FogHA: An efficient handover authentication for mobile devices in fog computing

被引:31
作者
Guo, Yimin [1 ]
Guo, Yajun [2 ]
机构
[1] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan, Peoples R China
[2] Cent China Normal Univ, Sch Comp, Wuhan, Peoples R China
基金
中央高校基本科研业务费专项资金资助;
关键词
Fog computing; Handover authentication; Provable security; Efficiency; Password; USER AUTHENTICATION; ROAMING SERVICE; KEY AGREEMENT; SCHEME; SECURE; ANONYMITY; INTERNET; THINGS; LIGHTWEIGHT; PROTOCOL;
D O I
10.1016/j.cose.2021.102358
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A B S T R A C T Fog computing is a new distributed computing paradigm that extends cloud services to the edge of the network, with features such as mobile support, location awareness, and low latency. Identity authentication in fog computing should support user mobility. For this reason, this paper proposes an anonymous handover authentication scheme for fog computing, FogHA, which achieves mutual authentication and key agreement between the adjacent fog node and the mobile device. FogHA only uses lightweight cryptographic primitives and eliminates redundant authentication messages with the cooperation of fog nodes, so it has high handover efficiency. The security of FogHA is proved by employing the formal security analysis under the Real-Or-Random (ROR) model. The informal security analysis shows that FogHA can resist known attacks. In addition, the comparison of communication and computation costs along with functionality features shows that the FogHA outperforms other existing schemes of the same type. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 68 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
    Amin, Ruhul
    Biswas, G. P.
    [J]. AD HOC NETWORKS, 2016, 36 : 58 - 80
  • [3] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [4] A survey on fog computing for the Internet of Things
    Bellavista, Paolo
    Berrocal, Javier
    Corradi, Antonio
    Das, Sajal K.
    Foschini, Luca
    Zanni, Alessandro
    [J]. PERVASIVE AND MOBILE COMPUTING, 2019, 52 : 71 - 99
  • [5] Perfectly secure key distribution for dynamic conferences
    Blundo, C
    De Santis, A
    [J]. INFORMATION AND COMPUTATION, 1998, 146 (01) : 1 - 23
  • [6] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [7] Bonomi F., 2012, P 1 ED MCC WORKSH MO, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
  • [8] Integration of Cloud computing and Internet of Things: A survey
    Botta, Alessio
    de Donato, Walter
    Persico, Valerio
    Pescape, Antonio
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 : 684 - 700
  • [9] Cai L., 2010, INFOCOM 2010 29 IEEE, P386
  • [10] Detecting Prosumer-Community Groups in Smart Grids From the Multiagent Perspective
    Cao, Jie
    Bu, Zhan
    Wang, Yuyao
    Yang, Huan
    Jiang, Jiuchuan
    Li, Hui-Jia
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (08): : 1652 - 1664