Skip to main content

EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12384))

  • 2508 Accesses

Abstract

Nowadays edge computing has been widely recognized. It is a location sensitive service, which is suitable for mobile clients to get local real-time services. In order to ensure the service’s reliability and continuity during moving, clients need to switch service edges and data of clients need to be migrated between different edges. This process is different from mobile communication, in which clients cannot decide when to switch by judging the state of the network, edge need to perform the action actively and seamlessly. To solve the problem, we base on the advantages of three-level architecture of edge computing and propose EdgeCC, a client-edge-cloud collaborative authentication framework. By theoretical analysis and simulation with NS3, we compare EdgeCC with two existed frameworks in terms of processing and transmission delay, client’s energy consumption and participation, migration frequency, proving the superiority of EdgeCC. Meanwhile, we analyze security issues for mobile clients, edges and cloud in migration authentication of edge computing, and provide some security settings to solve them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ning, Z., Zhang, F., Shi, W.: A study of using TEE on edge computing. J. Comput. Res. Dev. 56(7), 1441–1453 (2019)

    Google Scholar 

  2. Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 Workshop on Mobile Big Data, pp. 37–42. ACM (2015)

    Google Scholar 

  3. Satyanarayanan, M., Bahl, V., Caceres, R., et al.: The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14–23 (2009)

    Article  Google Scholar 

  4. Xu, Z.W.: Cloud-sea computing systems: towards thousand-fold improvement in performance per watt for the coming zettabyte era. J. Comput. Sci. Technol. 29(2), 177–181 (2014). https://doi.org/10.1007/s11390-014-1420-2

    Article  Google Scholar 

  5. Liu, F., Tang, G., Li, Y., et al.: A survey on edge computing systems and tools. PIEEE 107(8), 1537–1562 (2019)

    Google Scholar 

  6. Xiao, Y., Jia, Y., et al.: Edge computing security: state of the art and challenges. PIEEE 107(8), 1608–1631 (2019)

    Google Scholar 

  7. Nie, H., Su, K., et al.: The study on the technology of over region switching in mobile communication system. Commun. Technol. 41(8), 33–35 (2008)

    Google Scholar 

  8. NS3. https://www.nsnam.org/

  9. Wang, S., Urgaonkar, R., He, T., et al.: Mobility-induced service migration in mobile micro-clouds. In: IEEE Military Communications Conference, pp. 835–840 (2014)

    Google Scholar 

  10. Wang, S., Urgaonkar, R., et al.: Dynamic service migration in mobile edge-clouds. In: IFIP Networking, pp. 1–9 (2015)

    Google Scholar 

  11. Wang, S., Chan, K., Urgaonkar, R., et al.: Emulation-based study of dynamic service placement in mobile micro-clouds. In: MILCOM, pp. 1046–1051 (2015)

    Google Scholar 

  12. Wu, L., Xie, Y., Zhang, Y.: Efficient and secure message authentication framework for VANET. J. Commun. 37(11), 1–10 (2016)

    Google Scholar 

  13. Ha, K., Abe, Y., et al.: Adaptive VM handoff across cloudlets. Technical report CMU-CS-15-113 (2015)

    Google Scholar 

  14. Leppänen, T., et al.: Mobile agents for integration of Internet of Things and wireless sensor networks. In: IEEE International Conference on Systems, Man, and Cybernetics, pp. 14–21 (2013)

    Google Scholar 

  15. Huang, B., Cheng, X., et al.: Lightweight hardware based secure authentication framework for fog computing. In: IEEE/ACM Symposium on Edge Computing (SEC), pp. 433–439 (2018)

    Google Scholar 

  16. Zhang, C., Lin, X., Lu, R., et al.: RAISE: an efficient RSU-aided message authentication framework in vehicular communication networks. In: IEEE International Conference on Communications, pp. 1451–1457 (2008)

    Google Scholar 

  17. Mortazavi, S.H., Salehe, M., Gomes, C.S., et al.: CloudPath: a multi-tier cloud computing framework. In: IEEE/ACM Symposium on Edge Computing (SEC) (2017). Article no. 20

    Google Scholar 

  18. Xie, R., Huang, T., Yang, F., Liu, Y.: Principle and Practice of Edge Computing. Posts & Telecom Press, Beijing (2019)

    Google Scholar 

  19. Shodan. https://www.shodan.io

  20. China Unicom edge business platform architecture and industrial ecology white paper. https://connect.intel.com/COS-ChinaUnicomEdge

Download references

Acknowledgements

This work was supported in part by the key R&D Program of Guangdong, China under Grant 2019B010137004, in part by the National Natural Science Foundation of China under Grant U1766215, in part by the National Natural Science Foundation of China under Grant 61802016, in part by the Fundamental Research Funds for the Central Universities under Grant FRF-TP-20-012A2, in part by the National Social Science Foundation of China under Grant 17ZDA331, and in part by the Information Engineering Institute Program under Grant Y7Z0451104.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weizhong Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, Z. et al. (2020). EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59016-1_62

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59015-4

  • Online ISBN: 978-3-030-59016-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics