A User Authentication Schema Under the Integration of Mobile Edge Computing and Blockchain Technology

A User Authentication Schema Under the Integration of Mobile Edge Computing and Blockchain Technology

Feng Xue, Fangju Li
Copyright: © 2023 |Pages: 20
DOI: 10.4018/IJACI.327027
Article PDF Download
Open access articles are freely available for download

Abstract

The safe and efficient authentication of users is the basis for the realization of the Internet of Things. A reliable and fast user authentication schema that combines mobile edge computing and blockchain technology is proposed. This schema adopts the polling hosting method to optimize the practical Byzantine Fault Tolerance (PBFT) algorithm, it reduces the impact of tokens in the algorithm, and ensures trusted authentication. The two-way authentication protocol between the cluster head and the base station, and the one-way authentication protocol between the base station and the sensor node are designed to effectively simplify the authentication process of sensor nodes, which further guarantees the security and speed of user authentication and effectively meets the security, reliability, and convenience requirements of the Internet of Things. Simulation experiments show that the schema can achieve efficient information verification, and the identity authentication time and protocol authentication times are only 23.58 ms and 25.06 ms, respectively, which has obvious performance advantages over the Paillier algorithm, the hybrid Paillier-blowfish algorithm, and the ElGamal algorithm.
Article Preview
Top

A User Authentication Schema Under The Integration Of Mobile Edge Computing And Blockchain Technology

User identity authentication technology is used to identify entity identity in the network world. Correct identity authentication and identification are primary gateways of establishing information system protection; moreover, it is the fundament of building the mutual trust relationship between communication parties (Kaladevi et al., 2022; Su & Long, 2021; S. Wang et al., 2020).

The mobile Internet of Things (IoT) has many problems in data sharing, for example, data redundancy, data security cannot be guaranteed, and a low efficiency of data sharing (Cui et al., 2022; Sandhiya et al., 2021).

Mobile edge computing can decentralize the computing and storage task of central nodes by using multiple edge nodes with the aim of reducing the burden of central nodes; it has been widely applied in mobile networks (Chen et al., 2021; H. Q. Liu et al., 2022; W. Zhang et al., 2022). As a result, it is crucial to introduce moving edge computing to propose an efficient user authentication algorithm.

Traditional user identity authentication schemes mainly include offline identity authentication and centralized electronic identity authentication (Z. Wang et al., 2020). Both have privacy problems that include excessive exposure of user information, which makes it easy to disclose a user’s privacy information (Gao et al., 2021; Hongbin & Zhi, 2023).

The current rapid development of blockchain technology provides new methods to solve the above problems. The emergence of blockchain technology handles the trust problems that exist in traditional centralized applications, enabling all blockchain nodes to successfully complete data interaction without mutual trust. Many existing schemes often have the following problems (Chen et al. 2023): 1) Edge nodes lack reliable authentication protocols, which leads to certain security risks in the received data from terminals; 2) While ensuring trusted identity authentication, the blockchain network layer is prone to significant storage or computational burden; 3) The overall computational and communication costs of the system are difficult to balance, resulting in poor real-time service response.

Different strategies can be adopted in face of the previously mentioned three issues. Among these are:

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 6 Issues (2022): 1 Released, 5 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing