{"id":"https://openalex.org/W3205877508","doi":"https://doi.org/10.1109/jiot.2021.3119517","title":"A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing","display_name":"A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing","publication_year":2021,"publication_date":"2021-10-14","ids":{"openalex":"https://openalex.org/W3205877508","doi":"https://doi.org/10.1109/jiot.2021.3119517","mag":"3205877508"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3119517","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3119517","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029404256","display_name":"Xiaoying Jia","orcid":"https://orcid.org/0000-0003-4873-7258"},"institutions":[{"id":"https://openalex.org/I174442536","display_name":"South Central University for Nationalities","ror":"https://ror.org/03d7sax13","country_code":"CN","type":"education","lineage":["https://openalex.org/I174442536"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoying Jia","raw_affiliation_strings":["School of Mathematics and Statistics, South-Central University for Nationalities, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, South-Central University for Nationalities, Wuhan, China","institution_ids":["https://openalex.org/I174442536"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088264677","display_name":"Min Luo","orcid":"https://orcid.org/0000-0002-1819-9332"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Luo","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security and the Department of Electrical and Computer Engineering, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security and the Department of Electrical and Computer Engineering, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100361380","display_name":"Li Li","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5029404256"],"corresponding_institution_ids":["https://openalex.org/I174442536"],"apc_list":null,"apc_paid":null,"fwci":4.9573,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.95449824,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"9","issue":"12","first_page":"10108","last_page":"10120"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8636523485183716},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6275812983512878},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5651770830154419},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5629500150680542},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5253604650497437},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5161626935005188},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4796314835548401},{"id":"https://openalex.org/keywords/mobile-edge-computing","display_name":"Mobile edge computing","score":0.4626868963241577},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4541749656200409},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.417554646730423},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.18463221192359924}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8636523485183716},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6275812983512878},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5651770830154419},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5629500150680542},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5253604650497437},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5161626935005188},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4796314835548401},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.4626868963241577},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4541749656200409},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.417554646730423},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.18463221192359924},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3119517","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3119517","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6200000047683716}],"awards":[{"id":"https://openalex.org/G170587851","display_name":null,"funder_award_id":"2020CXGC010115","funder_id":"https://openalex.org/F4320329857","funder_display_name":"Major Scientific and Technological Innovation Project of Shandong Province"},{"id":"https://openalex.org/G2012635144","display_name":null,"funder_award_id":"2019CFB631","funder_id":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province"},{"id":"https://openalex.org/G3423709866","display_name":null,"funder_award_id":"61932016","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4190834028","display_name":null,"funder_award_id":"62172307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5449561768","display_name":null,"funder_award_id":"2020CFA052","funder_id":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province"},{"id":"https://openalex.org/G6286192115","display_name":null,"funder_award_id":"61972294","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G715172484","display_name":null,"funder_award_id":"61802445","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8377217821","display_name":null,"funder_award_id":"2020AEA013","funder_id":"https://openalex.org/F4320336744","funder_display_name":"Science and Technology Program of Hubei Province"},{"id":"https://openalex.org/G932239315","display_name":null,"funder_award_id":"CZT20023","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322186","display_name":"Natural Science Foundation of Hubei Province","ror":null},{"id":"https://openalex.org/F4320329857","display_name":"Major Scientific and Technological Innovation Project of Shandong Province","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320336744","display_name":"Science and Technology Program of Hubei Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1500958697","https://openalex.org/W1904483788","https://openalex.org/W1926090661","https://openalex.org/W1966132871","https://openalex.org/W2054857924","https://openalex.org/W2140125353","https://openalex.org/W2195615353","https://openalex.org/W2262390119","https://openalex.org/W2463724383","https://openalex.org/W2528462506","https://openalex.org/W2540918362","https://openalex.org/W2561614683","https://openalex.org/W2587897831","https://openalex.org/W2594536436","https://openalex.org/W2604733939","https://openalex.org/W2747548784","https://openalex.org/W2749959819","https://openalex.org/W2751904527","https://openalex.org/W2778818299","https://openalex.org/W2786940597","https://openalex.org/W2913231348","https://openalex.org/W2915600598","https://openalex.org/W3011493986","https://openalex.org/W3036530244","https://openalex.org/W3043879871"],"related_works":["https://openalex.org/W2362256793","https://openalex.org/W2035164471","https://openalex.org/W2953422728","https://openalex.org/W2030864601","https://openalex.org/W1479964569","https://openalex.org/W2791572586","https://openalex.org/W2006898868","https://openalex.org/W2755846241","https://openalex.org/W2389999793","https://openalex.org/W2347797128"],"abstract_inverted_index":{"Ensuring":[0],"the":[1,46,69,95,101,107,122,141,145],"security":[2,132,136,147],"and":[3,7,19,53,68,116,134,165],"privacy":[4],"of":[5,22,163],"users":[6],"data":[8],"in":[9,28,94,103,161],"a":[10],"mobile-edge":[11],"computing":[12],"(MEC)":[13],"deployment,":[14],"without":[15],"affecting":[16],"performance,":[17],"latency":[18],"user":[20,66],"quality":[21],"experience":[23],"remain":[24],"challenging.":[25],"For":[26],"example,":[27],"this":[29],"article,":[30],"we":[31,43,99],"revisit":[32],"an":[33],"identity-based":[34],"anonymous":[35],"authentication":[36,96],"scheme":[37,47,86,102,143,155],"designed":[38],"for":[39,118,124],"MEC":[40],"deployment.":[41],"Then,":[42],"reveal":[44],"that":[45,80,140,153],"is":[48,82],"vulnerable":[49],"to":[50,58,105,138],"impersonation,":[51],"replay,":[52],"Denial-of-Service":[54],"(DoS)":[55],"attacks,":[56],"contrary":[57],"their":[59,85],"claims.":[60],"It":[61],"also":[62,78,128],"does":[63],"not":[64],"achieve":[65],"untraceability,":[67],"registration":[70],"center":[71],"must":[72],"be":[73,92],"online":[74],"during":[75],"authentication.":[76],"We":[77,127],"observe":[79],"it":[81],"unclear":[83],"from":[84],"description,":[87],"what":[88],"encryption":[89],"algorithm":[90],"should":[91],"used":[93],"process.":[97],"Therefore,":[98],"redesign":[100],"order":[104],"mitigate":[106],"weaknesses":[108],"pointed":[109],"out.":[110],"Our":[111],"redesigned":[112],"protocol":[113],"uses":[114],"password":[115],"biometrics":[117],"authentication,":[119],"which":[120],"broadens":[121],"scope":[123],"real-world":[125],"implementation.":[126],"provide":[129],"both":[130],"formal":[131],"proof":[133],"heuristic":[135],"analysis":[137],"demonstrate":[139],"proposed":[142],"achieves":[144],"desired":[146],"goals.":[148],"A":[149],"performance":[150],"comparison":[151],"shows":[152],"our":[154],"outperforms":[156],"four":[157],"other":[158],"competing":[159],"schemes":[160],"terms":[162],"computation":[164],"communication":[166],"costs.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
