Mutual authentication scheme of IoT devices in fog computing environment

被引:19
作者
Singh, Sunakshi [1 ]
Chaurasiya, Vijay Kumar [1 ]
机构
[1] Indian Inst Informat Technol Allahabad, Rd Devghat, Prayagraj 211015, Uttar Pradesh, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2021年 / 24卷 / 03期
关键词
Authentication; Security; Anonymous; Fog computing; Identity based encryption; IDENTITY-BASED ENCRYPTION; ANONYMOUS AUTHENTICATION; ELLIPTIC-CURVES; SECURITY; ECC;
D O I
10.1007/s10586-020-03211-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The radical shift in the technology with the advent of connected things has led to the significant proliferation in demand for IoT devices, commonly called 'smart devices'. These devices are capable of data collection, which can help in umpteen applications, particularly in healthcare. With the tremendous growth in these resource-constrained end devices, there has been a substantial increase in the number of attack varieties. Since these end devices deal with the sensitive data that might cause severe damage if not handled properly. Hence, defending its integrity, preserving its privacy, and maintaining its confidentiality as well as availability is of utmost importance. However, there are many protocols, models, architecture tools, etc. proposed to provide security. Nevertheless, almost every solution propound so far is not fully resilient and lacks in giving full protection to the system in some way or the other. So here, we have proposed a lightweight anonymous mutual authentication scheme for end devices and fog nodes.
引用
收藏
页码:1643 / 1657
页数:15
相关论文
共 47 条
[11]  
Dastjerdi A.V., 2016, INTERNET THINGS PRIN, P61, DOI DOI 10.1016/B978-0-12-805395-9.00004-6.ARXIV:1601.02752
[12]   A secure multi-factor ECC based authentication scheme for Cloud-IoT based healthcare services [J].
Dhillon, Parwinder Kaur ;
Kalra, Sheetal .
JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2019, 11 (02) :149-164
[13]   Authentication Protocols for Internet of Things: A Comprehensive Survey [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros A. ;
Janicke, Helge ;
Jiang, Jianmin ;
Shu, Lei .
SECURITY AND COMMUNICATION NETWORKS, 2017,
[14]   Toward a Lightweight Authentication and Authorization Framework for Smart Objects [J].
Hernandez-Ramos, Jose L. ;
Pawlowski, Marcin Piotr ;
Jara, Antonio J. ;
Skarmeta, Antonio F. ;
Ladid, Latif .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2015, 33 (04) :690-702
[15]   Survey on fog computing: architecture, key technologies, applications and open issues [J].
Hu, Pengfei ;
Dhelim, Sahraoui ;
Ning, Huansheng ;
Qiu, Tie .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 98 :27-42
[16]  
Ibrahim Maged Ramada, 2016, International Journal of Network Security, V18, P1089
[17]   MASFOG: An Efficient Mutual Authentication Scheme For Fog Computing Architecture [J].
Imine, Youcef ;
Kouicem, Djamel-eddine ;
Lounis, Ahmed ;
Bouabdallah, Abdelmadjid .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :608-613
[18]   Securing Fog Computing for Internet of Things Applications: Challenges and Solutions [J].
Ni, Jianbing ;
Zhang, Kuan ;
Lin, Xiaodong ;
Shen, Xuemin .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01) :601-628
[19]  
KAUR K, 2019, IEEE INT CONF COMM
[20]   Fog computing security: a review of current applications and security solutions [J].
Khan, Saad ;
Parkinson, Simon ;
Qin, Yongrui .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2017, 6