A Secure Mutual authentication approach to fog computing environment

被引:21
|
作者
Kalaria, Rudri [1 ]
Kayes, A. S. M. [2 ]
Rahayu, Wenny [1 ,3 ]
Pardede, Eric [1 ]
机构
[1] La Trobe Univ, Dept Comp Sci & Informat Technol, Melbourne, Vic, Australia
[2] La Trobe Univ, Dept Comp Sci & Informat Technol, Bachelor Cyber Secur, Melbourne, Vic, Australia
[3] La Trobe Univ, Sch Engn & Math Sci, Melbourne, Vic, Australia
关键词
Mutual authentication approach; Fog computing; Cloud computing; End devices; Fog server; Lightweight; Low-Complexity; Elliptic curve cryptography; Cyber attacks; PRIVACY; INTERNET; SCHEME; THINGS;
D O I
10.1016/j.cose.2021.102483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is a new emerging technology that complements the cloud and extends the services of cloud computing to be doser to the end devices. The cloud is usually located far from the devices which use their services and some of the recent research suggests that using a fog server as a nearby lightweight middleware can bridge the gap and provides rich resources doser to the end devices. Security is a crucial factor for the appropriate function-ing of fog computing. In particular, authentication and key exchange are significant chal-lenges which need to be taken into consideration in fog computing. Ensuring secure mutual authentication is very important for the security of fog computing since fog servers provide services to number of end users. However, the existing mutual authentication schemes are either having large computational overheads or are not able to achieve secure mutual au-thentication. In this paper, we propose a fog-based mutual authentication scheme using low-cost primitives such as Elliptic Curve Cryptography (ECC) and one-way hash functions. We also present the formal security analysis of our authentication approach to show that it protects all the interacting entities against various known cyber attacks. In addition, we vali-date our authentication scheme using the SPAN of AVISPA tool to confirm that it protects end users against several attacks. We evaluate our proposed authentication approach by com-paring it against state-of-the-art authentication schemes. Finally, through a case study and performance evaluation, we illustrate that our approach provides a secure and lightweight mutual key exchange protocol between three parties: the cloud, fog and edge devices. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment
    Dewanta, Favian
    Mambo, Masahiro
    [J]. IEEE ACCESS, 2019, 7 : 103095 - 103114
  • [2] FogSec: A secure and effective mutual authentication scheme for fog computing
    Sree, Thankaraja Raja
    Harish, R.
    Veni, T.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (12):
  • [3] Mutual authentication scheme of IoT devices in fog computing environment
    Sunakshi Singh
    Vijay Kumar Chaurasiya
    [J]. Cluster Computing, 2021, 24 : 1643 - 1657
  • [4] Mutual authentication scheme of IoT devices in fog computing environment
    Singh, Sunakshi
    Chaurasiya, Vijay Kumar
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1643 - 1657
  • [5] SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing
    Kaliya, Neha
    Pawar, Digambar
    Sriram, Thota
    [J]. ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I, 2024, 2090 : 349 - 365
  • [6] A study on secure RFID mutual authentication scheme in pervasive computing environment
    Kang, Soo-Young
    Lee, Deok-Gyu
    Lee, Im-Yeong
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4248 - 4254
  • [7] Mutual Authentication for IoT in the Context of Fog Computing
    Loffi, Leandro
    Westphall, Carla Merkle
    Grudtner, Lukas Derner
    Westphall, Carlos Becker
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2019, : 402 - 409
  • [8] Mutual Authentication Security Scheme in Fog Computing
    Rahman, Gohar
    Wen, Chuah Chai
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 443 - 451
  • [9] SMAP Fog/Edge: A Secure Mutual Authentication Protocol for Fog/Edge
    Pardeshi, Mayuresh Sunil
    Yuan, Shyan-Ming
    [J]. IEEE ACCESS, 2019, 7 : 101327 - 101335
  • [10] A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment (vol 7, pg 103095, 2019)
    Dewanta, Favian
    Mambo, Jorge Luis
    [J]. IEEE ACCESS, 2021, 9 : 143592 - 143592