Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Entire DC Network
Identity-Based Edge Computing Anonymous Authentication Protocol, Naixin Kang, Zhenhu Ning, Shiqiang Zhang, Sadaqat Ur Rehman, Muhammad Waqas
Identity-Based Edge Computing Anonymous Authentication Protocol, Naixin Kang, Zhenhu Ning, Shiqiang Zhang, Sadaqat Ur Rehman, Muhammad Waqas
Research outputs 2022 to 2026
With the development of sensor technology and wireless communication technology, edge computing has a wider range of applications. The privacy protection of edge computing is of great significance. In the edge computing system, in order to ensure the credibility of the source of terminal data, mobile edge computing (MEC) needs to verify the signature of the terminal node on the data. During the signature process, the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance. Therefore, it is very necessary to improve efficiency through computational offloading. Therefore, this paper proposes an identity-based …