Document Type

Journal Article

Publication Title

Computers, Materials and Continua

Volume

74

Issue

2

First Page

3931

Last Page

3943

Publisher

Tech Science Press

School

School of Engineering

RAS ID

60237

Funders

Beijing Postdoctoral Research Foundation (No. 2021-ZZ-077, No. 2020-YJ-006) / Chongqing Industrial Control System Security Situational Awareness Platform, 2019 Industrial Internet Innovation and Development Project-Provincial Industrial Control System Security Situational Awareness Platform / Center for Research and Innovation in Software Engineering, School of Computer and Information Science (Southwest University, Chongqing 400175, China) / Chongqing Graduate Education Teaching Reform Research Project (yjg203032)

Comments

Kang, N., Ning, Z., Zhang, S., Rehman, S.& Waqas, M. (2023). Identity-based edge computing anonymous authentication protocol, 74(2), 3931-3943. https://doi.org/10.32604/cmc.2023.029711

Abstract

With the development of sensor technology and wireless communication technology, edge computing has a wider range of applications. The privacy protection of edge computing is of great significance. In the edge computing system, in order to ensure the credibility of the source of terminal data, mobile edge computing (MEC) needs to verify the signature of the terminal node on the data. During the signature process, the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance. Therefore, it is very necessary to improve efficiency through computational offloading. Therefore, this paper proposes an identity-based edge computing anonymous authentication protocol. The protocol realizes mutual authentication and obtains a shared key by encrypting the mutual information. The encryption algorithm is implemented through a thresholded identity-based proxy ring signature. When a large number of terminals offload computing, MEC can set the priority of offloading tasks according to the user’s identity and permissions, thereby improving offloading efficiency. Security analysis shows that the scheme can guarantee the anonymity and unforgeability of signatures. The probability of a malicious node forging a signature is equivalent to cracking the discrete logarithm puzzle. According to the efficiency analysis, in the case of MEC offloading, the computational complexity is significantly reduced, the computing power of edge devices is liberated, and the signature efficiency is improved.

DOI

10.32604/cmc.2023.029711

Creative Commons License

Creative Commons Attribution 4.0 License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

 
COinS