Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing

Belal Ali,Mark A. Gregory,Shuo Li,Omar Amjad Dib
DOI: https://doi.org/10.1016/j.comnet.2024.110197
IF: 5.493
2024-02-05
Computer Networks
Abstract:This paper proposes an efficient trust-aware authentication and task offloading scheme for Multi-Access Edge Computing (MEC) using the Zero Trust Security (ZTS) principles. The proposed method uses a dual fuzzy logic system to evaluate the trustworthiness of edge servers. Devices connected to the edge servers are authenticated using identity, biometrics and Physical Unclonable Function (PUF) measures. After authentication, tasks can be offloaded from the devices to the most trustworthy edge server. The proposed scheme also considers the resource constraints of the edge servers and aims to minimise the overall task completion time. The experimental results show that the proposed scheme outperforms existing schemes regarding authentication accuracy, task completion time, and energy consumption.
computer science, information systems,telecommunications,engineering, electrical & electronic, hardware & architecture
What problem does this paper attempt to address?