SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing

被引:0
作者
Kaliya, Neha [1 ]
Pawar, Digambar [1 ]
Sriram, Thota [1 ]
机构
[1] Univ Hyderabad, Prof CR Rao Rd, Hyderabad 500046, India
来源
ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I | 2024年 / 2090卷
关键词
Fog computing; Fog security; Key management scheme; Fog authentication; AVISPA tool; PROTOCOL;
D O I
10.1007/978-3-031-64076-6_23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Fog computing was emerged to empower the execution of real-time applications at the network's edge, effectively resolving numerous communication challenges and enhancing Quality of Service for end devices. As the proliferation of smart devices and their communication continues to grow, the significance of authentication is becoming increasingly crucial to ensure secure communication within IoT applications. We performed detailed study of available authentication techniques and can conclude that a malicious fog server can be a serious threat to the entire system. Using AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we performed cryptanalysis of a key management scheme and user authentication protocol proposed by Rahman et al., and found that it is vulnerable to authentication attacks. Further, to improvise the existing protocol, a new efficient secure key management scheme and mutual authentication protocol is proposed in this paper. The security of proposed protocol is tested using AVISPA tool and found secure. We have done performance evaluation of the proposed protocol in terms of communication and computation overheads. We also tested it experimentally on iFogSim simulator to analyze network performance.
引用
收藏
页码:349 / 365
页数:17
相关论文
共 20 条
[1]  
Abbasi B. Z., 2017, 2017 23 INT C AUT CO, P1
[2]   Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0" [J].
Akram, Muhammad Arslan ;
Mahmood, Khalid ;
Kumari, Saru ;
Xiong, Hu .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) :4676-4681
[3]   Fog computing security and privacy for the Internet of Thing applications: State-of-the-art [J].
Alzoubi, Yehia I. ;
Osmanaj, Valmira H. ;
Jaradat, Ashraf ;
Al-Ahmad, Ahmad .
SECURITY AND PRIVACY, 2021, 4 (02)
[4]   A secure authenticated and key exchange scheme for fog computing [J].
Chen, Chien-Ming ;
Huang, Yanyu ;
Wang, King-Hang ;
Kumari, Saru ;
Wu, Mu-En .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) :1200-1215
[5]   Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems [J].
Chen, Tong ;
Zhang, Lei ;
Choo, Kim-Kwang Raymond ;
Zhang, Rui ;
Meng, Xinyu .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) :10766-10778
[6]   Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0 [J].
Garg, Sahil ;
Kaur, Kuljeet ;
Kaddoum, Georges ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) :4598-4606
[7]  
Gowda N.C., 2021, 2021 IEEE 9 REGION 1, DOI [10.1109/r10-htc53172.2021.9641591, DOI 10.1109/R10-HTC53172.2021.9641591]
[8]  
Ibrahim Maged Ramada, 2016, International Journal of Network Security, V18, P1089, DOI 10.6633/ijns.201611.18(6).10
[9]   Authenticated key agreement scheme for fog-driven IoT healthcare system [J].
Jia, Xiaoying ;
He, Debiao ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
WIRELESS NETWORKS, 2019, 25 (08) :4737-4750
[10]   A Secure Mutual authentication approach to fog computing environment [J].
Kalaria, Rudri ;
Kayes, A. S. M. ;
Rahayu, Wenny ;
Pardede, Eric .
COMPUTERS & SECURITY, 2021, 111