A sustainable mutual authentication protocol for IoT-Fog-Cloud environment

被引:1
作者
Satpathy, Swati Priyambada [1 ]
Mohanty, Sujata [1 ]
Pradhan, Manabhanjan [1 ]
机构
[1] Natl Inst Technol, Comp Sci & Engn, Rourkela 769008, Odisha, India
关键词
Authentication; Security; Elliptic curve cryptography; Internet of things; ProVerif; iFogSim; SECURE COMMUNICATION PROTOCOL; KEY AGREEMENT PROTOCOL; CHALLENGES; EFFICIENT; INTERNET; SCHEME;
D O I
10.1007/s12083-024-01843-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a mutual authentication protocol designed for the IoT-Fog-Cloud environment, utilizing Elliptic Curve Cryptography (ECC). The proposed protocol supports the management of energy consumption and network usage. Smart energy management not only helps to reduce energy costs but also minimizes carbon emissions. Hence, it achieves sustainability. The protocol undergoes rigorous formal and informal security analyses and has proven to achieve session key security along with mutual authentication. Formal security analysis is conducted using ProVerif, while informal assessments reveal the protocol's resilience against various attacks, including replay attacks, session key disclosure attacks, man-in-the-middle attacks, traffic analysis attacks, Denial-of-Service (DoS) attacks, desynchronization attacks and ESL attacks. Additionally, it provides perfect forward secrecy. The protocol incurs a computational cost of 14.88 milliseconds and requires 5824 bits for message exchange, keeping security as the top priority ensures swift and secure interaction between IoT devices and fog nodes. Also, simulation has been done using iFogSim to assess the practicability of the proposed scheme in real-life scenarios. The energy consumption, network usage, application loop delay, and execution time of various configurations are computed and compared. Compared to existing protocols, the proposed one confirms provable security and offers enhanced security features in the IoT-Fog-Cloud environment.
引用
收藏
页码:1 / 23
页数:23
相关论文
共 58 条
[1]   Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications [J].
AbdolrezaEftekhari, Seyed ;
Nikooghadam, Morteza ;
Rafighi, Masoud .
VEHICULAR COMMUNICATIONS, 2021, 28
[2]   Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for Internet of Things environment [J].
Ali, Usman ;
Bin Idris, Mohd Yamani Idna ;
Frnda, Jaroslav ;
Bin Ayub, Mohamad Nizam ;
Khan, Muhammad Asghar ;
Khan, Nauman ;
Beegum, T. Rehannara ;
Jasim, Ahmed A. ;
Ullah, Insaf ;
Babar, Mohammad .
INTERNET OF THINGS, 2023, 24
[3]   Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model [J].
Amanlou, Sanaz ;
Hasan, Mohammad Kamrul ;
Abu Bakar, Khairul Azmi .
COMPUTER NETWORKS, 2021, 199
[4]   CFSec: Password based secure communication protocol in cloud-fog environment [J].
Amin, Ruhul ;
Kunal, Sourav ;
Saha, Arijit ;
Das, Debasis ;
Alamri, Atif .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 140 (140) :52-62
[5]  
[Anonymous], 2020, The mobile economy 2020
[6]  
[Anonymous], 2018, Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives, DOI DOI 10.1007/978-981-10-5861-5_5
[7]  
Ashton K, 2009, RFID J, V22, P97
[8]  
Bonomi F, 2012, P 1 EDITION MCC WORK, P13, DOI DOI 10.1145/2342509.2342513
[9]  
Bonomi F., 2014, Big Data and Internet of Things, P169, DOI 10.1007/978-3-319-05029-4_7
[10]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337