Irshad, AzeemChaudhry, Shehzad AshrafGhani, AnwarMallah, Ghulam AliBilal, MuhammadAlzahrani, Bander A.2023-10-052023-10-0520220045-79061879-0755https://hdl.handle.net/11363/5756https://doi.org/The computational offloading from conventional cloud datacenter towards edge devices sprouted a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in the form of increased availability, bandwidth with low latency. The MEC offers real-time computing and storage facility within the proximity of mobile user-access network, hence it is imperative to secure communication between end user and edge server. The existing schemes do not fulfill real time processing and efficiency requirements for using complex crypto-primitives. To this end, we propose a novel two-factor biometric authentication protocol for MEC enabling efficient and secure combination of Physically Unclonable Functions (PUFs) with user-oriented biometrics employing fuzzy extractor-based procedures. The performance analysis depicts that our scheme offers resistance to known attacks using lightweight operations and supports 30% more security features than comparative studies. Our scheme is provably secure under Real-or-Random (ROR) formal security analysis model.eninfo:eu-repo/semantics/openAccessAttribution-NonCommercial-NoDerivs 3.0 United StatesPervasive and mobile edge computingAuthenticationSymmetric key operationsPUFIoTA low-cost privacy preserving user access in mobile edge computing frameworkArticle9811310.1016/j.compeleceng.2022.1076922-s2.0-85122640336Q1WOS:000754465600001Q2