Affiliation:
1. State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
2. Faculty of Mathematics University of Waterloo Waterloo Canada
3. Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia
4. Department of Computing Macquarie University Sydney Australia
5. College of Big Data and Intelligent Engineering Southwest Forestry University China
Abstract
AbstractEdge computing is regarded as an extension of cloud computing that brings computing and storage resources to the network edge. For some Industrial Internet of Things (IIoT) applications such as supply‐chain supervision and collaboration, Internet of Vehicles, real‐time video analysis and so forth, users should be authenticated before visiting the geographically distributed edge servers. Limited by the considerable latency between the cloud and edge servers, and the limited capacity of edge servers, it is infeasible to copy the authentication method from cloud servers when users are authenticated in edge servers. In view of this challenge, this paper proposes a novel token‐based authentication scheme, named EdgeAuth, that enables fast edge user authentication through collaboration among cloud servers and edge servers. Under the EdgeAuth scheme, edge servers can rapidly verify the credentials of users who have been authenticated by the cloud server. EdgeAuth can also protect users from a series of authentication attacks, for example, the replay attack, DoS attack and man‐in‐the‐middle attack. The results of experiments conducted on a simulated edge computing environment validate the usefulness of EdgeAuth through a comparison in latency and throughput against two baseline schemes.
Funder
National Key Research and Development Program of China
National Natural Science Foundation of China
Reference48 articles.
1. Big data with cloud computing: discussions and challenges;Amanpreet Kaur S;Big Data Mini Analy,2021
2. A Correlation Graph based Approach for Personalized and Compatible Web APIs Recommendation in Mobile APP Development
3. Sampling‐based approximate skyline query in sensor equipped IoT networks;Ji L;Tsinghua Sci Technol,2020
4. IoT-based data logger for weather monitoring using arduino-based wireless sensor networks with remote graphical application and alerts
5. A game‐theoretical approach for user allocation in edge computing environment;Qiang H;IEEE Trans Parallel Distribut Syst,2019
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献