Skip to main content
Top
Published in: Wireless Personal Communications 1/2020

08-05-2020

A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing

Authors: Chin-Ling Chen, Mao-Lun Chiang, Hui-Ching Hsieh, Ching-Cheng Liu, Yong-Yuan Deng

Published in: Wireless Personal Communications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because there is no immediate treatment. Elderly care has become an important issue. According to this issue, we want to monitor the physiological data of the elderly, such as heartbeat, blood pressure, etc., through wearable devices. Once an abnormal condition is detected, the wearable device can be used to immediately request treatment from a nearby clinic or hospital. In order to improve the network quality of this service, we use the architecture of the mobile edge computing. The mobile edge computing provides features such as immediacy, low latency, proximity etc. However, the process of data transmission on the mobile edge computing has the risk of being stolen and identity authentication is also an important issue. Therefore, we propose a secure protocol based on cryptography to protect personal information with lightweight authentication. The proposed scheme aims to achieve mutual authentication, non-repudiation, integrity, user privacy, and defend against known attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
5.
go back to reference Hu, Y. C., Patel, M., Sabella, D., Sprecher, N., & Young, V. (2015). Mobile edge computing—A key technology towards 5G. ETSI White Paper, 11(11), 1–16. Hu, Y. C., Patel, M., Sabella, D., Sprecher, N., & Young, V. (2015). Mobile edge computing—A key technology towards 5G. ETSI White Paper, 11(11), 1–16.
9.
go back to reference Condoluci, M., & Mahmoodi, T. (2018). Softwarization and virtualization in 5G mobile networks: Benefits, trends and challenges. Computer Networks,146, 65–84.CrossRef Condoluci, M., & Mahmoodi, T. (2018). Softwarization and virtualization in 5G mobile networks: Benefits, trends and challenges. Computer Networks,146, 65–84.CrossRef
22.
go back to reference Miller, V. S. (1985). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417–426). Berlin: Springer. Miller, V. S. (1985). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417–426). Berlin: Springer.
25.
go back to reference Burrows, M., Abad, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London. Series A, Mathematical and Physical Sciences,426, 233–271.MathSciNetMATH Burrows, M., Abad, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London. Series A, Mathematical and Physical Sciences,426, 233–271.MathSciNetMATH
26.
go back to reference Tang, X., & Xu, J. (2005). QoS-aware replica placement for content distribution. IEEE Transactions on Parallel and Distributed Systems,16(10), 921–932.CrossRef Tang, X., & Xu, J. (2005). QoS-aware replica placement for content distribution. IEEE Transactions on Parallel and Distributed Systems,16(10), 921–932.CrossRef
27.
go back to reference Marcus, M. J. (2015). 5G and IMT for 2020 and beyond. IEEE Wireless Communications,22(4), 2–3.CrossRef Marcus, M. J. (2015). 5G and IMT for 2020 and beyond. IEEE Wireless Communications,22(4), 2–3.CrossRef
Metadata
Title
A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing
Authors
Chin-Ling Chen
Mao-Lun Chiang
Hui-Ching Hsieh
Ching-Cheng Liu
Yong-Yuan Deng
Publication date
08-05-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2020
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07240-2

Other articles of this Issue 1/2020

Wireless Personal Communications 1/2020 Go to the issue