Private Key Management Scheme for Mobile Edge Computing

被引:0
|
作者
Jiang J.-W. [1 ]
Wang D. [2 ,3 ]
Zhang G.-Y. [1 ]
Chen Z.-Y. [1 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University, Harbin
[2] College of Cyber Science, Nankai University, Tianjin
[3] National Engineering Laboratory of Mobile Network Security (Nankai University), Tianjin
来源
基金
中国国家自然科学基金;
关键词
Dynamically updatable; Mobile edge computing; Private key management; Ransparent zero knowledge verifiable polynomial delegation; Verifiable secret sharing;
D O I
10.11897/SP.J.1016.2022.01348
中图分类号
学科分类号
摘要
Mobile edge computing (MEC) combines the Internet service environment and cloud computing technology at the edge of the network to provide mobile users with high bandwidth and low latency computing and storage services. In the MEC network, mobile users and servers form a group for communication and data transmission. Once the private key of the server or the data encryption key of mobile users is leaked, it will cause serious security risks and economic losses, and this loss is often irreversible. By designing the key management protocol for MEC, the functions of key distribution, update, and storage can be realized to protect the privacy and security of the MEC network. However, the node structure in MEC changes dynamically in real-time: on the one hand, with the continuous development of MEC, the servers in the MEC network will be added or replaced; On the other hand, mobile users in the MEC network will frequently join or exit the network. Therefore, key management protocols need to ensure forward security and backward security, and also need to consider resisting collusion attacks in the distributed key management protocol, which brings challenges to how to design the private key management scheme for MEC. In recent years, researchers have proposed a number of distributed network key management protocols, but these key management protocols are not suitable for MEC networks. Because there are a large number of mobile devices in the MEC network, the traditional network key management protocol is difficult to meet the needs of MEC network users for frequent free movement, device location identification, and low communication delay, and it is difficult to be directly applied to MEC network. On the one hand, MEC servers need to securely manage their private keys, which can derive authentication certificates, communication keys, and broadcast keys for mobile users that log in to the MEC network. On the other hand, mobile users and MEC servers need to use data encryption keys to ensure secure communication and data transmission. Therefore, it is necessary to design a key management protocol for MEC based on the physical characteristics and actual requirements of the MEC network. The research of this paper is divided into two parts: firstly, a non-interactive transparent zero-knowledge verifiable polynomial delegate is constructed, and based on this technology, a threshold secret sharing protocol supporting verifiable communication secret, dynamic update of secret share, and dynamic change of server node is designed to protect the security of MEC servers private key; Then, a MEC network key management protocol is proposed to support users' free access and ensure the security of network communication, to protect the communication and data security of mobile users in MEC network. Then we strictly prove the security of the proposed protocol through formal proof and hybrid simulation games. The results show that the private key management scheme for MEC proposed in this paper meets forward security and backward security, and can resist all kinds of known attacks. Compared with related protocols, the results show that the new protocol not only improves security but also maintains high efficiency, which is suitable for the MEC network environment. © 2022, Science Press. All right reserved.
引用
收藏
页码:1348 / 1372
页数:24
相关论文
共 91 条
  • [1] Shi W, Cao J, Zhang Q, Et al., Edge computing: Vision and challenges, IEEE Internet of Things Journal, 3, 5, pp. 637-646, (2016)
  • [2] Rimal B P, Van D P, Maier M., Mobile edge computing empowered fiber-wireless access networks in the 5G era, IEEE Communications Magazine, 55, 2, pp. 192-200, (2017)
  • [3] Bastug E, Bennis M, Debbah M., Living on the edge: The role of proactive caching in 5G wireless networks, IEEE Communications Magazine, 52, 8, pp. 82-89, (2014)
  • [4] Mehta A, Tarneberg W, Klein C, Et al., How beneficial are intermediate layer data centers in mobile edge networks?, Systems, pp. 222-229, (2016)
  • [5] Hu W, Gao Y, Ha K, Et al., Quantifying the impact of edge computing on mobile applications, Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems, pp. 1-8, (2016)
  • [6] Jalali F, Hinton K, Ayre R, Et al., Fog computing may help to save energy in cloud computing, IEEE Journal on Selected Areas in Communications, 34, 5, pp. 1728-1739, (2016)
  • [7] Wang C, Wang D, Tu Y, Et al., Understanding node capture attacks in user authentication schemes for wireless sensor networks, IEEE Transactions on Dependable and Secure Computing, (2020)
  • [8] Wang Chen-Yu, Wang Ding, Wang Fei-Fei, Et al., Multi-factor user authentication scheme for multi-gateway wireless sensor networks, Chinese Journal of Computers, 43, 4, pp. 683-700, (2020)
  • [9] Wang D, Wang P, Wang C., Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs, ACM Transactions on Cyber-Physical Systems, 4, 3, pp. 1-26, (2020)
  • [10] Chen Z, Li S, Wu Q, Et al., A distributed secret share update scheme with public verifiability for ad hoc network, Security and Communication Networks, 8, 8, pp. 1485-1493, (2015)