SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing

Handover authentication in mobile scenarios refers to the process of re-authentication when a mobile device switches from one edge server to another. However, existing handover authentication schemes fail to optimize handover latency, security, and energy consumption comprehensively. To ensure conti...

Full description

Saved in:
Bibliographic Details
Main Authors: Ziwang Wang, Liang Wang, Huili Yan, Zhize Wu
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10750817/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846150412899450880
author Ziwang Wang
Liang Wang
Huili Yan
Zhize Wu
author_facet Ziwang Wang
Liang Wang
Huili Yan
Zhize Wu
author_sort Ziwang Wang
collection DOAJ
description Handover authentication in mobile scenarios refers to the process of re-authentication when a mobile device switches from one edge server to another. However, existing handover authentication schemes fail to optimize handover latency, security, and energy consumption comprehensively. To ensure continuity, security, and lightweight operation during switching, we propose SREHA, an efficient handover authentication scheme based on social relationships. First, the edge server builds its own social circle through bidirectional identity and integrity authentication, saving the social relationships in the public blockchain. Second, when the mobile device performs handover authentication, it evaluates the trustworthiness of the target node based on the social relationships of the current edge server node and filters the nodes that satisfy the trustworthiness criteria. By transferring the authentication load to the server side, SREHA prevents the device from expending significant resources to maintain reputation and authentication information, thereby achieving a lightweight handover authentication process. Third, we propose a malicious node detection model based on heuristic algorithms, which enhances the security of the handover authentication-free framework. Lastly, we implement a prototype of the proposed scheme and validate its security using the Scyther formal validation tool. The results demonstrate that our scheme effectively reduces the time delay of the handover authentication process, and exhibits lower computational overhead and higher security compared to existing schemes.
format Article
id doaj-art-b3cf02bac48f4a43a48b781cdec06ba4
institution Kabale University
issn 2169-3536
language English
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-b3cf02bac48f4a43a48b781cdec06ba42024-11-29T00:02:01ZengIEEEIEEE Access2169-35362024-01-011217501917503110.1109/ACCESS.2024.349655510750817SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge ComputingZiwang Wang0https://orcid.org/0000-0003-3027-7003Liang Wang1https://orcid.org/0000-0001-5022-3956Huili Yan2Zhize Wu3https://orcid.org/0009-0009-3672-0054School of Artificial Intelligence and Big Data, Hefei University, Hefei, ChinaSchool of Artificial Intelligence and Big Data, Hefei University, Hefei, ChinaSchool of Artificial Intelligence and Big Data, Hefei University, Hefei, ChinaSchool of Artificial Intelligence and Big Data, Hefei University, Hefei, ChinaHandover authentication in mobile scenarios refers to the process of re-authentication when a mobile device switches from one edge server to another. However, existing handover authentication schemes fail to optimize handover latency, security, and energy consumption comprehensively. To ensure continuity, security, and lightweight operation during switching, we propose SREHA, an efficient handover authentication scheme based on social relationships. First, the edge server builds its own social circle through bidirectional identity and integrity authentication, saving the social relationships in the public blockchain. Second, when the mobile device performs handover authentication, it evaluates the trustworthiness of the target node based on the social relationships of the current edge server node and filters the nodes that satisfy the trustworthiness criteria. By transferring the authentication load to the server side, SREHA prevents the device from expending significant resources to maintain reputation and authentication information, thereby achieving a lightweight handover authentication process. Third, we propose a malicious node detection model based on heuristic algorithms, which enhances the security of the handover authentication-free framework. Lastly, we implement a prototype of the proposed scheme and validate its security using the Scyther formal validation tool. The results demonstrate that our scheme effectively reduces the time delay of the handover authentication process, and exhibits lower computational overhead and higher security compared to existing schemes.https://ieeexplore.ieee.org/document/10750817/Mobile edge computinghandover authenticationsocial relationshipheuristic algorithm
spellingShingle Ziwang Wang
Liang Wang
Huili Yan
Zhize Wu
SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing
IEEE Access
Mobile edge computing
handover authentication
social relationship
heuristic algorithm
title SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing
title_full SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing
title_fullStr SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing
title_full_unstemmed SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing
title_short SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing
title_sort sreha an efficient handover authentication scheme based on social relationships in mobile edge computing
topic Mobile edge computing
handover authentication
social relationship
heuristic algorithm
url https://ieeexplore.ieee.org/document/10750817/
work_keys_str_mv AT ziwangwang srehaanefficienthandoverauthenticationschemebasedonsocialrelationshipsinmobileedgecomputing
AT liangwang srehaanefficienthandoverauthenticationschemebasedonsocialrelationshipsinmobileedgecomputing
AT huiliyan srehaanefficienthandoverauthenticationschemebasedonsocialrelationshipsinmobileedgecomputing
AT zhizewu srehaanefficienthandoverauthenticationschemebasedonsocialrelationshipsinmobileedgecomputing