Design of Secure and Efficient Authentication Protocol for Edge Computing-Based Augmented Reality Environments
Round 1
Reviewer 1 Report
Comments and Suggestions for AuthorsThis article describes a novel network model and protocol for augmented reality (AR) environments based on edge computing. The proposed authentication protocol covers not only user to infrastructure (U2I) but also user to user (U2U) authentication considering edge computing-based AR environments. The authors designed the protocol using the Chebyshev chaotic map for low computational and communication costs. The security of the protocol is proved through various analyses, including BAN logic and the Scyther tool. Overall, the work is novel and it has a solid contribution. The security analysis is sound and also the flow of the work is nice. However, there are some minor concerns about this paper.
1. In Section 1, authors should provide additional examples of security threats especially occurring in edge computing-based AR environments.
2. In Section 6.1, the authors should conduct a comparative discussion of the MIRACL measurement results in each platform (desktop, Raspberry Pi 4).
3. The authors should do careful proof-reading of the paper for some typos. (In Section 2, demensional => dimensional)
Author Response
We would like to thank the reviewers and the Editor for their valuable suggestions that helped us to improve the quality, correctness, presentation, and readability of the revised paper (electronics-2830673). We have taken all the comments into consideration in the revised manuscript as we explained below. We hope the reviewers will be satisfied with the revisions made. To help with the review, we have also highlighted all the changes we have made to the original submission.
Please find the attached file.
Author Response File: Author Response.pdf
Reviewer 2 Report
Comments and Suggestions for AuthorsThis proposed a secure user-to-user (U2U) and user-to-infrastructure (U2I) 5 authentication protocol suitable for edge computing-based AR environments.
-- "This paper proposes a secure user-to-user (U2U) and user-to-infrastructure (U2I) 5 authentication protocol suitable for edge computing-based AR environments" repeats twice in the Abstract.
-- The Introduction could highlight more on the Motivation and Challenges for the proposed solution.
-- It could be better to provide a Table comparing properties between the proposed protocol and existing relevant protocols in Section 2.
-- The security model is not formally defined.
-- The security analysis is not formally analysed.
-- Please explain why 18-21 are selected for the performance comparison.
Author Response
We would like to thank the reviewers and the Editor for their valuable suggestions that helped us to improve the quality, correctness, presentation, and readability of the revised paper (electronics-2830673). We have taken all the comments into consideration in the revised manuscript as we explained below. We hope the reviewers will be satisfied with the revisions made. To help with the review, we have also highlighted all the changes we have made to the original submission.
Please find the attached file.
Author Response File: Author Response.pdf
Round 2
Reviewer 2 Report
Comments and Suggestions for Authors-- Good to see some improvements. But Table 1 cannot help to highlight the contributions in this paper.
-- Still, challenges for building the given solutions seem unclear.
-- The adversarial model seems to be incomplete. Please spend more time reading relevant papers about the models.
Author Response
Thank you very much.
Please find the attached file.
Author Response File: Author Response.pdf
Round 3
Reviewer 2 Report
Comments and Suggestions for AuthorsThe authors have addressed my concerns.