SDN-Based Handover Authentication Scheme for Mobile Edge Computing in Cyber-Physical Systems

被引:52
|
作者
Wang, Cong [1 ]
Zhang, Yiying [1 ]
Chen, Xi [2 ]
Liang, Kun [1 ]
Wang, Zhiwei [2 ]
机构
[1] Tianjin Univ Sci & Technol, Coll Comp Sci & Informat Engn, Tianjin 300010, Peoples R China
[2] GEIRI North Amer, Dept Dev & Planning, San Jose, CA 95134 USA
基金
中国国家自然科学基金;
关键词
Cyber security; cyber-physical systems (CPSs); edge computing; handover authentication; INTERNET;
D O I
10.1109/JIOT.2019.2922979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile edge computing (MEC) in cyber-physical systems (CPSs) with massive resource-constrained edge computing node (ECN) faces new challenges in security provisioning. The traditional centralized security authentication schemes with low performance are no longer applied for MEC in CPS. Due to the mobility of ECN, it is extraordinarily practical for ECN to establish a security association with another AP once leaving the service area of its current AP. In this paper, we represent the related research and propose a novel and efficient softwaredefined networking (SDN)-based handover authentication scheme for MEC in CPS (SHAS). An authentication handover module (AHM) in the SDN controller is applied for key distribution and authentication management. Before ECN handovers, the AHM distributes a key to the current serving AP for ECN further handover. Whenever a handover happens, target AP requests the AHM for the one-time session key (OSK) to authenticate the ECN. The target AP and ECN can proceed with the 3-way handshake protocol by the OSK to achieve mutual authentication and secret key confidentiality. Using the logical derivation of Burrows, Abadi, and Needham and formal verification by automated validation of Internet security protocols and applications (AVISPAs), proposed SHAS scheme can get mutual authentication and secret key confidentiality with a strong anti-attack ability. The simulation results show that the SHAS scheme has the characteristics of lower computational delay and less communication resources. Finally, the practical demonstration of our scheme is done using the widely accepted NS-3 simulation.
引用
收藏
页码:8692 / 8701
页数:10
相关论文
共 50 条
  • [41] Authentication of cyber-physical systems under learning-based attacks
    Khojasteh, Mohammad Javad
    Khina, Anatoly
    Franceschetti, Massimo
    Javidi, Tara
    IFAC PAPERSONLINE, 2019, 52 (20): : 369 - 374
  • [42] Collaborative computation offloading for scheduling emergency tasks in SDN-based mobile edge computing networks
    Al-hammadi, Ikhlas
    Li, Mingchu
    Islam, Sardar M. N.
    Al-Mosharea, Esmail
    COMPUTER NETWORKS, 2024, 238
  • [43] Autonomic Computing Technologies for Cyber-Physical Systems
    Chun, Ingeol
    Park, Jeongmin
    Kim, Wontae
    Kang, Woochun
    Lee, Haeyoung
    Park, Seungmin
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1009 - 1014
  • [44] Predictable Fog Computing for Cyber-physical Systems
    Harjuhahto, Jaakko
    2022 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2022), 2022, : 190 - 191
  • [45] Cyber-Physical Systems: The Next Computing Revolution
    Rajkumar, Ragunathan
    Lee, Insup
    Sha, Lui
    Stankovic, John
    PROCEEDINGS OF THE 47TH DESIGN AUTOMATION CONFERENCE, 2010, : 731 - 736
  • [46] Intelligent and pervasive computing for cyber-physical systems
    Mohammad R. Khosravi
    Varun G. Menon
    The Journal of Supercomputing, 2021, 77 : 5237 - 5238
  • [47] Intelligent and pervasive computing for cyber-physical systems
    Khosravi, Mohammad R.
    Menon, Varun G.
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (05): : 5237 - 5238
  • [48] MODELING OF CYBER-PHYSICAL SYSTEMS AND DIGITAL TWIN BASED ON EDGE COMPUTING, FOG COMPUTING AND CLOUD COMPUTING TOWARDS SMART MANUFACTURING
    Qi, Qinglin
    Zhao, Dongming
    Liao, T. Warren
    Tao, Fei
    PROCEEDINGS OF THE ASME 13TH INTERNATIONAL MANUFACTURING SCIENCE AND ENGINEERING CONFERENCE, 2018, VOL 1, 2018,
  • [49] McCLS: Certificateless Signature Scheme for Emergency Mobile Wireless Cyber-Physical Systems
    Xu, Zhong
    Liu, Xue
    Zhang, Guoqing
    He, Wenbo
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2008, 3 (04) : 395 - 411
  • [50] Security and Efficient Authentication Scheme for Mobile Edge Computing
    Xue J.-B.
    Bai Z.-M.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 44 (01): : 110 - 116