SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing
Handover authentication in mobile scenarios refers to the process of re-authentication when a mobile device switches from one edge server to another. However, existing handover authentication schemes fail to optimize handover latency, security, and energy consumption comprehensively. To ensure conti...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10750817/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1846150412899450880 |
|---|---|
| author | Ziwang Wang Liang Wang Huili Yan Zhize Wu |
| author_facet | Ziwang Wang Liang Wang Huili Yan Zhize Wu |
| author_sort | Ziwang Wang |
| collection | DOAJ |
| description | Handover authentication in mobile scenarios refers to the process of re-authentication when a mobile device switches from one edge server to another. However, existing handover authentication schemes fail to optimize handover latency, security, and energy consumption comprehensively. To ensure continuity, security, and lightweight operation during switching, we propose SREHA, an efficient handover authentication scheme based on social relationships. First, the edge server builds its own social circle through bidirectional identity and integrity authentication, saving the social relationships in the public blockchain. Second, when the mobile device performs handover authentication, it evaluates the trustworthiness of the target node based on the social relationships of the current edge server node and filters the nodes that satisfy the trustworthiness criteria. By transferring the authentication load to the server side, SREHA prevents the device from expending significant resources to maintain reputation and authentication information, thereby achieving a lightweight handover authentication process. Third, we propose a malicious node detection model based on heuristic algorithms, which enhances the security of the handover authentication-free framework. Lastly, we implement a prototype of the proposed scheme and validate its security using the Scyther formal validation tool. The results demonstrate that our scheme effectively reduces the time delay of the handover authentication process, and exhibits lower computational overhead and higher security compared to existing schemes. |
| format | Article |
| id | doaj-art-b3cf02bac48f4a43a48b781cdec06ba4 |
| institution | Kabale University |
| issn | 2169-3536 |
| language | English |
| publishDate | 2024-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-b3cf02bac48f4a43a48b781cdec06ba42024-11-29T00:02:01ZengIEEEIEEE Access2169-35362024-01-011217501917503110.1109/ACCESS.2024.349655510750817SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge ComputingZiwang Wang0https://orcid.org/0000-0003-3027-7003Liang Wang1https://orcid.org/0000-0001-5022-3956Huili Yan2Zhize Wu3https://orcid.org/0009-0009-3672-0054School of Artificial Intelligence and Big Data, Hefei University, Hefei, ChinaSchool of Artificial Intelligence and Big Data, Hefei University, Hefei, ChinaSchool of Artificial Intelligence and Big Data, Hefei University, Hefei, ChinaSchool of Artificial Intelligence and Big Data, Hefei University, Hefei, ChinaHandover authentication in mobile scenarios refers to the process of re-authentication when a mobile device switches from one edge server to another. However, existing handover authentication schemes fail to optimize handover latency, security, and energy consumption comprehensively. To ensure continuity, security, and lightweight operation during switching, we propose SREHA, an efficient handover authentication scheme based on social relationships. First, the edge server builds its own social circle through bidirectional identity and integrity authentication, saving the social relationships in the public blockchain. Second, when the mobile device performs handover authentication, it evaluates the trustworthiness of the target node based on the social relationships of the current edge server node and filters the nodes that satisfy the trustworthiness criteria. By transferring the authentication load to the server side, SREHA prevents the device from expending significant resources to maintain reputation and authentication information, thereby achieving a lightweight handover authentication process. Third, we propose a malicious node detection model based on heuristic algorithms, which enhances the security of the handover authentication-free framework. Lastly, we implement a prototype of the proposed scheme and validate its security using the Scyther formal validation tool. The results demonstrate that our scheme effectively reduces the time delay of the handover authentication process, and exhibits lower computational overhead and higher security compared to existing schemes.https://ieeexplore.ieee.org/document/10750817/Mobile edge computinghandover authenticationsocial relationshipheuristic algorithm |
| spellingShingle | Ziwang Wang Liang Wang Huili Yan Zhize Wu SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing IEEE Access Mobile edge computing handover authentication social relationship heuristic algorithm |
| title | SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing |
| title_full | SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing |
| title_fullStr | SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing |
| title_full_unstemmed | SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing |
| title_short | SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing |
| title_sort | sreha an efficient handover authentication scheme based on social relationships in mobile edge computing |
| topic | Mobile edge computing handover authentication social relationship heuristic algorithm |
| url | https://ieeexplore.ieee.org/document/10750817/ |
| work_keys_str_mv | AT ziwangwang srehaanefficienthandoverauthenticationschemebasedonsocialrelationshipsinmobileedgecomputing AT liangwang srehaanefficienthandoverauthenticationschemebasedonsocialrelationshipsinmobileedgecomputing AT huiliyan srehaanefficienthandoverauthenticationschemebasedonsocialrelationshipsinmobileedgecomputing AT zhizewu srehaanefficienthandoverauthenticationschemebasedonsocialrelationshipsinmobileedgecomputing |