[1] 施巍松, 孙辉, 曹杰. 边缘计算:万物互联时代新型计算模型[J]. 计算机研究与发展, 2017, 54(5):907-924. Shi Weisong, Sun Hui, Cao Jie. Edge computing:a new computing model in the era of interconnection of all things[J]. Computer Research and Development, 2017, 54(5):907-924. [2] 张佳乐, 赵彦超, 陈兵, 等. 边缘计算数据安全与隐私保护研究综述[J]. 通信学报, 2018, 39(3):1-21. Zhang Jiale, Zhao Yanchao, Chen Bing, et al. A review of research on data security and privacy protection in edge computing[J]. Journal of Communications, 2018, 39(3):1-21. [3] Almajalai S, Salameh H B. A framework for efficient and secured mobility of IoT devices in mobile edge computing[C]//Third IEEE International Conference on Fog & Mobile Edge Computing. Barcelona:IEEE, 2018:58-62. [4] Roman R, Lopez J, Mambo M. Mobile edge computing, fog et al.:a survey and analysis of security threats and challenges[J]. Future Generation Computer Systems, 2016, 78(4):680-698. [5] Dey S, Ye Q, Sampalli S. AMLT:A mutual authentication scheme for mobile cloud computing[C]//2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Halifax:IEEE, 2018:700-705. [6] Pardeshi M S, Yuan S M. SMAP fog/edge:a secure mutual authentication protocol for fog/edge[J]. IEEE Access, 2019, 7:101327-101335. [7] Ibrahim M H. Octopus:an edge-fog mutual authentication scheme[J]. International Journal of Network Security, 2016, 18(6):1089-1101. [8] Jia X, He D, Kumar N, et al. A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing[J]. IEEE Systems Journal, 2019, 14(1):1-12. [9] Kaur K, Garg S, Kaddoum G et al. A lightweight and privacy-preserving authentication protocol for mobile edge computing[C]//IEEE Global Communications Conference (GLOBECOM'19). Waikoloa:IEEE, 2019:1-6. [10] Yang J H, Chang C C. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem[J]. Computers and Security, 2009, 28(3-4):138-143. [11] Burrows M, Abadi M, Needham R M. A logic of authentication in proceedings of the royal society of london a:mathematical, physical and engineering sciences[J]. The Royal Society, 1989, 426:233-271. |