A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services

被引:8
|
作者
Weng, Chi-Yao [1 ]
Li, Chun-Ta [2 ]
Chen, Chin-Ling [3 ,4 ,5 ]
Lee, Cheng-Chi [6 ,7 ]
Deng, Yong-Yuan [3 ]
机构
[1] Natl Pingtung Univ, Dept Comp Sci, Pingtung 90003, Taiwan
[2] Tainan Univ Technol, Dept Informat Management, Tainan 71002, Taiwan
[3] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41349, Taiwan
[4] Xiamen Univ Technol, Sch Comp & Informat Engn, Xiamen 361005, Peoples R China
[5] Changchun Sci Tech Univ, Sch Informat Engn, Changchun 130600, Peoples R China
[6] Fu Jen Catholic Univ, Dept Lib & Informat Sci, Res & Dev Ctr Phys Educ Hlth & Informat Technol, New Taipei 24205, Taiwan
[7] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
关键词
Edge computing; Cloud computing; Performance evaluation; Real-time systems; Computer architecture; Servers; Internet of Things; Anonymous authentication; fog computing; session key agreement; security; MUTUAL AUTHENTICATION; USER AUTHENTICATION; INTERNET; PRIVACY; MANAGEMENT; PROTOCOL; THINGS; AGGREGATION; BLOCKCHAIN;
D O I
10.1109/ACCESS.2021.3123234
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog-driven IoT architecture located between IoT devices and the centralized cloud infrastructure is introduced to extend computing, storage and network services to the edge of the Internet and therefore resources and services of the fog nodes are available and are closer to the end user and end device for providing mobility, low latency and location awareness. However, the paradigm of fog computing due to its inherited properties from cloud as inherits its security and privacy concerns such as spoofing, message replay, impersonation, man-in-the middle and physical capturing of IoT devices etc. To address these concerns in fog computing services, in this paper, a lightweight anonymous authentication and secure communication scheme is proposed and it only used secure one-way hash function and bitwise XOR operations when cloud, fog and user mutually authenticate each other. After the successful authentication, both fog-based participants can agree on a session key to encrypt the subsequent communication messages. The security can be ensured during authentication process by using the Burrows-Abadi-Needham (BAN) logic and the performance comparisons with existing schemes demonstrate that the proposed scheme is secure and highly efficient.
引用
收藏
页码:145522 / 145537
页数:16
相关论文
共 50 条
  • [31] An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing
    Uddalak Chatterjee
    Sangram Ray
    Muhammad Khurram Khan
    Mou Dasgupta
    Chien-Ming Chen
    [J]. Computing, 2022, 104 : 1359 - 1395
  • [32] An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing
    Chatterjee, Uddalak
    Ray, Sangram
    Khan, Muhammad Khurram
    Dasgupta, Mou
    Chen, Chien-Ming
    [J]. COMPUTING, 2022, 104 (06) : 1359 - 1395
  • [33] Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment
    Lee, Hakjun
    Kang, Dongwoo
    Lee, Youngsook
    Won, Dongho
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [34] Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
    Shen, Jian
    Yang, Huijie
    Wang, Anxi
    Zhou, Tianqi
    Wang, Chen
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (04) : 924 - 933
  • [35] Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
    Jian Shen
    Huijie Yang
    Anxi Wang
    Tianqi Zhou
    Chen Wang
    [J]. Peer-to-Peer Networking and Applications, 2019, 12 : 924 - 933
  • [36] Biometric-Kerberos Authentication Scheme for Secure Mobile Computing Services
    Han, Fengling
    Alkhathami, Mohammed
    Van Schyndel, Ron
    [J]. 2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 1694 - 1698
  • [38] A dynamic anonymous authentication scheme with trusted fog computing in V2G networks
    Huang, Wenhua
    Du, Hongyuan
    Feng, Jingyu
    Han, Gang
    Zhang, Wenbo
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 79
  • [39] A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment
    Dewanta, Favian
    Mambo, Masahiro
    [J]. IEEE ACCESS, 2019, 7 : 103095 - 103114
  • [40] A novel efficient and lightweight authentication scheme for secure smart grid communication systems
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (07): : 7360 - 7376