Lightweight Failover Authentication Mechanism for IoT-Based Fog Computing Environment

被引:13
|
作者
Banerjee, Soumya [1 ]
Das, Ashok Kumar [2 ]
Chattopadhyay, Samiran [1 ]
Jamal, Sajjad Shaukat [3 ]
Rodrigues, Joel J. P. C. [4 ,5 ]
Park, Youngho [6 ]
机构
[1] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] King Khalid Univ, Coll Sci, Dept Math, Abha 61413, Saudi Arabia
[4] Fed Univ Piaui UFPI, BR-64049550 Teresina Pi, Brazil
[5] Inst Telecomunicacoes, P-6201001 Covilha, Portugal
[6] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
Internet of Things (IoT); fog computing; failover; security; privacy; authentication; KEY AGREEMENT SCHEME; REMOTE USER AUTHENTICATION; INTERNET; PROTOCOL; SECURE; EXCHANGE; DESIGN; MANAGEMENT; EFFICIENT; ANONYMITY;
D O I
10.3390/electronics10121417
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing as an extension to the cloud computing infrastructure has been invaluable in enhancing the applicability of the Internet of Things (IoT) paradigm. IoT based Fog systems magnify the range and minimize the latency of IoT applications. However, as fog nodes are considered transient and they offer authenticated services, when an IoT end device loses connectivity with a fog node, it must authenticate freshly with a secondary fog node. In this work, we present a new security mechanism to leverage the initial authentication to perform fast lightweight secondary authentication to ensure smooth failover among fog nodes. The proposed scheme is secure in the presence of a current de-facto Canetti and Krawczyk (CK)-adversary. We demonstrate the security of the proposed scheme with a detailed security analysis using formal security under the broadly recognized Real-Or-Random (ROR) model, informal security analysis as well as through formal security verification using the broadly-used Automated Validation of Internet Security Protocols and Applications (AVISPA) software tool. A testbed experiment for measuring computational time for different cryptographic primitives using the Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) has been done. Finally, through comparative analysis with other related schemes, we show how the presented approach is uniquely advantageous over other schemes.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] A lightweight authentication protocol for IoT-based cloud environment
    Zargar, Sadra
    Shahidinejad, Ali
    Ghobaei-Arani, Mostafa
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (11)
  • [2] Lightweight IoT-based authentication scheme in cloud computing circumstance
    Zhou, Lu
    Li, Xiong
    Yeh, Kuo-Hui
    Su, Chunhua
    Chiu, Wayne
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 : 244 - 251
  • [3] Content delivery network for IoT-based Fog Computing environment
    Bagies, Enas
    Barnawi, Ahmed
    Mahfoudh, Saoucene
    Kumar, Neeraj
    [J]. COMPUTER NETWORKS, 2022, 205
  • [4] An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances
    Martinez-Pelaez, Rafael
    Toral-Cruz, Homero
    Parra-Michel, Jorge R.
    Garcia, Vicente
    Mena, Luis J.
    Felix, Vanessa G.
    Ochoa-Brust, Alberto
    [J]. SENSORS, 2019, 19 (09)
  • [5] A Secure IoT-Based Authentication System in Cloud Computing Environment
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Zheng, Yao-Zhu
    Chen, Long-Sheng
    Chen, Chih-Cheng
    [J]. SENSORS, 2020, 20 (19) : 1 - 14
  • [6] An IoT-Based Fog Computing Model
    Ma, Kun
    Bagula, Antoine
    Nyirenda, Clement
    Ajayi, Olasupo
    [J]. SENSORS, 2019, 19 (12)
  • [7] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    Pallavi, K. N.
    Ravi Kumar, V.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (04) : 3039 - 3060
  • [8] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    K. N. Pallavi
    V. Ravi Kumar
    [J]. Wireless Personal Communications, 2021, 116 : 3039 - 3060
  • [9] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    [J]. SYMMETRY-BASEL, 2020, 12 (01):
  • [10] Mutual authentication scheme of IoT devices in fog computing environment
    Sunakshi Singh
    Vijay Kumar Chaurasiya
    [J]. Cluster Computing, 2021, 24 : 1643 - 1657