SDN-Based Handover Authentication Scheme for Mobile Edge Computing in Cyber-Physical Systems

被引:52
|
作者
Wang, Cong [1 ]
Zhang, Yiying [1 ]
Chen, Xi [2 ]
Liang, Kun [1 ]
Wang, Zhiwei [2 ]
机构
[1] Tianjin Univ Sci & Technol, Coll Comp Sci & Informat Engn, Tianjin 300010, Peoples R China
[2] GEIRI North Amer, Dept Dev & Planning, San Jose, CA 95134 USA
基金
中国国家自然科学基金;
关键词
Cyber security; cyber-physical systems (CPSs); edge computing; handover authentication; INTERNET;
D O I
10.1109/JIOT.2019.2922979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile edge computing (MEC) in cyber-physical systems (CPSs) with massive resource-constrained edge computing node (ECN) faces new challenges in security provisioning. The traditional centralized security authentication schemes with low performance are no longer applied for MEC in CPS. Due to the mobility of ECN, it is extraordinarily practical for ECN to establish a security association with another AP once leaving the service area of its current AP. In this paper, we represent the related research and propose a novel and efficient softwaredefined networking (SDN)-based handover authentication scheme for MEC in CPS (SHAS). An authentication handover module (AHM) in the SDN controller is applied for key distribution and authentication management. Before ECN handovers, the AHM distributes a key to the current serving AP for ECN further handover. Whenever a handover happens, target AP requests the AHM for the one-time session key (OSK) to authenticate the ECN. The target AP and ECN can proceed with the 3-way handshake protocol by the OSK to achieve mutual authentication and secret key confidentiality. Using the logical derivation of Burrows, Abadi, and Needham and formal verification by automated validation of Internet security protocols and applications (AVISPAs), proposed SHAS scheme can get mutual authentication and secret key confidentiality with a strong anti-attack ability. The simulation results show that the SHAS scheme has the characteristics of lower computational delay and less communication resources. Finally, the practical demonstration of our scheme is done using the widely accepted NS-3 simulation.
引用
收藏
页码:8692 / 8701
页数:10
相关论文
共 50 条
  • [31] Trustworthiness in Mobile Cyber-Physical Systems
    Suh, Hyo-Joong
    Son, Junggab
    Kang, Kyungtae
    APPLIED SCIENCES-BASEL, 2021, 11 (04):
  • [32] Development of an edge computing-based cyber-physical machine tool
    Zhang, Jian
    Deng, Changyi
    Zheng, Pai
    Xu, Xun
    Ma, Zhentao
    ROBOTICS AND COMPUTER-INTEGRATED MANUFACTURING, 2021, 67
  • [33] An Intelligent Edge-Computing-Based Method to Counter Coupling Problems in Cyber-Physical Systems
    Wang, Tian
    Liang, Yuzhu
    Yang, Yi
    Xu, Guangquan
    Peng, Hao
    Liu, Anfeng
    Lia, Weijia
    IEEE NETWORK, 2020, 34 (03): : 16 - 22
  • [34] Resource optimization in edge and SDN-based edge computing: a comprehensive study
    Nain, Ajay
    Sheikh, Sophiya
    Shahid, Mohammad
    Malik, Rohit
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5517 - 5545
  • [35] Handover Management for Distributed Mobility Management in SDN-based Mobile Networks
    Battulga, D.
    Ankhzaya, J.
    Ankhbayar, B.
    Ganbayar, U.
    Sodbileg, S. H.
    2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2017, : 1 - 6
  • [36] DistressNet-NG: A Resilient Data Storage and Sharing Framework for Mobile Edge Computing in Cyber-Physical Systems
    Sagor, Mohammad
    Haroon, Amran
    Stoleru, Radu
    Bhunia, Suman
    Altaweel, Ala
    Chao, Mengyuan
    Jin, Liuyi
    Maurice, Maxwell
    Blalock, Roger
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2024, 8 (03)
  • [37] Resilience of Cyber-Physical Systems: Role of AI, Digital Twins, and Edge Computing
    Jin A.S.
    Hogewood L.
    Fries S.
    Lambert J.H.
    Fiondella L.
    Strelzoff A.
    Boone J.
    Fleckner K.
    Linkov I.
    IEEE Engineering Management Review, 2022, 50 (02): : 195 - 203
  • [38] An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems
    Adil, Muhammad
    Khan, Muhammad Khurram
    Jadoon, Muhammad Mohsin
    Attique, Muhammad
    Song, Houbing
    Farouk, Ahmed
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2719 - 2730
  • [39] Edge Computing for Cyber-physical Systems: A Systematic Mapping Study Emphasizing Trustworthiness
    Sanchez, Jose Manuel Gaspar
    Jorgensen, Nils
    Torngren, Martin
    Inam, Rafia
    Berezovskyi, Andrii
    Feng, Lei
    Fersman, Elena
    Ramli, Muhammad Rusyadi
    Tan, Kaige
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2022, 6 (03)
  • [40] Filtering Scheme for Context-Aware Fog Computing in Cyber-Physical Systems
    Mononen, Teemu
    Aref, Mohammad M.
    Mattila, Jouni
    2018 14TH IEEE/ASME INTERNATIONAL CONFERENCE ON MECHATRONIC AND EMBEDDED SYSTEMS AND APPLICATIONS (MESA), 2018,