Privacy-Enhanced AKMA for Multi-Access Edge Computing Mobility
نویسندگان
چکیده
Multi-access edge computing (MEC) is an emerging technology of 5G that brings cloud benefits closer to the user. The current specifications MEC describe connectivity mobile users and host, but they have issues with application-level security privacy. We consider how provide secure privacy-preserving communication channels between a user application in non-roaming case. It includes protocols for registration main server application, renewal shared key, usage host when stationary or mobile. For these protocols, we designed privacy-enhanced version authentication key management applications (AKMA) service. formally verified specification AKMA using ProVerif found new spoofing attack as well other privacy vulnerabilities. Then propose fix against attack. considering shortcomings. adapted it our solution.
منابع مشابه
Access and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملReliable Distributed Authentication in Multi-Access Mobile Edge Computing
The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملPreserving Location Privacy in Mobile Edge Computing
The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the...
متن کامل22 Privacy - enhanced Location - based Access Control
Advancements in location technologies reliability and precision are fostering the development of location-based services that make use of the location information of users. An increasingly important category of such services is represented by Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with access conditions based on the physical position of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers
سال: 2022
ISSN: ['2073-431X']
DOI: https://doi.org/10.3390/computers12010002