Skip to main content
Log in

On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the rapidly growing user experience and traffic growth requirements in the Mobile Edge Computing (MEC) environment, the conventional security protocols are no longer capable of meeting the modern demand. In order to cope with this demand, novel security solution such as identity-based cryptography, which does not require complex calculations, has attracted great attention from the research community. Recently, Li et al. (IEEE Syst J 1937–9234, 2021, https://doi.org/10.1109/JSYST.2020.2979006) devised an identity-based protocol for the MEC environment. They claimed that their protocol offers efficient and secure communication among the involved entities. Nevertheless, after performing a careful analysis of their protocol, we discovered that their protocol is vulnerable to MEC server and mobile user impersonation attacks. Similarly, their protocol has no provision of mobile user anonymity and untraceability. Furthermore, it has incorrectness in the authentication phase. Given these limitations, we have suggested a suitable remedy, which counters all the said vulnerabilities and limitations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Availability of Data and Material

There is no data or any other material associated with this manuscript.

References

  1. Filali, A., Abouaomar, A., Cherkaoui, S., Kobbane, A., & Guizani, M. (2020). Multi-access edge computing: A survey. IEEE Access, 8, 197017–197046. https://doi.org/10.1109/ACCESS.2020.3034136

    Article  Google Scholar 

  2. Alwarafy, A., Al-Thelaya, K. A., Abdallah, M., Schneider, J., & Hamdi, M. (2020). A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet of Things Journal, 8(6), 4004–4022. https://doi.org/10.1109/JIOT.2020.3015432

    Article  Google Scholar 

  3. Li, Y., Cheng, Q., Liu, X., & Li, X. (2021). A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Systems Journal. https://doi.org/10.1109/JSYST.2020.2979006.

    Article  Google Scholar 

  4. Irshad, A., Sher, M., Ahmad, H. F., Alzahrani, B. A., Chaudhry, S. A., & Kumar, R. (2016). An improved multi-server authentication scheme for distributed mobile cloud computing services. TIIS, 10(12), 5529–5552. https://doi.org/10.3837/tiis.2016.12.021.

    Article  Google Scholar 

  5. Irshad, A., Sher, M., Chaudhary, S. A., Naqvi, H., & Farash, M. S. (2016). An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging registration centre. The Journal of Supercomputing, 72(4), 1623–1644. https://doi.org/10.1007/s11227-016-1688-9

    Article  Google Scholar 

  6. Hussain, S., & Chaudhry, S. A. (2019). Comments on ‘biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment’’. IEEE Internet of Things Journal, 6(6), 10936–10940. https://doi.org/10.1109/JIOT.2019.2934947.

    Article  Google Scholar 

  7. Shamshad, S., Mahmood, K., Kumari, S., & Khan, M. K. (2021). Comments on “insider attack protection: Lightweight password-based authentication techniques using ecc.” IEEE Systems Journal. https://doi.org/10.1109/JSYST.2020.2986377.

    Article  Google Scholar 

  8. Yang, Q., Gasti, P., Zhou, G., Farajidavar, A., & Balagani, K. S. (2016). On inferring browsing activity on smartphones via USB power analysis side-channel. IEEE Transactions on Information Forensics and Security, 12(5), 1056–1066. https://doi.org/10.1109/TIFS.2016.2639446.

    Article  Google Scholar 

  9. Gope, P., & Sikdar, B. (2018). Lightweight and privacy-preserving two-factor authentication scheme for IOT devices. IEEE Internet of Things Journal, 6(1), 580–589. https://doi.org/10.1109/JIOT.2018.2846299.

    Article  Google Scholar 

Download references

Funding

The work of Dr. Muhammad Khurram Khan is supported by Researchers Supporting Project number (RSP-2021/12), King Saud University, Riyadh, Saudi Arabia

Author information

Authors and Affiliations

Authors

Contributions

Writing-original draft: SS, KM, MR, MKK, and MSO; Conceptualization: MR, KM, and YBZ; Writing-review and Editing: SS, KM, MKK, and MSO; Investigation KM, MKK, and MSO; Supervision: KM, MKK and MSO;

Corresponding author

Correspondence to Khalid Mahmood.

Ethics declarations

Conflicts of interest

The authors have no competing interests.

Code Availability

Not Applicabel.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shamshad, S., Rana, M., Mahmood, K. et al. On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing. Wireless Pers Commun 124, 283–292 (2022). https://doi.org/10.1007/s11277-021-09338-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09338-7

Keywords

Navigation