LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm

被引:54
作者
Gope, Prosanta [1 ,2 ]
机构
[1] Univ Hull, Dept Comp Sci, Cottingham Rd, Kingston Upon Hull HU6 7RX, N Humberside, England
[2] Univ Sheffield, Dept Comp Sci, 211 Portobello, Sheffield S1 4DP, S Yorkshire, England
关键词
Fog computing; D2D communication; D2D-Aided fog computing; Anonymity; Lightweight authentication; ROAMING SERVICE; MANAGEMENT;
D O I
10.1016/j.cose.2019.06.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is a new paradigm that extends cloud computing and services to the edge of the network. Although it has several distinct characteristics, however, the conventional fog computing model does not support some of the imperative features such as D2D communications, which can be useful for several critical IoT applications and services. Besides, fog computing faces numerous new security and privacy challenges apart from those inherited from cloud computing, however, security issues in fog computing have not been addressed properly. In this article, first we introduce a new privacy-preserving security architecture for fog computing model with the cooperative D2D communication support, which can be useful for various IoT applications. Subsequently, based on the underlying foundation of our proposed security architecture we design three lightweight anonymous authentication protocols (LAAPs) to support three distinct circumstances in D2D-Aided fog computing. In this regard, we utilize the lightweight cryptographic primitives like one-way function and EXCLUSIVE-OR operations, which will cause limited computational overhead for the resource limited edge devices. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:223 / 237
页数:15
相关论文
共 25 条
[1]   What Will 5G Be? [J].
Andrews, Jeffrey G. ;
Buzzi, Stefano ;
Choi, Wan ;
Hanly, Stephen V. ;
Lozano, Angel ;
Soong, Anthony C. K. ;
Zhang, Jianzhong Charlie .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (06) :1065-1082
[2]  
Bellare M, 1993, P ADV CRYPT CRYPTO 9
[3]  
Blom R., 1985, LNCS, V209, P335
[4]  
Bonomi F., 2012, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, P13, DOI [DOI 10.1145/2342509.2342513, 10.1145/2342509.2342513]
[5]  
Canetti R, 2001, P ADV CRYPT EUROCRYP
[6]   Key Management for UMTS MBMS [J].
Cheng, Shin-Ming ;
Lai, Wei-Ru ;
Lin, Phone ;
Chen, Kwang-Cheng .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (09) :3619-3628
[7]   A Survey on Cloud Computing Elasticity [J].
Galante, Guilherme ;
de Bona, Luis Carlos E. .
2012 IEEE/ACM FIFTH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2012), 2012, :263-270
[8]   An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication [J].
Gope, Prosanta ;
Sikdar, Biplab .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (06) :6607-6618
[9]   Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks [J].
Gope, Prosanta ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Cheng, Yongqiang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (09) :4957-4968
[10]   Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids [J].
Gope, Prosanta ;
Sikdar, Biplab .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1554-1566