Mingrui Zhang , Ru Meng , Tao Wang , Yanwei Zhou , Bo Yang , Lei Zhang
{"title":"AUKA:基于边缘的移动人群传感的异步可更新密钥协议","authors":"Mingrui Zhang , Ru Meng , Tao Wang , Yanwei Zhou , Bo Yang , Lei Zhang","doi":"10.1016/j.jisa.2025.104213","DOIUrl":null,"url":null,"abstract":"<div><div>Edge-based mobile crowd sensing (E-MCS) enhances efficiency by leveraging edge servers for local task processing, reducing cloud load and latency. However, establishing secure, low-latency communication between mobile devices and edge servers remains a challenge. Existing key agreement (KA) schemes either require multiple interaction rounds, increasing latency and energy consumption, or compromise security properties like perfect forward security and key-compromise impersonation resistance. To address these limitations, we propose an asynchronous updatable KA (AUKA) scheme tailored for E-MCS. AUKA is built upon key agreement, incorporating the design concept of updatable key encryption and leveraging standard cryptographic primitives such as hash functions to construct an efficient scheme with a session key update mechanism. AUKA achieves strong perfect forward security, even if a mobile device’s private key and random number are compromised, all previously established session keys remain secure, effectively mitigating long-term security risks. Additionally, AUKA maintains an almost 0-RTT property, enabling efficient session key establishment and key updates without introducing excessive communication overhead. We prove its security under the gap computational Diffie–Hellman assumption and validate its efficiency through simulations. Results demonstrate that AUKA offers a highly secure and scalable solution for E-MCS.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104213"},"PeriodicalIF":3.7000,"publicationDate":"2025-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"AUKA: Asynchronous updatable key agreement for edge-based mobile crowd sensing\",\"authors\":\"Mingrui Zhang , Ru Meng , Tao Wang , Yanwei Zhou , Bo Yang , Lei Zhang\",\"doi\":\"10.1016/j.jisa.2025.104213\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Edge-based mobile crowd sensing (E-MCS) enhances efficiency by leveraging edge servers for local task processing, reducing cloud load and latency. However, establishing secure, low-latency communication between mobile devices and edge servers remains a challenge. Existing key agreement (KA) schemes either require multiple interaction rounds, increasing latency and energy consumption, or compromise security properties like perfect forward security and key-compromise impersonation resistance. To address these limitations, we propose an asynchronous updatable KA (AUKA) scheme tailored for E-MCS. AUKA is built upon key agreement, incorporating the design concept of updatable key encryption and leveraging standard cryptographic primitives such as hash functions to construct an efficient scheme with a session key update mechanism. AUKA achieves strong perfect forward security, even if a mobile device’s private key and random number are compromised, all previously established session keys remain secure, effectively mitigating long-term security risks. Additionally, AUKA maintains an almost 0-RTT property, enabling efficient session key establishment and key updates without introducing excessive communication overhead. We prove its security under the gap computational Diffie–Hellman assumption and validate its efficiency through simulations. Results demonstrate that AUKA offers a highly secure and scalable solution for E-MCS.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"94 \",\"pages\":\"Article 104213\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2025-08-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625002509\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002509","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
AUKA: Asynchronous updatable key agreement for edge-based mobile crowd sensing
Edge-based mobile crowd sensing (E-MCS) enhances efficiency by leveraging edge servers for local task processing, reducing cloud load and latency. However, establishing secure, low-latency communication between mobile devices and edge servers remains a challenge. Existing key agreement (KA) schemes either require multiple interaction rounds, increasing latency and energy consumption, or compromise security properties like perfect forward security and key-compromise impersonation resistance. To address these limitations, we propose an asynchronous updatable KA (AUKA) scheme tailored for E-MCS. AUKA is built upon key agreement, incorporating the design concept of updatable key encryption and leveraging standard cryptographic primitives such as hash functions to construct an efficient scheme with a session key update mechanism. AUKA achieves strong perfect forward security, even if a mobile device’s private key and random number are compromised, all previously established session keys remain secure, effectively mitigating long-term security risks. Additionally, AUKA maintains an almost 0-RTT property, enabling efficient session key establishment and key updates without introducing excessive communication overhead. We prove its security under the gap computational Diffie–Hellman assumption and validate its efficiency through simulations. Results demonstrate that AUKA offers a highly secure and scalable solution for E-MCS.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.