A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services

被引:8
|
作者
Weng, Chi-Yao [1 ]
Li, Chun-Ta [2 ]
Chen, Chin-Ling [3 ,4 ,5 ]
Lee, Cheng-Chi [6 ,7 ]
Deng, Yong-Yuan [3 ]
机构
[1] Natl Pingtung Univ, Dept Comp Sci, Pingtung 90003, Taiwan
[2] Tainan Univ Technol, Dept Informat Management, Tainan 71002, Taiwan
[3] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41349, Taiwan
[4] Xiamen Univ Technol, Sch Comp & Informat Engn, Xiamen 361005, Peoples R China
[5] Changchun Sci Tech Univ, Sch Informat Engn, Changchun 130600, Peoples R China
[6] Fu Jen Catholic Univ, Dept Lib & Informat Sci, Res & Dev Ctr Phys Educ Hlth & Informat Technol, New Taipei 24205, Taiwan
[7] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Edge computing; Cloud computing; Performance evaluation; Real-time systems; Computer architecture; Servers; Internet of Things; Anonymous authentication; fog computing; session key agreement; security; MUTUAL AUTHENTICATION; USER AUTHENTICATION; INTERNET; PRIVACY; MANAGEMENT; PROTOCOL; THINGS; AGGREGATION; BLOCKCHAIN;
D O I
10.1109/ACCESS.2021.3123234
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog-driven IoT architecture located between IoT devices and the centralized cloud infrastructure is introduced to extend computing, storage and network services to the edge of the Internet and therefore resources and services of the fog nodes are available and are closer to the end user and end device for providing mobility, low latency and location awareness. However, the paradigm of fog computing due to its inherited properties from cloud as inherits its security and privacy concerns such as spoofing, message replay, impersonation, man-in-the middle and physical capturing of IoT devices etc. To address these concerns in fog computing services, in this paper, a lightweight anonymous authentication and secure communication scheme is proposed and it only used secure one-way hash function and bitwise XOR operations when cloud, fog and user mutually authenticate each other. After the successful authentication, both fog-based participants can agree on a session key to encrypt the subsequent communication messages. The security can be ensured during authentication process by using the Burrows-Abadi-Needham (BAN) logic and the performance comparisons with existing schemes demonstrate that the proposed scheme is secure and highly efficient.
引用
收藏
页码:145522 / 145537
页数:16
相关论文
共 50 条
  • [1] A lightweight anonymous authentication scheme for secure cloud computing services
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (02): : 1693 - 1713
  • [2] A lightweight anonymous authentication scheme for secure cloud computing services
    Hamza Hammami
    Sadok Ben Yahia
    Mohammad S. Obaidat
    [J]. The Journal of Supercomputing, 2021, 77 : 1693 - 1713
  • [3] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    [J]. 2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [4] A clogging resistant secure authentication scheme for fog computing services
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Garg, Sahil
    Lv, Zhihan
    Bin Zikria, Yousaf
    [J]. COMPUTER NETWORKS, 2021, 185
  • [5] LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments
    Hamada, Mariam
    Salem, Sameh A.
    Salem, Fatty M.
    [J]. AIN SHAMS ENGINEERING JOURNAL, 2022, 13 (06)
  • [6] Design of secure key management and user authentication scheme for fog computing services
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 : 475 - 492
  • [7] LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems
    Ali, Hala
    Ahmed, Irfan
    [J]. COMPUTERS & SECURITY, 2024, 140
  • [8] Anonymous-authentication scheme based on fog computing for VANET
    Han, Mu
    Liu, Shuai
    Ma, Shidian
    Wan, Ailan
    [J]. PLOS ONE, 2020, 15 (02):
  • [9] Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments
    Lee, Hakjun
    Ryu, Jihyeon
    Won, Dongho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5798 - 5815
  • [10] Analysis and Improvement of an Authentication Scheme for Fog Computing Services
    HUO Yuyan
    KANG Baoyuan
    NIU Shufang
    LI Anqian
    ZUO Xinyu
    [J]. Wuhan University Journal of Natural Sciences., 2024, 29 (03) - 218