kaur, S. Garg, G. Kaddoum [et al.] |
|
203 |
_aText _celectronic |
||
300 | _aTitle screen | ||
320 | _a[References: 16 tit.] | ||
330 | _aWith the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for real-time data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In this direction, Mobile Edge Computing (MEC) provides seamless services with reduced latency, enhanced mobility, and improved location awareness. Since MEC has evolved from Cloud Computing, it inherited numerous security and privacy issues from the latter. Further, decentralized architectures and diversified deployment environments used in MEC platforms also aggravate the problem; causing great concerns for the research fraternity. Thus, in this paper, we propose an efficient and lightweight mutual authentication protocol for MEC environments; based on Elliptic Curve Cryptography (ECC), one-way hash functions and concatenation operations. The designed protocol also leverages the advantages of discrete logarithm problems, computational Diffie- Hellman, random numbers and time-stamps to resist various attacks namely-impersonation attacks, replay attacks, man-in-the-middle attacks, etc. The paper also presents a comparative assessment of the proposed scheme relative to the current state-of-the-art schemes. The obtained results demonstrate that the proposed scheme incurs relatively less communication and computational overheads, and is appropriate to be adopted in resource constraint MEC environments. | ||
333 | _aРежим доступа: по договору с организацией-держателем ресурса | ||
463 |
_tIEEE Global Communications Conference (GLOBECOM 20192019) _oproceedings, Waikoloa, HI, USA, December 9-13, 2019 _v[6 p.] _d2019 |
||
610 | 1 | _aтруды учёных ТПУ | |
610 | 1 | _aэлектронный ресурс | |
610 | 1 | _aservers | |
610 | 1 | _aauthentication | |
610 | 1 | _aprotocols | |
610 | 1 | _aprivacy | |
610 | 1 | _acloud computing | |
610 | 1 | _aelliptic curve cryptography | |
610 | 1 | _aсерверы | |
610 | 1 | _aаутентификация | |
610 | 1 | _aконфиденциальность | |
610 | 1 | _aоблачные вычисления | |
610 | 1 | _aкриптография | |
610 | 1 | _aэллиптические кривые | |
701 | 1 |
_aKaur _bK. _gKuljeet |
|
701 | 1 |
_aGarg _bS. _gSahil |
|
701 | 1 |
_aKaddoum _bG. _gGeorges |
|
701 | 1 |
_aGuizani _bM. _gMohsen |
|
701 | 1 |
_aDzhayakodi (Jayakody) Arachshiladzh _bD. N. K. _cspecialist in the field of electronics _cProfessor of Tomsk Polytechnic University _f1983- _gDushanta Nalin Kumara _2stltpush _3(RuTPU)RU\TPU\pers\37962 |
|
712 | 0 | 2 |
_aНациональный исследовательский Томский политехнический университет _bИнженерная школа информационных технологий и робототехники _bНаучно-образовательный центр "Автоматизация и информационные технологии" _h8422 _2stltpush _3(RuTPU)RU\TPU\col\27515 |
801 | 2 |
_aRU _b63413507 _c20200707 _gRCR |
|
856 | 4 | 0 | _uhttps://doi.org/10.1109/GLOBECOM38437.2019.9013856 |
942 | _cCF |