MASFOG: An Efficient Mutual Authentication Scheme For Fog Computing Architecture

被引:15
|
作者
Imine, Youcef [1 ]
Kouicem, Djamel-eddine [1 ]
Lounis, Ahmed [1 ]
Bouabdallah, Abdelmadjid [1 ]
机构
[1] Univ Technol Compiegne, Sorbonne Univ, CNRS, HEUDIASYC,UMR 7253,CS 60319, F-60203 Compiegne, France
关键词
fog computing; security; authentication;
D O I
10.1109/TrustCom/BigDataSE.2018.00091
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is a new paradigm which extends cloud computing services into the edge of the network. Indeed, it aims to pool edge resources in order to deal with cloud's shortcomings such as latency problems. However, this proposal does not ensure the honesty and the good behavior of edge devices. Thus, security places itself as an important challenge in front of this new proposal. Authentication is the entry point of any security system, which makes it an important security service. Traditional authentication schemes endure latency issues and some of them do not satisfy fog-computing requirements such as mutual authentication between end devices and fog servers. Thus, new authentication protocols need to be implemented. In this paper, we propose a new efficient authentication scheme for fog computing architecture. Our scheme ensures mutual authentication and remedies to fog servers' misbehaviors. Moreover, fog servers need to hold only a couple of information to verify the authenticity of every user in the system. Thus, it provides a low overhead in terms of storage capacity. Finally, we show through experimentation the efficiency of our scheme.
引用
收藏
页码:608 / 613
页数:6
相关论文
共 50 条
  • [31] Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet-of-Things-Fog environment
    Jain, Usha
    Pirasteh, Saied
    Hussain, Muzzammil
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (01):
  • [32] A blockchain authentication scheme for UAV-aided fog computing
    Du, Xiaoyu
    Tao, Song
    Yuan, Ke
    Li, Yinyin
    Zhou, Yi
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (02) : 1689 - 1702
  • [33] Anonymous-authentication scheme based on fog computing for VANET
    Han, Mu
    Liu, Shuai
    Ma, Shidian
    Wan, Ailan
    [J]. PLOS ONE, 2020, 15 (02):
  • [34] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    [J]. 2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [35] A Novel Blockchain Identity Authentication Scheme Implemented in Fog Computing
    Wang, Huijuan
    Jiang, Yong
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [36] A blockchain authentication scheme for UAV-aided fog computing
    Xiaoyu Du
    Song Tao
    Ke Yuan
    Yinyin Li
    Yi Zhou
    [J]. Complex & Intelligent Systems, 2024, 10 : 1689 - 1702
  • [37] A clogging resistant secure authentication scheme for fog computing services
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Garg, Sahil
    Lv, Zhihan
    Bin Zikria, Yousaf
    [J]. COMPUTER NETWORKS, 2021, 185
  • [38] An efficient three-factor user authentication scheme for industrial wireless sensor network with fog computing
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    Majhi, Banshidhar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (03)
  • [39] CMAKM-FIoT: centralised mutual authentication and key management scheme for fog computing-enabled IoT network
    Verma, Upendra
    Bhardwaj, Diwakar
    [J]. International Journal of Electronic Business, 2022, 17 (04) : 407 - 427
  • [40] A Lightweight Mutual Authentication Scheme for Power Edge Computing system
    Chen, Yi
    Xu, Ai-dong
    Wen, Hong
    Jiang, Yi-xin
    Zhang, Teng-yue
    [J]. 2019 INTERNATIONAL CONFERENCE ON ENERGY, POWER, ENVIRONMENT AND COMPUTER APPLICATION (ICEPECA 2019), 2019, 334 : 72 - 76