Document Type
Journal Article
Publication Title
Computers, Materials and Continua
Volume
74
Issue
2
First Page
3931
Last Page
3943
Publisher
Tech Science Press
School
School of Engineering
RAS ID
60237
Funders
Beijing Postdoctoral Research Foundation (No. 2021-ZZ-077, No. 2020-YJ-006) / Chongqing Industrial Control System Security Situational Awareness Platform, 2019 Industrial Internet Innovation and Development Project-Provincial Industrial Control System Security Situational Awareness Platform / Center for Research and Innovation in Software Engineering, School of Computer and Information Science (Southwest University, Chongqing 400175, China) / Chongqing Graduate Education Teaching Reform Research Project (yjg203032)
Abstract
With the development of sensor technology and wireless communication technology, edge computing has a wider range of applications. The privacy protection of edge computing is of great significance. In the edge computing system, in order to ensure the credibility of the source of terminal data, mobile edge computing (MEC) needs to verify the signature of the terminal node on the data. During the signature process, the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance. Therefore, it is very necessary to improve efficiency through computational offloading. Therefore, this paper proposes an identity-based edge computing anonymous authentication protocol. The protocol realizes mutual authentication and obtains a shared key by encrypting the mutual information. The encryption algorithm is implemented through a thresholded identity-based proxy ring signature. When a large number of terminals offload computing, MEC can set the priority of offloading tasks according to the user’s identity and permissions, thereby improving offloading efficiency. Security analysis shows that the scheme can guarantee the anonymity and unforgeability of signatures. The probability of a malicious node forging a signature is equivalent to cracking the discrete logarithm puzzle. According to the efficiency analysis, in the case of MEC offloading, the computational complexity is significantly reduced, the computing power of edge devices is liberated, and the signature efficiency is improved.
DOI
10.32604/cmc.2023.029711
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Comments
Kang, N., Ning, Z., Zhang, S., Rehman, S.& Waqas, M. (2023). Identity-based edge computing anonymous authentication protocol, 74(2), 3931-3943. https://doi.org/10.32604/cmc.2023.029711