Title: A secure and anonymous authentication and key agreement protocol based on ECC for edge computing environment

Authors: Upendra Verma; Kapil Kumar Nagawanshi

Addresses: Department of Computer Engineering, SVKM'S NMIMS University, Mukesh Patel School of Technology Management and Engineering, Shirpur-425405, Maharashtra, India ' Department of Computer Science and Engineering, SoS in Engineering and Technology, Guru Ghasidas Vishwavidyalaya, Bilaspur 495009, Chhattisgarh, India

Abstract: Edge computing provides various services closer to the smart devices. However, devices have limited computational resources; hence, security procedure should be anonymous and lightweight for edge computing environment. Therefore, the proposed work designs a secure and anonymous authentication and key agreement scheme based on elliptic curve cryptography (ECC). The informal security assessment indicates the proposed scheme resilience to various cryptographic attacks. The performance of proposed scheme is improved in terms of computation, storage and communication overhead. The correctness and robustness of the proposed scheme are confirmed by formal security analysis employing Burrows-Abadi-Needham (BAN) predicate logic. The research also demonstrates a comparative analysis of proposed scheme to the related schemes in terms of various security features. Finally, the proposed scheme undergoes formal security verification through the automated validation of internet security protocols and applications (AVISPA) simulation tool to validate correctness and security. Simulation results confirm our approach's resilience to cryptographic attacks.

Keywords: security and privacy; elliptic curve cryptography; ECC; hash function; edge computing; BAN predicate logic; AVISPA.

DOI: 10.1504/IJICS.2025.146613

International Journal of Information and Computer Security, 2025 Vol.27 No.1, pp.127 - 158

Received: 01 Mar 2024
Accepted: 16 Oct 2024

Published online: 06 Jun 2025 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article