4,343 Hits in 5.8 sec

A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

Mohammed Ramadan, Guohong Du, Fagen Li, Chunxiang Xu
2016 Symmetry  
In Section 5, we present security solutions with new directions in the field of PKI-based security for mobile communications. Finally, Section 6 draws some conclusions.  ...  This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key  ...  Nevertheless, this scheme provides a new session key for each and every new communication. VLR uses its initial identity for every new communication.  ... 
doi:10.3390/sym8090085 fatcat:o4guhy7fxbd4llg3r2lh3423oy

A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks

Jiannan Wei, Xiaojie Wang, Nan Li, Guomin Yang, Yi Mu
2018 IEEE Access  
In this paper, a fog-based privacy-preserving scheme is proposed to enhance the security of the vehicular crowdsensing network.  ...  In this paper, a fog-based privacy-preserving scheme is proposed to enhance the security of the vehicular crowdsensing network.  ...  ACKNOWLEDGMENT The authors wish to thank the reviewers for their helpful comments.  ... 
doi:10.1109/access.2018.2861430 fatcat:jdyurlqwrvhnzjts4qqqgdktju

The quest for personal control over mobile location privacy

Qi He, Dapeng Wu, P. Khosla
2004 IEEE Communications Magazine  
To address this issue, we propose an authorized-anonymous-ID based scheme; this scheme effectively eliminates the need for a trusted server or administration, which is assumed in the previous work.  ...  However, in a ubiquitous computing environment, such a practice exposes the ID of a mobile device at the MAC layer.  ...  We first sketch key components in ubiquitous computing from a security perspective in Section 2.1, and then present our agent-based system architecture for location privacy protection in Section 2.2.  ... 
doi:10.1109/mcom.2004.1299356 fatcat:yvxs3tkdvzef3as6zt2nuyx2wq

A Privacy-Preserved E2E Authenticated Key Exchange Protocol for Multi-Server Architecture in Edge Computing Networks

Chien-Lung Hsu, Tuan-Vinh Le, Chung-Fu Lu, Tzu-Wei Lin, Tzu-Hsien Chuang
2020 IEEE Access  
To provide a trusted edge computing, there must have a robust scheme that allows all participants to mutually authenticate in a secure and privacy-preserved way.  ...  In this paper, we propose a privacy-preserved end-to-end passwordbased authenticated key exchange protocol for multi-server architecture in edge computing networks.  ...  ACKNOWLEDGMENT The authors would like to thank anonymous referees for their valuable suggestions.  ... 
doi:10.1109/access.2020.2976431 fatcat:j5wd5jbbjbboxpipd4pccyhtca

An Overview on Edge Computing Research

Keyan Cao, Yefan Liu, Gongjie Meng, Qimeng Sun
2020 IEEE Access  
It is a new computing paradigm for performing calculations at the edge of the network. Unlike cloud computing, it emphasizes closer to the user and closer to the source of the data.  ...  Then summarize the architecture of edge computing, keyword technology, security and privacy protection, and finally summarize the applications of edge computing.  ...  However, the location privacy protection scheme based on K-Anonymity consumes a large amount of network bandwidth and computational overhead in practical applications, and is not suitable for edge devices  ... 
doi:10.1109/access.2020.2991734 fatcat:6gt7kr44urdcfcq65w7m2anjku

A Survey on Secure Data Analytics in Edge Computing

Dan Liu, Zheng Yan, Wenxiu Ding, Mohammed Atiquzzaman
2019 IEEE Internet of Things Journal  
In this paper, we first introduce the concept and features of edge computing, and then propose a number of requirements for its secure data analytics by analyzing potential security threats in edge computing  ...  The literature still lacks a thorough review on the recent advances in secure data analytics in edge computing.  ...  Fig. 1 . 1 Architecture of edge computing Fig. 2 . 2 PRE-based secure data sharing scheme Fig. 3.  ... 
doi:10.1109/jiot.2019.2897619 fatcat:fqmkiuse4vgafhiexe4ymqtx6m

An Efficient Anonymous Authentication Scheme for Mobile Pay-TV Systems

Yuting Li, Qingfeng Cheng, Jinzheng Cao
2020 Wireless Communications and Mobile Computing  
Anonymous authentication schemes for mobile pay-TV systems came into being.  ...  The proposed scheme is proved to be secure. Moreover, our new scheme performs better in efficiency and storage, compared with several other schemes.  ...  Acknowledgments This work was supported in part by the National Natural Science Foundation of China (Grant 61872449).  ... 
doi:10.1155/2020/8850083 fatcat:pabhd4zh6femnjc3mf6tm526ta

BSNCare+: A Robust IoT-Oriented Healthcare System with Non-Repudiation Transactions

Kuo-Hui Yeh
2016 Applied Sciences  
In this paper, we propose a robust IoT-based healthcare system, called BSNCare+, in which body sensor networks (BSNs) are adopted as the underlying communication architecture.  ...  New types of IoT-based application services are thus presented.  ...  [2] proposed a lightweight authentication scheme for secure multicast functionality in small-scale IoT networks.  ... 
doi:10.3390/app6120418 fatcat:ktoyktourrh6zphclymtklxbay

A Comprehensive Survey on Security and Privacy for Electronic Health Data

Se-Ra Oh, Young-Duk Seo, Euijong Lee, Young-Gab Kim
2021 International Journal of Environmental Research and Public Health  
In particular, edge and fog computing studies for e-health security and privacy were reviewed since the studies had mostly not been analyzed in other survey papers.  ...  Based on the review, we obtained research taxonomy, security concerns, requirements, solutions, research trends, and open challenges for the components with strengths and weaknesses of the analyzed studies  ...  [92] proposed a new IBE scheme and a new identity-based proxy re-encryption (IBPRE) scheme and adopted the proposed identity-based cryptographic techniques into an e-health cloud system to secure e-health  ... 
doi:10.3390/ijerph18189668 pmid:34574593 fatcat:nx7rjvy7tfczjbgmmpqgyiajuu

A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet of Things [article]

Abdulmalik Alwarafy, Khaled A. Al-Thelaya, Mohamed Abdallah
2020 arXiv   pre-print
After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions.  ...  This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT.  ...  For example, designing an identity-based mutual anonymous authentication key agreement protocols for the EC-assisted IoT paradigm would be a promising research direction.  ... 
arXiv:2008.03252v1 fatcat:cwrrmcscandddok5pvry4dx23a

Blockchain-Based Secure Storage Management with Edge Computing for IoT

Nyamtiga, Sicato, Rathore, Sung, Park
2019 Electronics  
Edge computing can be integrated to facilitate mobile devices in offloading their mining tasks to cloud resources.  ...  We based our study on peer-to-peer and blockchain to achieve an Internet of Things (IoT) design supported by edge computing to acquire security and scalability levels needed for the integration.  ...  The P2P architecture in this layer creates a pool of mobilized resources for short-term storage, speedy computation and the analytics.  ... 
doi:10.3390/electronics8080828 fatcat:ox4gijuaojdjtdxqwi2qvhzwii

Secure Healthcare Data Aggregation and Transmission in IoT—A Survey

Ata Ullah, Muhammad Azeem, Humaira Ashraf, Abdulellah A. Alaboudi, Mamoona Humayun, NZ Jhanjhi
2021 IEEE Access  
This paper presents a survey of different data collection and secure transmission schemes where Fog computing based architectures are considered. A taxonomy is presented to categorize the schemes.  ...  We explored the existing surveys to identify a gap in literature that a survey of fog-assisted secure healthcare data collection schemes is yet contributed in literature.  ...  This smart healthcare architecture elaborates security issues for edge and cloud-based hybrid computing and also solved these issues such as mutual authentication, privacy preservation, preserving the  ... 
doi:10.1109/access.2021.3052850 fatcat:6dszryk5rjfdxnsw7usc6kjudm

Security and Privacy Challenges for Internet-of-Things and Fog Computing

Ximeng Liu, Yang Yang, Kim-Kwang Raymond Choo, Huaqun Wang
2018 Wireless Communications and Mobile Computing  
Wang et al. in their paper, entitled "Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology," presented a novel Gini based energy balancing scheme (Gleer) for the atomic network  ...  This attack had not been considered by the existing identity-based proxy signature schemes, which is greatly important for the IoT-Fog computing.  ... 
doi:10.1155/2018/9373961 fatcat:dtklqr7jtze77kap57kckntmmy

Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication

Hung-Yu Chien
2021 Electronics  
In this paper, we propose a novel 2-level composite hashing (2LCH) mechanism to mitigate the problems, and propose the 2LCH-based anonymous IoT and D2D authentication schemes.  ...  The schemes simultaneously achieve high efficiency and strong anonymity for such environments; once two devices successfully complete one instance of the server-assist anonymous authentication, they can  ...  In these scenarios, both cloud-based architectures or edge-service-based architecture are popular. Morabito et al. [23] designed a lightweight edge computation for wide-range IoT applications.  ... 
doi:10.3390/electronics10070789 fatcat:u6msgi7oz5fkxl6nsgoocldsl4

pKAS: A Secure Password-Based Key Agreement Scheme for the Edge Cloud

Ping Liu, Syed Hamad Shirazi, Wei Liu, Yong Xie, Xiaolong Xu
2021 Security and Communication Networks  
For the simplicity and feasibility, password-based authentication and key agreement scheme has gradually become a popular way to protect network security.  ...  Aimed to provide secure and efficient key agreement schemes for data collecting in edge cloud, we propose an efficient and secure key agreement in this paper.  ...  In order to solve these problems, this paper proposes identity verification based on password-based key agreement. is scheme can ensure both sides' identity authentication and data security.  ... 
doi:10.1155/2021/6571700 fatcat:lnzmxitmobcstng5576yq5elay
« Previous Showing results 1 — 15 out of 4,343 results