Secure and privacy-preserving D2D communication in fog computing services

被引:14
作者
Ogundoyin, Sunday Oyinlola [1 ]
Kamil, Ismaila Adeniyi [1 ]
机构
[1] Univ Ibadan, Dept Elect & Elect Engn, Secur Privacy Commun SPCOM Res Grp, Ibadan, Nigeria
关键词
Fog-to-fog; Fog colony; Authentication; Fog computing; Multi-colony; Fog collaboration; CERTIFICATELESS SIGNCRYPTION SCHEME; USER AUTHENTICATION SCHEME; SMART HEALTH; EFFICIENT; PROTOCOL; INTERNET; ENERGY; SYSTEM;
D O I
10.1016/j.comnet.2022.108942
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D)-aided fog network has proven to be a viable means to improve the performance of fog computing technology. To exploit the full potentials of the D2D-supported fog computing architecture, it is imperative to protect the information transmitted among collaborating fog nodes against unauthorized access as failure to do so may have catastrophic consequences. However, this critical issue has not been investigated in most of the existing works. Therefore, this paper proposes a secure and privacy-aware trust based communication strategy for fog-to-fog collaborative services. An elliptic curve cryptography (ECC)-based two-party authentication and key agreement protocol is designed to allow two collaborating fog nodes generate a unique shared secret session key. A multi-colony head selection strategy is proposed using a multi-criteria decision-making method (MCDM), where multiple fog nodes are selected as colony head. A new efficient group key distribution and updating mechanism is designed for ensuring secured group communication. Consequently, ECC-based message dissemination approaches are designed for intra-and inter-colony trustworthy communications, where the generated secret session and group keys are used for data encryption. Moreover, we demonstrate that the proposed scheme guarantees data confidentiality and unforgeability against both Type I and Type II adversaries in the random oracle model (ROM) based on the intractability of the Computational Diffie-Hellman Problem (CDHP) and Discrete Logarithm Problem (DLP), respectively. An extensive performance analysis shows that the proposed scheme is very efficient and suitable for practical deployment. Comparative analysis reveals that the proposed scheme reports an improvement of about 33.15%-93.88%, 18.87%-67.91% , and 38.5%-93.8% in computation cost, communication overhead, and energy consumption, respectively, over the state-of-the-art related schemes.
引用
收藏
页数:20
相关论文
共 64 条
[1]   Scheduling Internet of Things requests to minimize latency in hybrid Fog-Cloud computing [J].
Aburukba, Raafat O. ;
AliKarrar, Mazin ;
Landolsi, Taha ;
El-Fakih, Khaled .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 :539-551
[2]   Improving fog computing performance via Fog-2-Fog collaboration [J].
Al-khafajiy, Mohammed ;
Baker, Thar ;
Al-Libawy, Hilal ;
Maamar, Zakaria ;
Aloqaily, Moayad ;
Jararweh, Yaser .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :266-280
[3]   An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices [J].
Alzahrani, Bander A. ;
Chaudhry, Shehzad Ashraf ;
Barnawi, Ahmed ;
Al-Barakati, Abdullah ;
Shon, Taeshik .
ELECTRONICS, 2020, 9 (03)
[4]   CFSec: Password based secure communication protocol in cloud-fog environment [J].
Amin, Ruhul ;
Kunal, Sourav ;
Saha, Arijit ;
Das, Debasis ;
Alamri, Atif .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 140 :52-62
[5]   Open problems in hash function security [J].
Andreeva, Elena ;
Mennink, Bart ;
Preneel, Bart .
DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (2-3) :611-631
[6]   A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems [J].
Asari, Amirhossein ;
Alagheband, Mahdi R. ;
Bayat, Majid ;
Asaar, Maryam Rajabzadeh .
COMPUTER NETWORKS, 2021, 185
[7]  
Barbosa M., 2008, P ACM S INF COMP COM, P369
[8]   Distributed load balancing for heterogeneous fog computing infrastructures in smart cities [J].
Beraldi, Roberto ;
Canali, Claudia ;
Lancellotti, Riccardo ;
Mattia, Gabriele Proietti .
PERVASIVE AND MOBILE COMPUTING, 2020, 67
[9]  
Bozorgchenani A, 2017, INT SYM WIRELESS COM, P390, DOI 10.1109/ISWCS.2017.8108146
[10]   Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update [J].
Chang, Ya-Fen ;
Tai, Wei-Liang ;
Chang, Hung-Chin .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) :3430-3440