Abstract
With the rapidly growing user experience and traffic growth requirements in the Mobile Edge Computing (MEC) environment, the conventional security protocols are no longer capable of meeting the modern demand. In order to cope with this demand, novel security solution such as identity-based cryptography, which does not require complex calculations, has attracted great attention from the research community. Recently, Li et al. (IEEE Syst J 1937–9234, 2021, https://doi.org/10.1109/JSYST.2020.2979006) devised an identity-based protocol for the MEC environment. They claimed that their protocol offers efficient and secure communication among the involved entities. Nevertheless, after performing a careful analysis of their protocol, we discovered that their protocol is vulnerable to MEC server and mobile user impersonation attacks. Similarly, their protocol has no provision of mobile user anonymity and untraceability. Furthermore, it has incorrectness in the authentication phase. Given these limitations, we have suggested a suitable remedy, which counters all the said vulnerabilities and limitations.
Availability of Data and Material
There is no data or any other material associated with this manuscript.
References
Filali, A., Abouaomar, A., Cherkaoui, S., Kobbane, A., & Guizani, M. (2020). Multi-access edge computing: A survey. IEEE Access, 8, 197017–197046. https://doi.org/10.1109/ACCESS.2020.3034136
Alwarafy, A., Al-Thelaya, K. A., Abdallah, M., Schneider, J., & Hamdi, M. (2020). A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet of Things Journal, 8(6), 4004–4022. https://doi.org/10.1109/JIOT.2020.3015432
Li, Y., Cheng, Q., Liu, X., & Li, X. (2021). A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Systems Journal. https://doi.org/10.1109/JSYST.2020.2979006.
Irshad, A., Sher, M., Ahmad, H. F., Alzahrani, B. A., Chaudhry, S. A., & Kumar, R. (2016). An improved multi-server authentication scheme for distributed mobile cloud computing services. TIIS, 10(12), 5529–5552. https://doi.org/10.3837/tiis.2016.12.021.
Irshad, A., Sher, M., Chaudhary, S. A., Naqvi, H., & Farash, M. S. (2016). An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging registration centre. The Journal of Supercomputing, 72(4), 1623–1644. https://doi.org/10.1007/s11227-016-1688-9
Hussain, S., & Chaudhry, S. A. (2019). Comments on ‘biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment’’. IEEE Internet of Things Journal, 6(6), 10936–10940. https://doi.org/10.1109/JIOT.2019.2934947.
Shamshad, S., Mahmood, K., Kumari, S., & Khan, M. K. (2021). Comments on “insider attack protection: Lightweight password-based authentication techniques using ecc.” IEEE Systems Journal. https://doi.org/10.1109/JSYST.2020.2986377.
Yang, Q., Gasti, P., Zhou, G., Farajidavar, A., & Balagani, K. S. (2016). On inferring browsing activity on smartphones via USB power analysis side-channel. IEEE Transactions on Information Forensics and Security, 12(5), 1056–1066. https://doi.org/10.1109/TIFS.2016.2639446.
Gope, P., & Sikdar, B. (2018). Lightweight and privacy-preserving two-factor authentication scheme for IOT devices. IEEE Internet of Things Journal, 6(1), 580–589. https://doi.org/10.1109/JIOT.2018.2846299.
Funding
The work of Dr. Muhammad Khurram Khan is supported by Researchers Supporting Project number (RSP-2021/12), King Saud University, Riyadh, Saudi Arabia
Author information
Authors and Affiliations
Contributions
Writing-original draft: SS, KM, MR, MKK, and MSO; Conceptualization: MR, KM, and YBZ; Writing-review and Editing: SS, KM, MKK, and MSO; Investigation KM, MKK, and MSO; Supervision: KM, MKK and MSO;
Corresponding author
Ethics declarations
Conflicts of interest
The authors have no competing interests.
Code Availability
Not Applicabel.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shamshad, S., Rana, M., Mahmood, K. et al. On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing. Wireless Pers Commun 124, 283–292 (2022). https://doi.org/10.1007/s11277-021-09338-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-09338-7