Laid Kenioua , Brahim Lejdel , Sultan Alamri , Qusai Ramadan
{"title":"基于密码的边缘计算架构认证方法","authors":"Laid Kenioua , Brahim Lejdel , Sultan Alamri , Qusai Ramadan","doi":"10.1016/j.eij.2024.100543","DOIUrl":null,"url":null,"abstract":"<div><div>Due to its benefits of low delay and fast response, edge computing has become an essential aid to cloud computing technology and has introduced new options for smart applications. By offloading some of the data processing tasks to the network’s edge, edge computing complements cloud computing. Nevertheless, adopting edge computing introduces several security challenges that must be addressed to ensure safety and reliability. One major concern is data privacy, as sensitive information processed at the edge must be protected from unauthorized access and breaches. Implementing strong encryption, secure authentication protocols, and regular software updates are some of the strategies necessary to enhance security in edge computing environments. In this paper, we present a robust and lightweight mutual authentication technique that is perfectly suited to low devices that can benefit from the edge computing paradigm. After the registration phase, the authentication process can be made in two rounds, the edge node and user can easily authenticate each other. Our approach is evaluated with regard to communication and computation costs realizing 982 bits and 5.955 ms respectively. analysis and experiments prove the high performance of the proposed technique.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":"28 ","pages":"Article 100543"},"PeriodicalIF":5.0000,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1110866524001063/pdfft?md5=042060e47f5b703632c06800710f91ac&pid=1-s2.0-S1110866524001063-main.pdf","citationCount":"0","resultStr":"{\"title\":\"A password-based authentication approach for edge computing architectures\",\"authors\":\"Laid Kenioua , Brahim Lejdel , Sultan Alamri , Qusai Ramadan\",\"doi\":\"10.1016/j.eij.2024.100543\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Due to its benefits of low delay and fast response, edge computing has become an essential aid to cloud computing technology and has introduced new options for smart applications. By offloading some of the data processing tasks to the network’s edge, edge computing complements cloud computing. Nevertheless, adopting edge computing introduces several security challenges that must be addressed to ensure safety and reliability. One major concern is data privacy, as sensitive information processed at the edge must be protected from unauthorized access and breaches. Implementing strong encryption, secure authentication protocols, and regular software updates are some of the strategies necessary to enhance security in edge computing environments. In this paper, we present a robust and lightweight mutual authentication technique that is perfectly suited to low devices that can benefit from the edge computing paradigm. After the registration phase, the authentication process can be made in two rounds, the edge node and user can easily authenticate each other. Our approach is evaluated with regard to communication and computation costs realizing 982 bits and 5.955 ms respectively. analysis and experiments prove the high performance of the proposed technique.</div></div>\",\"PeriodicalId\":56010,\"journal\":{\"name\":\"Egyptian Informatics Journal\",\"volume\":\"28 \",\"pages\":\"Article 100543\"},\"PeriodicalIF\":5.0000,\"publicationDate\":\"2024-09-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S1110866524001063/pdfft?md5=042060e47f5b703632c06800710f91ac&pid=1-s2.0-S1110866524001063-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Egyptian Informatics Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1110866524001063\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866524001063","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
A password-based authentication approach for edge computing architectures
Due to its benefits of low delay and fast response, edge computing has become an essential aid to cloud computing technology and has introduced new options for smart applications. By offloading some of the data processing tasks to the network’s edge, edge computing complements cloud computing. Nevertheless, adopting edge computing introduces several security challenges that must be addressed to ensure safety and reliability. One major concern is data privacy, as sensitive information processed at the edge must be protected from unauthorized access and breaches. Implementing strong encryption, secure authentication protocols, and regular software updates are some of the strategies necessary to enhance security in edge computing environments. In this paper, we present a robust and lightweight mutual authentication technique that is perfectly suited to low devices that can benefit from the edge computing paradigm. After the registration phase, the authentication process can be made in two rounds, the edge node and user can easily authenticate each other. Our approach is evaluated with regard to communication and computation costs realizing 982 bits and 5.955 ms respectively. analysis and experiments prove the high performance of the proposed technique.
期刊介绍:
The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.