Open Access iconOpen Access



Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing

Maryam Alhassan, Abdul Raouf Khan*

Department of Computer Science, College of Computer Science and Information Technology, King Faisal University, Alahssa, 31982, Kingdom of Saudi Arabia

* Corresponding Author: Abdul Raouf Khan. Email: email

Computers, Materials & Continua 2023, 75(2), 2727-2740.


Preserving privacy is imperative in the new unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) architecture to ensure that sensitive information is protected and kept secure throughout the communication. Simultaneously, efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource constrained. This study proposes a lightweight and efficient authentication scheme for the UAV-assisted MEC environment. The proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting a hardware-based solution with a simple implementation. The proposed scheme works in four stages: system initialization, EU registration, EU authentication, and session establishment. It is implemented as a single hardware chip comprising registers and XOR gates, and it can run the entire process in one clock cycle. Consequently, the proposed scheme has significantly higher efficiency in terms of runtime and memory consumption compared to other prevalent methods in the area. Simulations are conducted to evaluate the proposed authentication algorithm. The results show that the scheme has an average execution time of 0.986 ms and consumes average memory of 34 KB. The hardware execution time is approximately 0.39 ns, which is a significantly less than the prevalent schemes, whose execution times range in milliseconds. Furthermore, the security of the proposed scheme is examined, and it is resistant to brute-force attacks. Around 1.158 × 1077 trials are required to overcome the system’s security, which is not feasible using fastest available processors.


Cite This Article

APA Style
Alhassan, M., Khan, A.R. (2023). Efficient authentication scheme for uav-assisted mobile edge computing. Computers, Materials & Continua, 75(2), 2727-2740.
Vancouver Style
Alhassan M, Khan AR. Efficient authentication scheme for uav-assisted mobile edge computing. Comput Mater Contin. 2023;75(2):2727-2740
IEEE Style
M. Alhassan and A.R. Khan, "Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing," Comput. Mater. Contin., vol. 75, no. 2, pp. 2727-2740. 2023.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 744


  • 467


  • 2


Share Link