跳到主要导航 跳到搜索 跳到主要内容

Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing

  • Jiaqi Yin
  • , Huibiao Zhu*
  • , Yuan Fei*
  • *此作品的通讯作者

科研成果: 期刊稿件文章同行评审

摘要

Mobile Edge Computing (MEC) is proposed to meet the requirements of mobile users for low latency and response time, and its edge nodes will download data from the cloud server in advance, which arouses researchers to pay attention to the privacy-preserving authentication of mobile users and edge nodes, as well as the data integrity verification of edge nodes. Therefore, it is essential and crucial to integrate the authentication methods into data integrity verification protocol. In this paper, we propose a new integrated protocol AICE, i.e., a uthentication and i ntegrity c hecking on e dges, and then formally analyze and automatically validate the correctness and authentication security of the protocol. We first give the information flows of the AICE protocol by combining the privacy-preserving authentication (PPA) protocol and integrity checking protocol for MEC (ICE) together. According to the features of the AICE protocol, we then select the SVO logic to conduct the formal analysis of the protocol from the perspective of theoretical analysis of modal logic. Furthermore, we employ the AVISPA tool to validate the correctness of the protocol from the perspective of mechanical automatic analysis. The theoretical analysis and mechanical results demonstrate that the integrated protocol AICE satisfies the correctness and authentication.

源语言英语
页(从-至)2258-2271
页数14
期刊Mobile Networks and Applications
26
6
DOI
出版状态已出版 - 12月 2021

指纹

探究 'Formal analysis and automated validation of privacy-preserving AICE protocol in mobile edge computing' 的科研主题。它们共同构成独一无二的指纹。

引用此