Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Journal of Beijing University of Posts and Telecommunications ›› 2021, Vol. 44 ›› Issue (1): 110-116.doi: 10.13190/j.jbupt.2020-005

• REPORTS • Previous Articles     Next Articles

Security and Efficient Authentication Scheme for Mobile Edge Computing

XUE Jian-bin, BAI Zi-mei   

  1. School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China
  • Received:2020-01-10 Online:2021-02-28 Published:2021-09-30

Abstract: Aiming at the problems of low computing power and limited storage capacity of mobile terminals,a lightweight identity authentication protocol suitable for mobile edge computing environments is proposed. The protocol combines cryptography with physical layer security protection technology,uses a symmetric cryptosystem to reduce the computational complexity of the mobile terminal in the authentication process,and completes the mutual authentication and key negotiation between the mobile terminal and the edge server with a small amount of calculation and low information storage. Mobile terminals can roam randomly in the mobile edge computing environment with only one registration. Security analysis shows that the protocol satisfies the security features of forward security,anti-replay attacks,and anti-man-in-the-middle attacks. Simulation shows that,compared with other authentication schemes,this scheme has better performance advantages in terms of communication and calculation costs.

Key words: mobile edge computing, identity authentication, physical-layer security, roaming, data security

CLC Number: