A Survey on Handover Authentication for Multi-Access Edge Computing: Classification, Analysis, and Future Directions

Yuxin Xia, Jie Zhang, Ka Lok Man

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

1 Citation (Scopus)

Abstract

Handover authentication is a significant process which ensures access control and secure communication in multi-access edge computing (MEC). Although it has been studied for many years in the wireless communication fields, a comprehensive survey for handover authentication is still lacking in the literature. Moreover, research status and new challenges of handover authentication in the context of MEC need be investigated. This paper thereby reviews existing handover authentication schemes and presents a clear definition and classification. It also evaluates security and performance of representative handover authentication schemes. Based on the evaluation, two interesting findings are summarized and two significant research directions of handover authentication for MEC are proposed.

Original languageEnglish
Title of host publication2023 International Conference on Platform Technology and Service, PlatCon 2023 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages79-84
Number of pages6
ISBN (Electronic)9798350305999
DOIs
Publication statusPublished - 2023
Event9th International Conference on Platform Technology and Service, PlatCon 2023 - Busan, Korea, Republic of
Duration: 16 Aug 202318 Aug 2023

Publication series

Name2023 International Conference on Platform Technology and Service, PlatCon 2023 - Proceedings

Conference

Conference9th International Conference on Platform Technology and Service, PlatCon 2023
Country/TerritoryKorea, Republic of
CityBusan
Period16/08/2318/08/23

Keywords

  • handover authentication
  • intelligent transportation system
  • multi-access edge computing
  • wireless network security

Fingerprint

Dive into the research topics of 'A Survey on Handover Authentication for Multi-Access Edge Computing: Classification, Analysis, and Future Directions'. Together they form a unique fingerprint.

Cite this