FogSec: A secure and effective mutual authentication scheme for fog computing

被引:0
|
作者
Sree, Thankaraja Raja [1 ]
Harish, R. [2 ]
Veni, T. [2 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai Campus, Chennai 600127, Tamil Nadu, India
[2] Natl Inst Technol Calicut, Dept Comp Sci & Engn, Kozhikode, Kerala, India
来源
关键词
anonymity; AVISPA tool; fog computing; Internet of Things; mutual authentication; KEY ESTABLISHMENT SCHEME; USER AUTHENTICATION; INTERNET; PRIVACY;
D O I
10.1002/cpe.8054
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As opposed to cloud servers, fog servers, and fog users may be malicious, so developing a mutual identity-preserving authentication mechanism between them is a crucial and difficult problem in fog computing. Such a technique must conceal the user's true identity from the adversary; otherwise, the adversary will be able to determine which fog user and fog server are in communication. This article suggests a secure and reliable anonymous mutual authentication system for use at the network's edge between fog users and fog servers. With the aid of the registration authority (RA) in our system, they can verify one another and decide on a new session key that will be used to encrypt messages throughout the session. Fog users don't need to re-register with RA to wander freely over the network and authenticate to any fog server that is within their range. The proposed technique only needs a small number of symmetric encryption/decryption and one-way hash functions, making it easy to implement for fog-user devices with limited resources. The new scheme's performance is evaluated in comparison to the existing one, showing that it is more resilient to various types of assaults (such as known plaintext attacks, man-in-the-middle attacks, session hijacking, etc.). The widely used Automated Validation of Internet Security Protocols and Applications tool is used to verify the proposed system. The outcomes demonstrate that our approach can safely withstand different attacks and accomplish the desired outcomes. Additionally, the proposed method is tested in real-world scenarios with the NS3 simulator.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Mutual Authentication Security Scheme in Fog Computing
    Rahman, Gohar
    Wen, Chuah Chai
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 443 - 451
  • [2] A Secure Mutual authentication approach to fog computing environment
    Kalaria, Rudri
    Kayes, A. S. M.
    Rahayu, Wenny
    Pardede, Eric
    [J]. COMPUTERS & SECURITY, 2021, 111
  • [3] A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment
    Dewanta, Favian
    Mambo, Masahiro
    [J]. IEEE ACCESS, 2019, 7 : 103095 - 103114
  • [4] SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing
    Kaliya, Neha
    Pawar, Digambar
    Sriram, Thota
    [J]. ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I, 2024, 2090 : 349 - 365
  • [5] A Secure Privacy-Preserving Mutual Authentication Scheme for Publish-Subscribe Fog Computing
    Salem, Fatty M.
    [J]. 2018 14TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2018, : 213 - 218
  • [6] Mutual authentication scheme of IoT devices in fog computing environment
    Singh, Sunakshi
    Chaurasiya, Vijay Kumar
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1643 - 1657
  • [7] Mutual authentication scheme of IoT devices in fog computing environment
    Sunakshi Singh
    Vijay Kumar Chaurasiya
    [J]. Cluster Computing, 2021, 24 : 1643 - 1657
  • [8] MASFOG: An Efficient Mutual Authentication Scheme For Fog Computing Architecture
    Imine, Youcef
    Kouicem, Djamel-eddine
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 608 - 613
  • [9] A clogging resistant secure authentication scheme for fog computing services
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Garg, Sahil
    Lv, Zhihan
    Bin Zikria, Yousaf
    [J]. COMPUTER NETWORKS, 2021, 185
  • [10] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    [J]. 2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439