Next Article in Journal
A Novel Three-Dimensional Sigma–Delta Modulation for High-Switching-Frequency Three-Phase Four-Wire Active Power Filters
Next Article in Special Issue
Improving Security in the Internet of Vehicles: A Blockchain-Based Data Sharing Scheme
Previous Article in Journal
Revolutionising the Quality of Life: The Role of Real-Time Sensing in Smart Cities
Previous Article in Special Issue
Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing
 
 
Article
Peer-Review Record

Design of Secure and Efficient Authentication Protocol for Edge Computing-Based Augmented Reality Environments

Electronics 2024, 13(3), 551; https://doi.org/10.3390/electronics13030551
by DeokKyu Kwon 1 and Youngho Park 2,*
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Electronics 2024, 13(3), 551; https://doi.org/10.3390/electronics13030551
Submission received: 2 January 2024 / Revised: 23 January 2024 / Accepted: 29 January 2024 / Published: 30 January 2024
(This article belongs to the Special Issue Novel Methods Applied to Security and Privacy Problems)

Round 1

Reviewer 1 Report

Comments and Suggestions for Authors

This article describes a novel network model and protocol for augmented reality (AR) environments based on edge computing. The proposed authentication protocol covers not only user to infrastructure (U2I) but also user to user (U2U) authentication considering edge computing-based AR environments. The authors designed the protocol using the Chebyshev chaotic map for low computational and communication costs. The security of the protocol is proved through various analyses, including BAN logic and the Scyther tool. Overall, the work is novel and it has a solid contribution. The security analysis is sound and also the flow of the work is nice. However, there are some minor concerns about this paper.

1. In Section 1, authors should provide additional examples of security threats especially occurring in edge computing-based AR environments.

2. In Section 6.1, the authors should conduct a comparative discussion of the MIRACL measurement results in each platform (desktop, Raspberry Pi 4).

3. The authors should do careful proof-reading of the paper for some typos. (In Section 2, demensional => dimensional)

Author Response

We would like to thank the reviewers and the Editor for their valuable suggestions that helped us to improve the quality, correctness, presentation, and readability of the revised paper (electronics-2830673). We have taken all the comments into consideration in the revised manuscript as we explained below. We hope the reviewers will be satisfied with the revisions made. To help with the review, we have also highlighted all the changes we have made to the original submission.

Please find the attached file.

Author Response File: Author Response.pdf

Reviewer 2 Report

Comments and Suggestions for Authors

This proposed a secure user-to-user (U2U) and user-to-infrastructure (U2I) 5 authentication protocol suitable for edge computing-based AR environments.

-- "This paper proposes a secure user-to-user (U2U) and user-to-infrastructure (U2I) 5 authentication protocol suitable for edge computing-based AR environments" repeats twice in the Abstract. 

-- The Introduction could highlight more on the Motivation and Challenges for the proposed solution. 

-- It could be better to provide a Table comparing properties between the proposed protocol and existing relevant protocols in Section 2. 

-- The security model is not formally defined. 

-- The security analysis is not formally analysed. 

-- Please explain why 18-21 are selected for the performance comparison. 

Author Response

We would like to thank the reviewers and the Editor for their valuable suggestions that helped us to improve the quality, correctness, presentation, and readability of the revised paper (electronics-2830673). We have taken all the comments into consideration in the revised manuscript as we explained below. We hope the reviewers will be satisfied with the revisions made. To help with the review, we have also highlighted all the changes we have made to the original submission.

Please find the attached file.

Author Response File: Author Response.pdf

Round 2

Reviewer 2 Report

Comments and Suggestions for Authors

-- Good to see some improvements. But Table 1 cannot help to highlight the contributions in this paper. 

-- Still, challenges for building the given solutions seem unclear. 

-- The adversarial model seems to be incomplete. Please spend more time reading relevant papers about the models. 

Author Response

Thank you very much.

Please find the attached file.

Author Response File: Author Response.pdf

Round 3

Reviewer 2 Report

Comments and Suggestions for Authors

The authors have addressed my concerns. 

Back to TopTop