Skip navigation

A secure cross-domain authentication scheme based on threshold signature for MEC

A secure cross-domain authentication scheme based on threshold signature for MEC

Chen, Lei, Guo, Chong, Gong, Bei, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Deng, Lihua and Qin, Haowen (2024) A secure cross-domain authentication scheme based on threshold signature for MEC. Journal of Cloud Computing, 13 (70). pp. 1-12. ISSN 2192-113X (Print), 2192-113X (Online) (doi:10.1186/s13677-024-00631-x)

[thumbnail of VoR]
Preview
PDF (VoR)
47835_WAQAS_A_secure_cross-domain_authentication_scheme_based_on_threshold_signature_for_MEC.pdf - Published Version
Available under License Creative Commons Attribution.

Download (2MB) | Preview

Abstract

The widespread adoption of fifth-generation mobile networks has spurred the rapid advancement of mobile edge computing (MEC). By decentralizing computing and storage resources to the network edge, MEC significantly enhances real-time data access services and enables efficient processing of large-scale dynamic data on resource-limited devices. However, MEC faces considerable security challenges, particularly in cross-domain service environments, where every device poses a potential security threat. To address this issue, this paper proposes a secure cross-domain authentication scheme based on a threshold signature tailored to MEC’s multi-subdomain nature. The proposed scheme employs a (t,n) threshold mechanism to bolster system resilience and security, catering to large-scale, dynamic, and decentralized MEC scenarios. Additionally, the proposed scheme features an efficient authorization update function that facilitates the revocation of malicious nodes. Security analysis confirmed that the proposed scheme satisfies unforgeability, collusion resistance, non-repudiation and forward security. Theoretical evaluation and experimental simulation verify the effectiveness and feasibility of the proposed scheme. Compared with existing schemes, the proposed scheme has higher computational performance while implementing secure authorization updates.

Item Type: Article
Uncontrolled Keywords: authentication; threshold signature; authorization update; mobile edge computing
Subjects: Q Science > Q Science (General)
Q Science > QA Mathematics
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science
Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS)
Last Modified: 10 Sep 2024 11:52
URI: http://gala.gre.ac.uk/id/eprint/47835

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics