Final published version
Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - A low-cost privacy preserving user access in mobile edge computing framework
AU - Irshad, Azeem
AU - Chaudhry, Shehzad Ashraf
AU - Ghani, Anwar
AU - Mallah, Ghulam Ali
AU - Bilal, Muhammad
AU - Alzahrani, Bander A.
PY - 2022/3/31
Y1 - 2022/3/31
N2 - The computational offloading from conventional cloud datacenter towards edge devices sprouted a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in the form of increased availability, bandwidth with low latency. The MEC offers real-time computing and storage facility within the proximity of mobile user-access network, hence it is imperative to secure communication between end user and edge server. The existing schemes do not fulfill real time processing and efficiency requirements for using complex crypto-primitives. To this end, we propose a novel two-factor biometric authentication protocol for MEC enabling efficient and secure combination of Physically Unclonable Functions (PUFs) with user-oriented biometrics employing fuzzy extractor-based procedures. The performance analysis depicts that our scheme offers resistance to known attacks using lightweight operations and supports 30% more security features than comparative studies. Our scheme is provably secure under Real-or-Random (ROR) formal security analysis model.
AB - The computational offloading from conventional cloud datacenter towards edge devices sprouted a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in the form of increased availability, bandwidth with low latency. The MEC offers real-time computing and storage facility within the proximity of mobile user-access network, hence it is imperative to secure communication between end user and edge server. The existing schemes do not fulfill real time processing and efficiency requirements for using complex crypto-primitives. To this end, we propose a novel two-factor biometric authentication protocol for MEC enabling efficient and secure combination of Physically Unclonable Functions (PUFs) with user-oriented biometrics employing fuzzy extractor-based procedures. The performance analysis depicts that our scheme offers resistance to known attacks using lightweight operations and supports 30% more security features than comparative studies. Our scheme is provably secure under Real-or-Random (ROR) formal security analysis model.
KW - Authentication
KW - IoT
KW - Pervasive and mobile edge computing
KW - PUF
KW - Symmetric key operations
U2 - 10.1016/j.compeleceng.2022.107692
DO - 10.1016/j.compeleceng.2022.107692
M3 - Journal article
AN - SCOPUS:85122640336
VL - 98
JO - Computers and Electrical Engineering
JF - Computers and Electrical Engineering
SN - 0045-7906
M1 - 107692
ER -