[HTML][HTML] RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks

M Tanveer, SA Aldossari - Alexandria Engineering Journal, 2025 - Elsevier
The rapid expansion of Mobile Edge Computing (MEC) and the Internet of Things (IoT) has
revolutionized technology by enabling real-time data processing at the network edge, which …

Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing

AK Yadav, A Braeken, M Misra - The Journal of Supercomputing, 2023 - Springer
Fog and dew computing represent relatively new computing paradigms in the literature. The
main idea is to offload the computation processes from the device to a more nearby fog or …

RAP-MEC: Robust authentication protocol for the mobile edge computing services

FM Alotaibi, LA Maghrabi, M Tanveer, M Ahmad… - IEEE …, 2024 - ieeexplore.ieee.org
The emergence of edge computing has revolutionized the landscape of modern
applications, offering remarkable advantages such as low-latency and high-bandwidth …

[PDF][PDF] AuthPFS: A method to verify perfect forward secrecy in authentication protocols

M Ge, S Kumari, CM Chen - J. Netw. Intell, 2022 - bit.kuas.edu.tw
Perfect forward secrecy (PFS) is a property of authentication protocols by which the
exposure of long-term key material that is used in the protocol to authenticate and negotiate …

[HTML][HTML] Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing

B Ali, MA Gregory, S Li, OA Dib - Computer Networks, 2024 - Elsevier
This paper proposes an efficient trust-aware authentication and task offloading scheme for
Multi-Access Edge Computing (MEC) using the Zero Trust Security (ZTS) principles. The …

An improved identity-based anonymous authentication scheme resistant to semi-trusted server attacks

D Xie, J Yang, W Bian, F Chen… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
In mobile edge computing, the computing tasks of IoT terminal devices with limited
computing power often need to be offloaded to servers for processing. However, there are …

RAAF-MEC: Reliable and anonymous authentication framework for IoT-enabled mobile edge computing environment

O Alruwaili, M Tanveer, SA Aldossari, S Alanazi… - Internet of Things, 2025 - Elsevier
Abstract The Internet of Things (IoT) devices are becoming increasingly integral to daily life,
with cloud computing platforms serving as essential hubs for managing and processing the …

An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme

D Xie, J Yang, B Wu, W Bian, F Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In a mobile edge computing environment, the computing tasks of resource-constrained IoT
devices are often offloaded to mobile edge computing servers for processing. In order to …

A sustainable mutual authentication protocol for IoT-Fog-Cloud environment

SP Satpathy, S Mohanty, M Pradhan - Peer-to-Peer Networking and …, 2025 - Springer
This paper introduces a mutual authentication protocol designed for the IoT-Fog-Cloud
environment, utilizing Elliptic Curve Cryptography (ECC). The proposed protocol supports …

A secure cross-domain authentication scheme based on threshold signature for MEC

L Chen, C Guo, B Gong, M Waqas, L Deng… - Journal of Cloud …, 2024 - Springer
The widespread adoption of fifth-generation mobile networks has spurred the rapid
advancement of mobile edge computing (MEC). By decentralizing computing and storage …