Mutual authentication scheme of IoT devices in fog computing environment

被引:19
作者
Singh, Sunakshi [1 ]
Chaurasiya, Vijay Kumar [1 ]
机构
[1] Indian Inst Informat Technol Allahabad, Rd Devghat, Prayagraj 211015, Uttar Pradesh, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2021年 / 24卷 / 03期
关键词
Authentication; Security; Anonymous; Fog computing; Identity based encryption; IDENTITY-BASED ENCRYPTION; ANONYMOUS AUTHENTICATION; ELLIPTIC-CURVES; SECURITY; ECC;
D O I
10.1007/s10586-020-03211-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The radical shift in the technology with the advent of connected things has led to the significant proliferation in demand for IoT devices, commonly called 'smart devices'. These devices are capable of data collection, which can help in umpteen applications, particularly in healthcare. With the tremendous growth in these resource-constrained end devices, there has been a substantial increase in the number of attack varieties. Since these end devices deal with the sensitive data that might cause severe damage if not handled properly. Hence, defending its integrity, preserving its privacy, and maintaining its confidentiality as well as availability is of utmost importance. However, there are many protocols, models, architecture tools, etc. proposed to provide security. Nevertheless, almost every solution propound so far is not fully resilient and lacks in giving full protection to the system in some way or the other. So here, we have proposed a lightweight anonymous mutual authentication scheme for end devices and fog nodes.
引用
收藏
页码:1643 / 1657
页数:15
相关论文
共 47 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
Almadhoun R, 2018, I C COMP SYST APPLIC
[3]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[4]  
[Anonymous], 2015, ARXIV150200870
[5]  
Bamasag O.O., 2015, P WESS 15 WORKSH EMB, P1, DOI 10.1145/2818362.2818363
[6]  
Ben Amor A, 2019, INT WIREL COMMUN, P114, DOI 10.1109/IWCMC.2019.8766785
[7]  
Ben Amor A, 2019, INT WIREL COMMUN, P1049, DOI 10.1109/IWCMC.2019.8766575
[8]   A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment [J].
Ben Amor, Arij ;
Abid, Mohamed ;
Meddeb, Aref .
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, :1225-1231
[9]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[10]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13