Privacy-Enhanced AKMA for Multi-Access Edge Computing Mobility

نویسندگان

چکیده

Multi-access edge computing (MEC) is an emerging technology of 5G that brings cloud benefits closer to the user. The current specifications MEC describe connectivity mobile users and host, but they have issues with application-level security privacy. We consider how provide secure privacy-preserving communication channels between a user application in non-roaming case. It includes protocols for registration main server application, renewal shared key, usage host when stationary or mobile. For these protocols, we designed privacy-enhanced version authentication key management applications (AKMA) service. formally verified specification AKMA using ProVerif found new spoofing attack as well other privacy vulnerabilities. Then propose fix against attack. considering shortcomings. adapted it our solution.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

Reliable Distributed Authentication in Multi-Access Mobile Edge Computing

The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...

متن کامل

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

Preserving Location Privacy in Mobile Edge Computing

The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the...

متن کامل

22 Privacy - enhanced Location - based Access Control

Advancements in location technologies reliability and precision are fostering the development of location-based services that make use of the location information of users. An increasingly important category of such services is represented by Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with access conditions based on the physical position of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers

سال: 2022

ISSN: ['2073-431X']

DOI: https://doi.org/10.3390/computers12010002