A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services

被引:8
|
作者
Weng, Chi-Yao [1 ]
Li, Chun-Ta [2 ]
Chen, Chin-Ling [3 ,4 ,5 ]
Lee, Cheng-Chi [6 ,7 ]
Deng, Yong-Yuan [3 ]
机构
[1] Natl Pingtung Univ, Dept Comp Sci, Pingtung 90003, Taiwan
[2] Tainan Univ Technol, Dept Informat Management, Tainan 71002, Taiwan
[3] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41349, Taiwan
[4] Xiamen Univ Technol, Sch Comp & Informat Engn, Xiamen 361005, Peoples R China
[5] Changchun Sci Tech Univ, Sch Informat Engn, Changchun 130600, Peoples R China
[6] Fu Jen Catholic Univ, Dept Lib & Informat Sci, Res & Dev Ctr Phys Educ Hlth & Informat Technol, New Taipei 24205, Taiwan
[7] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
关键词
Edge computing; Cloud computing; Performance evaluation; Real-time systems; Computer architecture; Servers; Internet of Things; Anonymous authentication; fog computing; session key agreement; security; MUTUAL AUTHENTICATION; USER AUTHENTICATION; INTERNET; PRIVACY; MANAGEMENT; PROTOCOL; THINGS; AGGREGATION; BLOCKCHAIN;
D O I
10.1109/ACCESS.2021.3123234
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog-driven IoT architecture located between IoT devices and the centralized cloud infrastructure is introduced to extend computing, storage and network services to the edge of the Internet and therefore resources and services of the fog nodes are available and are closer to the end user and end device for providing mobility, low latency and location awareness. However, the paradigm of fog computing due to its inherited properties from cloud as inherits its security and privacy concerns such as spoofing, message replay, impersonation, man-in-the middle and physical capturing of IoT devices etc. To address these concerns in fog computing services, in this paper, a lightweight anonymous authentication and secure communication scheme is proposed and it only used secure one-way hash function and bitwise XOR operations when cloud, fog and user mutually authenticate each other. After the successful authentication, both fog-based participants can agree on a session key to encrypt the subsequent communication messages. The security can be ensured during authentication process by using the Burrows-Abadi-Needham (BAN) logic and the performance comparisons with existing schemes demonstrate that the proposed scheme is secure and highly efficient.
引用
收藏
页码:145522 / 145537
页数:16
相关论文
共 50 条
  • [41] Secure authentication scheme with Archimedes optimization algorithm for load balancing technique in fog computing
    N. Premkumar
    R. Santhosh
    [J]. International Journal of Information Technology, 2024, 16 (6) : 3861 - 3869
  • [42] SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing
    Kaliya, Neha
    Pawar, Digambar
    Sriram, Thota
    [J]. ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I, 2024, 2090 : 349 - 365
  • [43] An New Anonymous Authentication Scheme for Cloud Computing
    Zhang Zhi-hua
    Li Jian-jun
    Wei, Jiang
    Yong, Zhao
    Bei, Gong
    [J]. PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 896 - 898
  • [44] A novel efficient and lightweight authentication scheme for secure smart grid communication systems
    Hamza Hammami
    Sadok Ben Yahia
    Mohammad S. Obaidat
    [J]. The Journal of Supercomputing, 2023, 79 : 7360 - 7376
  • [45] Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks
    Chung, Youngseok
    Choi, Seokjin
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2016, PT IV, 2016, 9789 : 289 - 301
  • [46] Secure anonymous authentication scheme without verification table for mobile satellite communication systems
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2014, 32 (05) : 443 - 452
  • [47] BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs
    Maria, Azees
    Pandi, Vijayakumar
    Lazarus, Jeatha Deborah
    Karuppiah, Marimuthu
    Christo, Mary Subaja
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [48] LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for N-Times Computing Offloading in IoT
    Wang, Fei
    Xu, Yongjun
    Zhu, Liehuang
    Du, Xiaojiang
    Guizani, Mohsen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 4462 - 4471
  • [49] Secure and Lightweight HMAC Mutual Authentication Protocol for Communication between IoT Devices and Fog Nodes
    Erroutbi, Amine
    El Hanjri, Adnane
    Sekkaki, Abderrahim
    [J]. 2019 5TH IEEE INTERNATIONAL SMART CITIES CONFERENCE (IEEE ISC2 2019), 2019, : 251 - 257
  • [50] A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments
    Son, Seunghwan
    Park, Yohan
    Park, Youngho
    [J]. SUSTAINABILITY, 2021, 13 (16)