SDN-Based Handover Authentication Scheme for Mobile Edge Computing in Cyber-Physical Systems

被引:52
|
作者
Wang, Cong [1 ]
Zhang, Yiying [1 ]
Chen, Xi [2 ]
Liang, Kun [1 ]
Wang, Zhiwei [2 ]
机构
[1] Tianjin Univ Sci & Technol, Coll Comp Sci & Informat Engn, Tianjin 300010, Peoples R China
[2] GEIRI North Amer, Dept Dev & Planning, San Jose, CA 95134 USA
基金
中国国家自然科学基金;
关键词
Cyber security; cyber-physical systems (CPSs); edge computing; handover authentication; INTERNET;
D O I
10.1109/JIOT.2019.2922979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile edge computing (MEC) in cyber-physical systems (CPSs) with massive resource-constrained edge computing node (ECN) faces new challenges in security provisioning. The traditional centralized security authentication schemes with low performance are no longer applied for MEC in CPS. Due to the mobility of ECN, it is extraordinarily practical for ECN to establish a security association with another AP once leaving the service area of its current AP. In this paper, we represent the related research and propose a novel and efficient softwaredefined networking (SDN)-based handover authentication scheme for MEC in CPS (SHAS). An authentication handover module (AHM) in the SDN controller is applied for key distribution and authentication management. Before ECN handovers, the AHM distributes a key to the current serving AP for ECN further handover. Whenever a handover happens, target AP requests the AHM for the one-time session key (OSK) to authenticate the ECN. The target AP and ECN can proceed with the 3-way handshake protocol by the OSK to achieve mutual authentication and secret key confidentiality. Using the logical derivation of Burrows, Abadi, and Needham and formal verification by automated validation of Internet security protocols and applications (AVISPAs), proposed SHAS scheme can get mutual authentication and secret key confidentiality with a strong anti-attack ability. The simulation results show that the SHAS scheme has the characteristics of lower computational delay and less communication resources. Finally, the practical demonstration of our scheme is done using the widely accepted NS-3 simulation.
引用
收藏
页码:8692 / 8701
页数:10
相关论文
共 50 条
  • [1] Towards Lightweight Intrusion Identification in SDN-based Industrial Cyber-Physical Systems
    Zainudin, Ahmad
    Akter, Rubina
    Kim, Dong-Seong
    Lee, Jae-Min
    2022 27TH ASIA PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2022): CREATING INNOVATIVE COMMUNICATION TECHNOLOGIES FOR POST-PANDEMIC ERA, 2022, : 610 - 614
  • [2] Real-time QoS-aware Routing Scheme in SDN-based Robotic Cyber-Physical Systems
    Jhaveri, Rutvij H.
    Tan, Rui
    Ramani, Sagar V.
    2019 IEEE 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS SYSTEM AND ROBOTS (ICMSR 2019), 2019, : 18 - 23
  • [3] A SDN Based Cyber-physical Integrated Restoration Scheme for Distribution Systems
    Zhong J.
    Chen C.
    Bie Z.
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2024, 44 (11): : 4193 - 4209
  • [4] Deep Learning for Secure Mobile Edge Computing in Cyber-Physical Transportation Systems
    Chen, Yuanfang
    Zhang, Yan
    Maharjan, Sabita
    Alam, Muhammad
    Wu, Ting
    IEEE NETWORK, 2019, 33 (04): : 36 - 41
  • [5] SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing
    Wang, Ziwang
    Wang, Liang
    Yan, Huili
    Wu, Zhize
    IEEE ACCESS, 2024, 12 : 175019 - 175031
  • [6] An SDN-Based Packet Scheduling Scheme for Transmitting Emergency Data in Mobile Edge Computing Environments
    Lee, Chan Haeng
    Park, JiSu
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2021, 11
  • [7] Handover Management in SDN-based Mobile Networks
    Kuklinski, Slawomir
    Li, Yuhong
    Khoa Truong Dinh
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 194 - 200
  • [8] Synergizing edge computing and blockchain for cyber-physical systems
    Thakur, Payal
    Sehgal, Vivek Kumar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (12):
  • [9] SDN-based IaaS for Mobile Computing
    Ekanayake, Wijaya
    Amarasinghe, Heli
    Karmouch, Ahmed
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 179 - 184
  • [10] Secure Authentication and Trust Management Scheme for Edge AI-Enabled Cyber-Physical Systems
    Xiang, Xinyin
    Cao, Jin
    Fan, Weiguo
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (03) : 3237 - 3249