dc.contributor.author | Mahmood, Khalid | |
dc.contributor.author | Ayub, Muhammad Faizan | |
dc.contributor.author | Hassan, Syed Zohaib | |
dc.contributor.author | Ghaffar, Zahid | |
dc.contributor.author | Lv, Zhihan | |
dc.contributor.author | Chaudhry, Shehzad Ashraf | |
dc.date.accessioned | 2023-10-06T05:07:01Z | |
dc.date.available | 2023-10-06T05:07:01Z | |
dc.date.issued | 2022 | en_US |
dc.identifier.issn | 0140-3664 | |
dc.identifier.issn | 1873-703X | |
dc.identifier.uri | https://hdl.handle.net/11363/5776 | |
dc.description.abstract | Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities
across the scope of wireless network. In MEC environment, MEC servers along with the computing and
storage capabilities are distributed at the edge of the network. However, due to the broad range of wireless
communication, the fulfillment of security requirements still remain a challenging task in the for MEC
environment. With the expeditious traffic expansion and growing end user requirements, the classic security
protocols cannot encounter the innovative requirements of lightweightness and real-time communication. To
meet these requirements, we have proposed an authentication protocol for the MEC environment. Our proposed
protocol stipulates secure and efficient communication for all of the intended entities. Meanwhile, during its
execution user anonymity remains intact. Moreover, our protocol is proven to be secure under the assumptions
of formal security model. Additionally in this article, we have described the security properties of our protocol
that it offers resistance against impersonation, session key computation and forward and backward secrecy
attacks. The comparative analysis of time consumption and computation overheads are presented at the end
of the paper, which is an evidence that our proposed protocol outperforms prior to various existing MEC
protocols. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS | en_US |
dc.relation.isversionof | 10.1016/j.comcom.2022.01.005 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Authentication | en_US |
dc.subject | Authentication protocol | en_US |
dc.subject | Mutual authentication | en_US |
dc.subject | Mobile edge computing | en_US |
dc.title | A seamless anonymous authentication protocol for mobile edge computing infrastructure | en_US |
dc.type | article | en_US |
dc.relation.ispartof | Computer Communications | en_US |
dc.department | Mühendislik ve Mimarlık Fakültesi | en_US |
dc.authorid | https://orcid.org/0000-0001-5046-7766 | en_US |
dc.authorid | https://orcid.org/0000-0001-7616-0420 | en_US |
dc.authorid | https://orcid.org/0000-0002-5546-2689 | en_US |
dc.authorid | https://orcid.org/0000-0003-2525-3074 | en_US |
dc.authorid | https://orcid.org/0000-0002-9321-6956 | en_US |
dc.identifier.volume | 186 | en_US |
dc.identifier.startpage | 12 | en_US |
dc.identifier.endpage | 21 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.institutionauthor | Chaudhry, Shehzad Ashraf | |