With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu...With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.展开更多
Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security inspection.However,due to the interference of environment factors such as multipath propagation and NLOS(No...Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security inspection.However,due to the interference of environment factors such as multipath propagation and NLOS(Non-Line-of-Sight),the existing methods for localization indoor Wi-Fi access points based on RSS ranging tend to have lower accuracy as the RSS(Received Signal Strength)is difficult to accurately measure.Therefore,the localization algorithm of indoor Wi-Fi access points based on the signal strength relative relationship and region division is proposed in this paper.The algorithm hierarchically divide the room where the target Wi-Fi AP is located,on the region division line,a modified signal collection device is used to measure RSS in two directions of each reference point.All RSS values are compared and the region where the RSS value has the relative largest signal strength is located as next candidate region.The location coordinate of the target Wi-Fi AP is obtained when the localization region of the target Wi-Fi AP is successively approximated until the candidate region is smaller than the accuracy threshold.There are 360 experiments carried out in this paper with 8 types of Wi-Fi APs including fixed APs and portable APs.The experimental results show that the average localization error of the proposed localization algorithm is 0.30 meters,and the minimum localization error is 0.16 meters,which is significantly higher than the localization accuracy of the existing typical indoor Wi-Fi access point localization methods.展开更多
The north-south transitional zone in China mainly consists of the Qinling-Daba Mountains. It is the most important West-East geo-ecological space in China, containing protected areas vital for biodiversity conservatio...The north-south transitional zone in China mainly consists of the Qinling-Daba Mountains. It is the most important West-East geo-ecological space in China, containing protected areas vital for biodiversity conservation and ecological security of China. The protection and rational development of its natural habitat is of great significance to China’s ecological security and integration of protected areas based on mountain forest ecosystems on a global scale. In this study, five important types of protected areas in the transitional zone were selected, and their spatial patterns were analysed. Spatial analysis methods, such as kernel density estimation and accessibility analysis, were employed for both point and areal data, and focused on four aspects: land use scale, shift in the centre of gravity, spatial agglomeration, and accessibility. In addition, policy background and evolution of spatial and temporal characteristics of the protected area system in the transitional zone from 1963 to 2017 were also examined. We analysed the characteristics and geographical significance of the West-east corridor using the spatial pattern of the protected area system from the perspective of ecological and economic spaces. We focused on spatial shape, type intersection, and key areas to analyse the spatial overlap of the protected areas. Protected area establishment was divided into three stages: initial(1956–1980), rapid development(1981–2013), and national park transformation(2014–present). These stages reflected the change in the concept of ‘simple protection—sustainable use—integration and upgrade’ for protected areas of China. The spatial centre of gravity of the protection zone system was located in the west Qinling-Daba Mountains, and its high-density core exhibited a relatively stable N-shaped structure composed of four gathering areas. Affected by factors such as geographic environment and socio-economic development density, the average access time for protected areas was high(1.56 h);wetland parks and scenic areas are located closer to the city centre. As the West-east corridor in the transitional zone extends from west to east, there is a clear spatial dislocation between the development of protected areas and the intensity of human activities. During development, differentiated goal orientation should be adopted based on the idea of zoning and classified governance. With the advancement of the construction of protected areas, the spatial overlap of protected areas in the transition zone has become more prominent. At present, the spatially overlapped protected areas in the transitional zone remain prominent, with inclusion overlap being the most common, and forest parks exhibiting the highest probability of overlap with other protected areas, we should focus on in the integration process of the corridor-type ecological space based on the mountain forest ecosystem.展开更多
A Wi-Fi fingerprinting localization approach has attracted increasing attention in recent years due to the ubiquity of Access Point( AP). However,typical fingerprinting localization methods fail to resist accidental e...A Wi-Fi fingerprinting localization approach has attracted increasing attention in recent years due to the ubiquity of Access Point( AP). However,typical fingerprinting localization methods fail to resist accidental environmental changes,such as AP movement. In order to address this problem,a robust fingerprinting indoor localization method is initiated. In the offline phase,three attributes of Received Signal Strength Indication( RSSI) —average,standard deviation and AP's response rate—are computed to prepare for the subsequent computation. In this way,the underlying location-relevant information can be captured comprehensively. Then in the online phase, a three-step voting scheme-based decision mechanism is demonstrated, detecting and eliminating the part of AP where the signals measured are severely distorted by AP 's movement. In the following localization step,in order to achieve accuracy and efficiency simultaneously,a novel fingerprinting localization algorithm is applied. Bhattacharyya distance is utilized to measure the RSSI distribution distance,thus realizing the optimization of MAximum Overlapping algorithm( MAO). Finally,experimental results are displayed,which demonstrate the effectiveness of our proposed methods in eliminating outliers and attaining relatively higher localization accuracy.展开更多
The growing ubiquity of Wi-Fi networks combined with the integration of low-cost Wi-Fi chipsets in all devices makes Wi-Fi as the wireless technology the most used for accessing to internet [1]. This means that the de...The growing ubiquity of Wi-Fi networks combined with the integration of low-cost Wi-Fi chipsets in all devices makes Wi-Fi as the wireless technology the most used for accessing to internet [1]. This means that the development of a Wi-Fi strategy has become an imperative for almost all operators worldwide. In this context, APs (Access Points) have to become as secure as cellular networks. Furthermore, authentication process between a mobile device and an access point has to be automated, without user constraining configuration. For reaching this purpose, client must have different credentials depending on authentication method. Our goal is to create an architecture that is both ergonomic and flexible in order to meet the need for connection and client mobility. We use NFC technology as a radio channel for starting communication with the network. The communication initiation will instantiate a virtual Wi-Fi AP and distribute all policies and access certificates for an authentication based on EAP-TLS (it could be extended to any EAP method for 802.1X standard). The end result of our new topology is to allow access to services through a virtual Wi-Fi AP with an enterprise-grade in a public hotspot.展开更多
In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved ...In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved under the traditional framework if the operating system(OS) is comprised since malwares are running in ring 0 level. In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems. We separate the access control system into three parts: policy management(PM),security server(SS) and policy enforcement(PE). Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks. We add an access vector cache(AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain. The policy enforcement module is retained in the guest OS for performance. The security of AVC and PE can be ensured by using a memory protection mechanism. The goal of protecting the OS kernel is to ensure the security of the execution path. We implementthe system by a modified Xen hypervisor. The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter. Our system offers a centralized security policy for virtual domains in virtual machine environments.Keywords: hypervisor; virtualization; memo-展开更多
Introduction: Healthcare workers in Mogadishu, Somalia face significant occupational injury risks, particularly needle stick injuries, with 61.1% reporting incidents. This poses a serious threat to their health, leadi...Introduction: Healthcare workers in Mogadishu, Somalia face significant occupational injury risks, particularly needle stick injuries, with 61.1% reporting incidents. This poses a serious threat to their health, leading to infections such as hepatitis B, hepatitis C, and HIV. Despite the high prevalence of injuries, awareness of Post-Exposure Prophylaxis (PEP) accessibility is relatively high, with 84.0% of respondents aware of it. However, there are gaps in knowledge and implementation, as evidenced by variations in availability of PEP. Improving workplace safety measures, providing comprehensive training on injury prevention and PEP protocols, and ensuring consistent availability of PEP in healthcare facilities are crucial steps to safeguard the well-being of healthcare workers in Mogadishu, Somalia. Methods: A cross-sectional study was conducted among hospital workers in Mogadishu, Somalia, focusing on professionals from various healthcare facilities. The study targeted nurses, doctors, laboratory personnel, and pharmacists. Purposive sampling was employed, resulting in a sample size of 383 calculated using Fisher’s sample size formula. Data were collected using coded questionnaires entered into Microsoft Excel 2019 and analyzed with SPSS software to generate frequencies and proportions, presented through frequency tables and pie figures. Results: The study in Mogadishu, Somalia, examined the prevalence of occupational injuries and knowledge of Post-Exposure Prophylaxis (PEP) accessibility among healthcare workers. Findings indicate a high prevalence of injuries, with 61.1% reporting incidents, predominantly needle stick injuries (60.6%). Despite the majority seeking prompt medical attention (72.0%), work-related illnesses affected 53.2% of respondents, notably work-related stress (59.5%). While most received training on injury and illness prevention (68.9%), gaps exist in PEP awareness, with 16.0% unaware of it. Nonetheless, 84.0% were aware, predominantly through health facilities (52.0%). Availability of PEP was reported by 71.3% in healthcare facilities, with variations in shift availability. The majority reported guidelines for PEP use (55.7%). Efforts are needed to bolster PEP awareness and ensure consistent availability in healthcare facilities to safeguard worker health. Conclusion: High prevalence of occupational injuries among healthcare workers, with needle stick injuries being the most common (60.6%). Despite this, 84.0% of respondents were aware of Post-Exposure Prophylaxis (PEP), primarily learning about it from health facilities (52.0%). While 71.3% reported the availability of PEP in their facility, 28.7% noted its unavailability. These results emphasize the need for improved education and accessibility of PEP to mitigate occupational injury risks.展开更多
Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent char...Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent characteristics as public,distributed,decentration and chronological characteristics.However,the transaction information on the blockchain is open to all nodes,the transaction information update operation is even more transparent.And the leakage of transaction information will cause huge losses to the transaction party.In response to these problems,this paper combines hierarchical attribute encryption with linear secret sharing,and proposes a blockchain data privacy protection control scheme based on searchable attribute encryption,which solves the privacy exposure problem in traditional blockchain transactions.The user’s access control is implemented by the verification nodes,which avoids the security risks of submitting private keys and access structures to the blockchain network.Associating the private key component with the random identity of the user node in the blockchain can solve the collusion problem.In addition,authorized users can quickly search and supervise transaction information through searchable encryption.The improved algorithm ensures the security of keywords.Finally,based on the DBDH hypothesis,the security of the scheme is proved in the random prediction model.展开更多
Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data e...Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data exchange.This work proposes an anonymous privacy data protection and access control scheme based on elliptic curve cryptography(ECC)and bilinear pairing to protect the communication security of the MEC.In the proposed scheme,the information sender encrypts private information through the ECC algorithm,and the information receiver uses its own key information and bilinear pairing to extract and verify the identity of the information sender.During each round of communication,the proposed scheme uses timestamps and random numbers to ensure the freshness of each round of conversation.Experimental results show that the proposed scheme has good security performance and can provide data privacy protection,integrity verification,and traceability for the communication process of MEC.The proposed scheme has a lower cost than other related schemes.The communication and computational cost of the proposed scheme are reduced by 31.08% and 22.31% on average compared with those of the other related schemes.展开更多
基金financially supported by the National Natural Science Foundation of China(No.61303216,No.61272457,No.U1401251,and No.61373172)the National High Technology Research and Development Program of China(863 Program)(No.2012AA013102)National 111 Program of China B16037 and B08038
文摘With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.
基金The work presented in this paper is supported by the National Key R&D Program of China(No.2016YFB0801303,2016QY01W0105)the National Natural Science Foundation of China(No.U1636219,61602508,61772549,U1736214,61572052)+1 种基金Plan for Scientific Innovation Talent of Henan Province(No.2018JR0018)the Key Technologies R&D Program of Henan Province(No.162102210032).
文摘Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security inspection.However,due to the interference of environment factors such as multipath propagation and NLOS(Non-Line-of-Sight),the existing methods for localization indoor Wi-Fi access points based on RSS ranging tend to have lower accuracy as the RSS(Received Signal Strength)is difficult to accurately measure.Therefore,the localization algorithm of indoor Wi-Fi access points based on the signal strength relative relationship and region division is proposed in this paper.The algorithm hierarchically divide the room where the target Wi-Fi AP is located,on the region division line,a modified signal collection device is used to measure RSS in two directions of each reference point.All RSS values are compared and the region where the RSS value has the relative largest signal strength is located as next candidate region.The location coordinate of the target Wi-Fi AP is obtained when the localization region of the target Wi-Fi AP is successively approximated until the candidate region is smaller than the accuracy threshold.There are 360 experiments carried out in this paper with 8 types of Wi-Fi APs including fixed APs and portable APs.The experimental results show that the average localization error of the proposed localization algorithm is 0.30 meters,and the minimum localization error is 0.16 meters,which is significantly higher than the localization accuracy of the existing typical indoor Wi-Fi access point localization methods.
基金Under the auspices of National Science and Technology Basic Resource Investigation Program(No.2017FY100900)。
文摘The north-south transitional zone in China mainly consists of the Qinling-Daba Mountains. It is the most important West-East geo-ecological space in China, containing protected areas vital for biodiversity conservation and ecological security of China. The protection and rational development of its natural habitat is of great significance to China’s ecological security and integration of protected areas based on mountain forest ecosystems on a global scale. In this study, five important types of protected areas in the transitional zone were selected, and their spatial patterns were analysed. Spatial analysis methods, such as kernel density estimation and accessibility analysis, were employed for both point and areal data, and focused on four aspects: land use scale, shift in the centre of gravity, spatial agglomeration, and accessibility. In addition, policy background and evolution of spatial and temporal characteristics of the protected area system in the transitional zone from 1963 to 2017 were also examined. We analysed the characteristics and geographical significance of the West-east corridor using the spatial pattern of the protected area system from the perspective of ecological and economic spaces. We focused on spatial shape, type intersection, and key areas to analyse the spatial overlap of the protected areas. Protected area establishment was divided into three stages: initial(1956–1980), rapid development(1981–2013), and national park transformation(2014–present). These stages reflected the change in the concept of ‘simple protection—sustainable use—integration and upgrade’ for protected areas of China. The spatial centre of gravity of the protection zone system was located in the west Qinling-Daba Mountains, and its high-density core exhibited a relatively stable N-shaped structure composed of four gathering areas. Affected by factors such as geographic environment and socio-economic development density, the average access time for protected areas was high(1.56 h);wetland parks and scenic areas are located closer to the city centre. As the West-east corridor in the transitional zone extends from west to east, there is a clear spatial dislocation between the development of protected areas and the intensity of human activities. During development, differentiated goal orientation should be adopted based on the idea of zoning and classified governance. With the advancement of the construction of protected areas, the spatial overlap of protected areas in the transition zone has become more prominent. At present, the spatially overlapped protected areas in the transitional zone remain prominent, with inclusion overlap being the most common, and forest parks exhibiting the highest probability of overlap with other protected areas, we should focus on in the integration process of the corridor-type ecological space based on the mountain forest ecosystem.
基金Sponsored by the National High Technology Research and Development Program of China(Grant No.2014AA123103)
文摘A Wi-Fi fingerprinting localization approach has attracted increasing attention in recent years due to the ubiquity of Access Point( AP). However,typical fingerprinting localization methods fail to resist accidental environmental changes,such as AP movement. In order to address this problem,a robust fingerprinting indoor localization method is initiated. In the offline phase,three attributes of Received Signal Strength Indication( RSSI) —average,standard deviation and AP's response rate—are computed to prepare for the subsequent computation. In this way,the underlying location-relevant information can be captured comprehensively. Then in the online phase, a three-step voting scheme-based decision mechanism is demonstrated, detecting and eliminating the part of AP where the signals measured are severely distorted by AP 's movement. In the following localization step,in order to achieve accuracy and efficiency simultaneously,a novel fingerprinting localization algorithm is applied. Bhattacharyya distance is utilized to measure the RSSI distribution distance,thus realizing the optimization of MAximum Overlapping algorithm( MAO). Finally,experimental results are displayed,which demonstrate the effectiveness of our proposed methods in eliminating outliers and attaining relatively higher localization accuracy.
文摘The growing ubiquity of Wi-Fi networks combined with the integration of low-cost Wi-Fi chipsets in all devices makes Wi-Fi as the wireless technology the most used for accessing to internet [1]. This means that the development of a Wi-Fi strategy has become an imperative for almost all operators worldwide. In this context, APs (Access Points) have to become as secure as cellular networks. Furthermore, authentication process between a mobile device and an access point has to be automated, without user constraining configuration. For reaching this purpose, client must have different credentials depending on authentication method. Our goal is to create an architecture that is both ergonomic and flexible in order to meet the need for connection and client mobility. We use NFC technology as a radio channel for starting communication with the network. The communication initiation will instantiate a virtual Wi-Fi AP and distribute all policies and access certificates for an authentication based on EAP-TLS (it could be extended to any EAP method for 802.1X standard). The end result of our new topology is to allow access to services through a virtual Wi-Fi AP with an enterprise-grade in a public hotspot.
基金supported by the National 973 Basic Research Program of China under grant No.2014CB340600the National Natural Science Foundation of China under grant No.61370230 and No.61662022+1 种基金Program for New Century Excellent Talents in University Under grant NCET-13-0241Natural Science Foundation of Huhei Province under Grant No.2016CFB371
文摘In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved under the traditional framework if the operating system(OS) is comprised since malwares are running in ring 0 level. In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems. We separate the access control system into three parts: policy management(PM),security server(SS) and policy enforcement(PE). Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks. We add an access vector cache(AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain. The policy enforcement module is retained in the guest OS for performance. The security of AVC and PE can be ensured by using a memory protection mechanism. The goal of protecting the OS kernel is to ensure the security of the execution path. We implementthe system by a modified Xen hypervisor. The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter. Our system offers a centralized security policy for virtual domains in virtual machine environments.Keywords: hypervisor; virtualization; memo-
文摘Introduction: Healthcare workers in Mogadishu, Somalia face significant occupational injury risks, particularly needle stick injuries, with 61.1% reporting incidents. This poses a serious threat to their health, leading to infections such as hepatitis B, hepatitis C, and HIV. Despite the high prevalence of injuries, awareness of Post-Exposure Prophylaxis (PEP) accessibility is relatively high, with 84.0% of respondents aware of it. However, there are gaps in knowledge and implementation, as evidenced by variations in availability of PEP. Improving workplace safety measures, providing comprehensive training on injury prevention and PEP protocols, and ensuring consistent availability of PEP in healthcare facilities are crucial steps to safeguard the well-being of healthcare workers in Mogadishu, Somalia. Methods: A cross-sectional study was conducted among hospital workers in Mogadishu, Somalia, focusing on professionals from various healthcare facilities. The study targeted nurses, doctors, laboratory personnel, and pharmacists. Purposive sampling was employed, resulting in a sample size of 383 calculated using Fisher’s sample size formula. Data were collected using coded questionnaires entered into Microsoft Excel 2019 and analyzed with SPSS software to generate frequencies and proportions, presented through frequency tables and pie figures. Results: The study in Mogadishu, Somalia, examined the prevalence of occupational injuries and knowledge of Post-Exposure Prophylaxis (PEP) accessibility among healthcare workers. Findings indicate a high prevalence of injuries, with 61.1% reporting incidents, predominantly needle stick injuries (60.6%). Despite the majority seeking prompt medical attention (72.0%), work-related illnesses affected 53.2% of respondents, notably work-related stress (59.5%). While most received training on injury and illness prevention (68.9%), gaps exist in PEP awareness, with 16.0% unaware of it. Nonetheless, 84.0% were aware, predominantly through health facilities (52.0%). Availability of PEP was reported by 71.3% in healthcare facilities, with variations in shift availability. The majority reported guidelines for PEP use (55.7%). Efforts are needed to bolster PEP awareness and ensure consistent availability in healthcare facilities to safeguard worker health. Conclusion: High prevalence of occupational injuries among healthcare workers, with needle stick injuries being the most common (60.6%). Despite this, 84.0% of respondents were aware of Post-Exposure Prophylaxis (PEP), primarily learning about it from health facilities (52.0%). While 71.3% reported the availability of PEP in their facility, 28.7% noted its unavailability. These results emphasize the need for improved education and accessibility of PEP to mitigate occupational injury risks.
基金The National Natural Science Foundation of China(No.61462060,No.61762060)The Network and Information Security Innovation Team of Gansu Provincial Department of Education Lanzhou University of Technology(No.2017C-05).
文摘Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent characteristics as public,distributed,decentration and chronological characteristics.However,the transaction information on the blockchain is open to all nodes,the transaction information update operation is even more transparent.And the leakage of transaction information will cause huge losses to the transaction party.In response to these problems,this paper combines hierarchical attribute encryption with linear secret sharing,and proposes a blockchain data privacy protection control scheme based on searchable attribute encryption,which solves the privacy exposure problem in traditional blockchain transactions.The user’s access control is implemented by the verification nodes,which avoids the security risks of submitting private keys and access structures to the blockchain network.Associating the private key component with the random identity of the user node in the blockchain can solve the collusion problem.In addition,authorized users can quickly search and supervise transaction information through searchable encryption.The improved algorithm ensures the security of keywords.Finally,based on the DBDH hypothesis,the security of the scheme is proved in the random prediction model.
基金partially supported by the National Natural Science Foundation of China under Grant 62072170 and Grant 62177047the Fundamental Research Funds for the Central Universities under Grant 531118010527+1 种基金the Science and Technology Key Projects of Hunan Province under Grant 2022GK2015the Hunan Provincial Natural Science Foundation of China under Grant 2021JJ30141.
文摘Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data exchange.This work proposes an anonymous privacy data protection and access control scheme based on elliptic curve cryptography(ECC)and bilinear pairing to protect the communication security of the MEC.In the proposed scheme,the information sender encrypts private information through the ECC algorithm,and the information receiver uses its own key information and bilinear pairing to extract and verify the identity of the information sender.During each round of communication,the proposed scheme uses timestamps and random numbers to ensure the freshness of each round of conversation.Experimental results show that the proposed scheme has good security performance and can provide data privacy protection,integrity verification,and traceability for the communication process of MEC.The proposed scheme has a lower cost than other related schemes.The communication and computational cost of the proposed scheme are reduced by 31.08% and 22.31% on average compared with those of the other related schemes.