Open Access iconOpen Access

ARTICLE

crossmark

Identity-Based Edge Computing Anonymous Authentication Protocol

Naixin Kang1, Zhenhu Ning1,*, Shiqiang Zhang1, Sadaqat ur Rehman2, Muhammad Waqas1,3

1 Beijing University of Technology, Beijing, 100124, China
2 Department of Natural and Computing Science University of Aberdeen, UK
3 School of Engineering, Edith Cowan University, Perth, 6027, Australia

* Corresponding Author: Zhenhu Ning. Email: email

Computers, Materials & Continua 2023, 74(2), 3931-3943. https://doi.org/10.32604/cmc.2023.029711

Abstract

With the development of sensor technology and wireless communication technology, edge computing has a wider range of applications. The privacy protection of edge computing is of great significance. In the edge computing system, in order to ensure the credibility of the source of terminal data, mobile edge computing (MEC) needs to verify the signature of the terminal node on the data. During the signature process, the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance. Therefore, it is very necessary to improve efficiency through computational offloading. Therefore, this paper proposes an identity-based edge computing anonymous authentication protocol. The protocol realizes mutual authentication and obtains a shared key by encrypting the mutual information. The encryption algorithm is implemented through a thresholded identity-based proxy ring signature. When a large number of terminals offload computing, MEC can set the priority of offloading tasks according to the user’s identity and permissions, thereby improving offloading efficiency. Security analysis shows that the scheme can guarantee the anonymity and unforgeability of signatures. The probability of a malicious node forging a signature is equivalent to cracking the discrete logarithm puzzle. According to the efficiency analysis, in the case of MEC offloading, the computational complexity is significantly reduced, the computing power of edge devices is liberated, and the signature efficiency is improved.

Keywords


Cite This Article

N. Kang, Z. Ning, S. Zhang, . Sadaqat ur Rehman and . Waqas, "Identity-based edge computing anonymous authentication protocol," Computers, Materials & Continua, vol. 74, no.2, pp. 3931–3943, 2023.



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 824

    View

  • 416

    Download

  • 1

    Like

Share Link