FogHA: An efficient handover authentication for mobile devices in fog computing

被引:25
|
作者
Guo, Yimin [1 ]
Guo, Yajun [2 ]
机构
[1] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan, Peoples R China
[2] Cent China Normal Univ, Sch Comp, Wuhan, Peoples R China
基金
中央高校基本科研业务费专项资金资助;
关键词
Fog computing; Handover authentication; Provable security; Efficiency; Password; USER AUTHENTICATION; ROAMING SERVICE; KEY AGREEMENT; SCHEME; SECURE; ANONYMITY; INTERNET; THINGS; LIGHTWEIGHT; PROTOCOL;
D O I
10.1016/j.cose.2021.102358
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A B S T R A C T Fog computing is a new distributed computing paradigm that extends cloud services to the edge of the network, with features such as mobile support, location awareness, and low latency. Identity authentication in fog computing should support user mobility. For this reason, this paper proposes an anonymous handover authentication scheme for fog computing, FogHA, which achieves mutual authentication and key agreement between the adjacent fog node and the mobile device. FogHA only uses lightweight cryptographic primitives and eliminates redundant authentication messages with the cooperation of fog nodes, so it has high handover efficiency. The security of FogHA is proved by employing the formal security analysis under the Real-Or-Random (ROR) model. The informal security analysis shows that FogHA can resist known attacks. In addition, the comparison of communication and computation costs along with functionality features shows that the FogHA outperforms other existing schemes of the same type. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing
    Yang, Xu
    Huang, Xinyi
    Liu, Joseph K.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 190 - 195
  • [2] Efficient Authentication Schemes for Handover in Mobile WiMAX
    Sun, Hung-Min
    Chang, Shih-Ying
    Lin, Yue-Hsun
    Chiou, Shin-Yan
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 235 - +
  • [3] Efficient Authentication for Mobile and Pervasive Computing
    Alomair, Basel
    Poovendran, Radha
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (03) : 469 - 481
  • [4] Efficient Authentication for Mobile and Pervasive Computing
    Alomair, Basel
    Poovendran, Radha
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 186 - 202
  • [5] Efficient incremental authentication for the updated data in fog computing
    Wang, Fenghe
    Wang, Junquan
    Yang, Wenfeng
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 114 : 130 - 137
  • [6] Scalable and Efficient Mutual Authentication Strategy In Fog Computing
    Bavishi, Jatna
    Shaikh, Mohammed Saad
    Patel, Reema
    [J]. 2020 8TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILE CLOUD 2020), 2020, : 77 - 83
  • [7] Mutual authentication scheme of IoT devices in fog computing environment
    Sunakshi Singh
    Vijay Kumar Chaurasiya
    [J]. Cluster Computing, 2021, 24 : 1643 - 1657
  • [8] Mutual authentication scheme of IoT devices in fog computing environment
    Singh, Sunakshi
    Chaurasiya, Vijay Kumar
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1643 - 1657
  • [9] Prediction-based secured handover authentication for mobile cloud computing
    Walid I. Khedr
    Khalid M. Hosny
    Marwa M. Khashaba
    Fathy A. Amer
    [J]. Wireless Networks, 2020, 26 : 4657 - 4675
  • [10] Prediction-based secured handover authentication for mobile cloud computing
    Khedr, Walid, I
    Hosny, Khalid M.
    Khashaba, Marwa M.
    Amer, Fathy A.
    [J]. WIRELESS NETWORKS, 2020, 26 (06) : 4657 - 4675