Mutual Authentication for IoT in the Context of Fog Computing

被引:0
|
作者
Loffi, Leandro [1 ]
Westphall, Carla Merkle [1 ]
Grudtner, Lukas Derner [1 ]
Westphall, Carlos Becker [1 ]
机构
[1] Univ Fed Santa Catarina, Postgrad Program Comp Sci, POB 476, BR-88040970 Florianopolis, SC, Brazil
关键词
Security; Mutual Authentication; Networks; Internet of Things; Protocols; PROTOCOL; INTERNET; DEVICES; SCHEME;
D O I
10.1109/comsnets.2019.8711402
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The authentication of restricted memory devices has major problems because memory consumption is high when applied with other protocols that have the purpose of mutual authentication. This article proposes an authentication model that validates mutually the parties in an Internet of Things environment applied in the context of Fog Computing. Through the hypothetic-deductive methodology, the deductions and hypotheses are presented for the formal proof of the new proposed method. The results achieved in the research show that the approach of the authentication mechanism is optimized, the prototype was validated in the AVISPA protocol evaluation tool and in a restricted memory controlled environment in a context of Fog Computing. However, this work is more appropriate in Fog Computing environments because there are no route changes as in Cloud Computing.
引用
收藏
页码:402 / 409
页数:8
相关论文
共 50 条
  • [1] Mutual authentication scheme of IoT devices in fog computing environment
    Sunakshi Singh
    Vijay Kumar Chaurasiya
    [J]. Cluster Computing, 2021, 24 : 1643 - 1657
  • [2] Mutual authentication scheme of IoT devices in fog computing environment
    Singh, Sunakshi
    Chaurasiya, Vijay Kumar
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1643 - 1657
  • [3] Mutual Authentication Security Scheme in Fog Computing
    Rahman, Gohar
    Wen, Chuah Chai
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 443 - 451
  • [4] Mutual authentication framework using fog computing in healthcare
    Singh, Sunakshi
    Chaurasiya, Vijay Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (22) : 31977 - 32003
  • [5] Scalable and Efficient Mutual Authentication Strategy In Fog Computing
    Bavishi, Jatna
    Shaikh, Mohammed Saad
    Patel, Reema
    [J]. 2020 8TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILE CLOUD 2020), 2020, : 77 - 83
  • [6] Mutual authentication framework using fog computing in healthcare
    Sunakshi Singh
    Vijay Kumar Chaurasiya
    [J]. Multimedia Tools and Applications, 2022, 81 : 31977 - 32003
  • [7] A Secure Mutual authentication approach to fog computing environment
    Kalaria, Rudri
    Kayes, A. S. M.
    Rahayu, Wenny
    Pardede, Eric
    [J]. COMPUTERS & SECURITY, 2021, 111
  • [8] MASFOG: An Efficient Mutual Authentication Scheme For Fog Computing Architecture
    Imine, Youcef
    Kouicem, Djamel-eddine
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 608 - 613
  • [9] FogSec: A secure and effective mutual authentication scheme for fog computing
    Sree, Thankaraja Raja
    Harish, R.
    Veni, T.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (12):
  • [10] Uncertainty-Aware Authentication Model for Fog Computing in IoT
    Heydari, Mohammad
    Mylonas, Alexios
    Katos, Vasilios
    Balaguer-Ballester, Emili
    Tafreshi, Vahid Heydari Fami
    Benkhelifa, Elhadj
    [J]. 2019 FOURTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2019, : 52 - 59