Computer Science ›› 2020, Vol. 47 ›› Issue (11): 10-18.doi: 10.11896/jsjkx.200500003
Special Issue: Intelligent Mobile Authentication
• Intelligent Mobile Authentication • Previous Articles Next Articles
CHENG Qing-feng1,2, LI Yu-ting1,2, LI Xing-hua3, JIANG Qi3
CLC Number:
[1] CULLER D E.The Once and Future Internet of Everything[EB/OL].http://sites.nation- alacademies.org/cs/groups/cstbsite/documents/webpage/cstb_160416.pdf. [2] SHI W,SUN H,CAO J.Edge Computing :An Emerging Computing Model for the Internet of Everything era[J].Journal of Computer Research and Development,2017,54(5):907-924. [3] SHI W,CAO J,ZHANG Q,et al.Edge Computing:Vision and Challenges[J].IEEE Internet of Things Journal,2016,3(5):637-646. [4] SATYANARAYANAN M.The Emergence of Edge Computing[J].Computer,2017,50(1):30-39. [5] VARGHESE B,WANG N,BARBHUIYA S,et al.Challengesand Opportunities in Edge Computing[C]//2016 IEEE International Conference on Smart Cloud (SmartCloud).IEEE Computer Society,2016:20-26. [6] ALMAJALI S,SALAMEH H B,AYYASH M,et al.A Framework for Efficient and Secured Mobility of IoT Devices in Mobile Edge Computing[C]//The 3rd International Conference on Fog and Mobile Edge Computing (FMEC).2018. [7] TSAI J L,LO N W.A Privacy-aware Authentication Scheme for Distributed Mobile Cloud Computing Services[J].IEEE Systems Journal,2015,9(3):805-815. [8] JIANG Q,MA J,WEI F.On the Security of a Privacy-aware Authentication Scheme for Distributed Mobile Cloud Computing Services[J].IEEE Systems Journal,2018,12(2):2039-2042. [9] IRSHAD A,SHER M,AHMAD H F,et al.An Improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Ser-vices[J].KSII Transactions on Internet and Information Systems,2016,10(12):6092-6115. [10] XIONG L,PENG D,PENG T,et al.An Enhanced Privacy Aware Authentication Scheme for Distributed Mobile Cloud Computing Services[J].KSII Transactions on Internet and Information Systems,2017,11(12):6169-6187. [11] LI J,ZHANG W,DABRA V,et al.AEP-PPA:An Anonymous,Efficient and Provably-secure Privacy Preserving Authentication Protocol for Mobile Services in Smart Cities[J].Journal of Network and Computer Applications,2019,134:52-61. [12] YANG J H,CHANG C C.An ID-based Remote Mutual Au-thentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem[J].Computer Security,2009,28(3):138-143. [13] YOON E J,YOO K Y.Robust ID-based Remote Mutual Au-thentication with Key Agreement Scheme for Mobile Devices on ECC[C]//IEEE International Conference on IEEE Cse.IEEE Computer Society,2009,2:633-640. [14] KAUR K,GARG S,KADDOUM G,et al.A Lightweight andPrivacy-preserving Authen-tication Protocol for Mobile Edge Computing[C]//IEEE Global Communications Conference (GLOBE-COM' 19).IEEE Computer Society,2019:1-6. [15] ZENG Y,GUANG H,LI G.Performance Improvement of Wireless Handover Authen-tication Protocol[J].Application Research of Computers,2018,35(3):901-904. [16] CUI J,WEI L,ZHANG J,et al.An Efficient Message Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks[J].IEEE Transactions on Intelligent Transportation Systems,2019,20(5):1621-1632. [17] DAS A K,WAZID M,KUMAR N,et al.Design of Secure and Lightweight Authen-tication Protocol for Wearable Devices Envi-ronment[J].IEEE Journal of Biomedical and Health Informatics,2018,22(4):1310-1322. [18] JIANG Q,QIAN Y,MA J,et al.User Centric Three-factor Authentication Protocol for Cloud-assisted Wearable Devices[J].Interna-tional Journal of Communication Systems,2019,32(6):e3900. [19] KONG Z,XUE J,WANG Y,et al.Identity Authentication Under Internet of Everything Based on Edge Computing[C]//6th IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS 2019).IEEE Computer Society,2020,1149:72-85. [20] LIU X P,LIAO Z B,WEI Z G.Lightweight Key Management Scheme for Internet of Things[J].Journal of International Security Research,2018,4(9):819-824. [21] JIA X Y,HE D,KUAMR N,et al.A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing[J].IEEE Systems Journal,2019,14(1):560-571. [22] LI Y,CHENG Q,LIU X.A Secure Anony-mous Identity-Based Scheme in New Authen-tication Architecture for Mobile Edge Computing[J/OL].IEEE Systems Journal,2020.http://doi.org/10.1109/JSYST.2020.2979006. [23] WU D,ZHOU C.Fault-tolerant and Scalable Key Management for Smart Grid[J].IEEE Transactions Smart Grid,2011,2(2):375-381. [24] XIA J,WANG Y.Secure Key Distribution for the Smart Grid[J].IEEE Transactions Smart Grid,2012,3(3):1437-1443. [25] YAN L,CHANG Y,ZHANG S.A Lightweight Authentication and Key Agreement Scheme for Smart Grid[J].International Journal of Distributed Sensor Networks,2017,13(2):1-7. [26] WU F,XU L,LI X,et al.A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography[J].IEEE Systems Journal,2019,13(3):2830-2838. [27] MAHMOOD K,LI X,CHAUDHRY S A,et al.Paring BasedAnonymous and Secure Key Agreement Protocol for Smart Grid Edge Computing Infrastructure[J].Future Generation Computer Systems,2018,88:491-500. [28] JIA X,HE D,KUAMR N,et al.Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System[J].Wireless Networks,2019,25(8):4737-4750. [29] LIU C,TSAI W J,CHANG T Y,et al.Ephemeral-secret-leakage Secure ID-based Three-party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments[J].Symmetry,2018,10(4):84. [30] LEE T F,HWANG T.Three-party Authenticated Key Agreements for Optimal Communication[J].PLoS ONE,2017,12(3):e0174473. [31] ZHOU L,VARADHARAJAN V,HITCHENS M.Crypto-graphic Role-based Access Control for Secure Cloud Data Storage Systems[C]//10th International Conference on IEEE Security and Cryptography (SECRYPT).IEEE Computer Society,2013,10(11):2381-2395. [32] CHEN F,XIANG T,YANG Y,et al.Secure Cloud StorageMeets with Secure Network Coding[C] // IEEE INFOCOM.IEEE Computer Society,2014:673-681. [33] HE D,ZEADALLY S,WU L.Certificateless Public Auditing Scheme for Cloud-assisted Wireless Body Area Networks[J].IEEE Systems Journal,2015,12(1):64-73. [34] SHEN J,ZHOU T,HE D,et al.Block Design-based Key Agreement for Group Data Sharing in Cloud Computing[J].IEEE Transactions on Dependable and Secure Computing,2019,16(6):996-1010. [35] SHAMIR A.Identity-based Cryptosystems and SignatureSchemes[C]//Advances in Cryptology-Crypto'84.Springer-Verlag,1984,196:47-53. [36] KIM J,CAMTEPE S,SUSILO W,et al.Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing[C]//2019 AsiaCCS.2019:55-66. [37] RIVEST R L,ADLEMAN L,DERTOUZOS M L.On DataBanks and Privacy Homo-morphisms[M]//Foundations of Secure Computation.New York:Academic Press,1978:169-179. [38] KAMARA S,PAPAMANTHOU C,ROEDER T.DynamicSearchable Symmetric Encryption[C] // The 19th ACM Conference on Computer and Communications Security.2012:965-976. [39] HE L,MA J,MO R,et al.Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing[J].Security and Communication Networks,2019,8583130:1-12. [40] OGBANUFE O,KIM D J.Comparing Fingerprint-based Bio-metrics Authentication Versus Traditional Authentication Methods for E-payment[J].Decision Support Systems,2018,106:1-14. [41] BLANTON M,GASTI P.Secure and Efficient Protocols for Iris and Fingerprint Identification[C]//European Symposium on Research In Computer Security.2011:190-209. [42] HSIEH C T,HAN C C,LEE C H,et al.Person Authentication Using Nearest Feature Line Embedding Transformation and Biased Discriminant Analysis[C]//International Carnahan Conference on Security Technology.2017:1-5. [43] MA Y,WU L,GU X,et al.A Secure Face Verification Scheme Based on Homomorphic Encryption and Deep Neural Networks[J].IEEE Access,2017,5:16532-16538. [44] WANG X,XUE H,LIU X,et al.A Privacy-preserving EdgeComputation-Based Face Verification System for User Authentication[J].IEEE Access,2019,7:14186-14197. [45] CHI J,OWUSU E,YIN X,et al.Privacy Partition:A Privacy-preserving Framework for Deep Neural Networks in Edge Networks[C]//IEEE/ACM Symposium on Edge Computing (SEC).2018:378-380. [46] TRAMANANDA R,YOUNIS A,WANG B J,et al.Vigilia:Securing Smart Home Edge Computing[C]//IEEE/ACM Symposium on Edge Computing (SEC).2018:74-89. [47] WANG F,WEN H,CHEN S,et al.Privacy Data ProtectionMethod for Mobile Intelligent Terminal Based on Edge Computing[J].Cyberspace Security,2018,9(2):47-50. [48] XIAO L,WAN X,DAI C,et al.Security in Mobile Edge Caching with Reinforcement Learning[J].IEEE Wireless Communications,2018,25(3):116-122. [49] YANG R,YU F R,SI P,et al.Integrated Blockchain and Edge Computing Systems:A Survey,Some Research Issues and Challenges [J].IEEE Communications Surveys & Tutorials,2019,21(2):1508-1532. [50] SHARMA K,SINGH S,JEONG Y S,et al.Distblocknet:A Distributed Blockchains-based Secure SDN Architecture for IoT Networks[J].IEEE Communications Maga zine,2017,55(9):78-85. [51] XU X,ZENG Z,YANG S,et al.A Novel Blockchain Framework for Industrial IoT Edge Computing[J].Sensors,2020,20(7):2061. [52] LIU X,WU J,CHEN L,et al.Efficient Auction Mechanism for Edge Computing resource Allocation in Mobile Blockchain[C]//IEEE 21st International Conference on High Performance Computing and Communications;IEEE 17th International Conference on Smart City;IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).2019:1-10. [53] XIA C,CHEN H,LIU X,et al.ETRA:Efficient Three-Stage Resource Allocation for Mobile Blockchain in Edge Computing[C]//IEEE 24th International Conference on Parallel and Distributed Systems (ICP-ADS).2018:701-705. [54] HUANG Y,ZHANG J,DUAN J,et al.Resource Allocation and Consensus on Edge Blockchain in Pervasive Edge Computing Environments[C]//IEEE 39th International Conference on Distributed Computing Systems (ICDCS).2019:1476-1486. [55] XIONG Z,ZHANG Y,NIYATO D,et al.When Mobile Blockchain Meets Edge Computing[J].IEEE Communications Magazine,2018,56(8):33-39. [56] Chinese Mobile 5G Innovation Center.White Papers for Blockchain and Edge Computing[R].Innovation Research Report of Chinese Mobile 5G Innovation Center,2020. [57] Ericsson Inc.Ceo to Shareholders:50 Billion Connections 2020[EB/OL].http://www.ericsson.com/thecom-pany/press/releas- es/2010/04/1403231. |
[1] | SUN Hui-ting, FAN Yan-fang, MA Meng-xiao, CHEN Ruo-yu, CAI Ying. Dynamic Pricing-based Vehicle Collaborative Computation Offloading Scheme in VEC [J]. Computer Science, 2022, 49(9): 242-248. |
[2] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[3] | YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253. |
[4] | LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279. |
[5] | FANG Tao, YANG Yang, CHEN Jia-xin. Optimization of Offloading Decisions in D2D-assisted MEC Networks [J]. Computer Science, 2022, 49(6A): 601-605. |
[6] | LIU Zhang-hui, ZHENG Hong-qiang, ZHANG Jian-shan, CHEN Zhe-yi. Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems [J]. Computer Science, 2022, 49(6A): 619-627. |
[7] | YUAN Hao-nan, WANG Rui-jin, ZHENG Bo-wen, WU Bang-yan. Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric [J]. Computer Science, 2022, 49(6A): 490-495. |
[8] | XIE Wan-cheng, LI Bin, DAI Yue-yue. PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing [J]. Computer Science, 2022, 49(6): 3-11. |
[9] | LIANG Zhen-zhen, XU Ming. Key Agreement Scheme Based on Ocean Acoustic Channel [J]. Computer Science, 2022, 49(6): 356-362. |
[10] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[11] | ZHANG Hai-bo, ZHANG Yi-feng, LIU Kai-jian. Task Offloading,Migration and Caching Strategy in Internet of Vehicles Based on NOMA-MEC [J]. Computer Science, 2022, 49(2): 304-311. |
[12] | LIN Chao-wei, LIN Bing, CHEN Xing. Study on Scientific Workflow Scheduling Based on Fuzzy Theory Under Edge Environment [J]. Computer Science, 2022, 49(2): 312-320. |
[13] | LIANG Jun-bin, ZHANG Hai-han, JIANG Chan, WANG Tian-shu. Research Progress of Task Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing [J]. Computer Science, 2021, 48(7): 316-323. |
[14] | XUE Yan-fen, GAO Ji-mei, FAN Gui-sheng, YU Hui-qun, XU Ya-jie. Energy-aware Fault-tolerant Collaborative Task Execution Algorithm in Edge Computing [J]. Computer Science, 2021, 48(6A): 374-382. |
[15] | SONG Hai-ning, JIAO Jian, LIU Yong. Research on Mobile Edge Computing in Expressway [J]. Computer Science, 2021, 48(6A): 383-386. |
|