Authenticated key agreement scheme for fog-driven IoT healthcare system

被引:2
|
作者
Xiaoying Jia
Debiao He
Neeraj Kumar
Kim-Kwang Raymond Choo
机构
[1] South-Central University for Nationalities,School of Mathematics and Statistics
[2] Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, School of Cyber Science and Engineering
[3] Thapar University,Department of Computer Science and Engineering
[4] The University of Texas at San Antonio,Department of Information Systems and Cyber Security
[5] The University of Texas at San Antonio,Department of Electrical and Computer Engineering
来源
Wireless Networks | 2019年 / 25卷
关键词
Fog computing; Cloud computing; Internet-of-Things (IoT); Healthcare; Authenticated key agreement;
D O I
暂无
中图分类号
学科分类号
摘要
The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.
引用
收藏
页码:4737 / 4750
页数:13
相关论文
共 50 条
  • [41] IHAR-A fog-driven interpretable human activity recognition system
    Jeyashree, G.
    Padmavathi, S.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (09):
  • [42] A mutual authenticated key agreement scheme over insecure networks
    Chang, Chin-Chen
    Lee, Chia-Yin
    Su, Yu-Wei
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 603 - 612
  • [43] Improvement of Lee and Lee's authenticated key agreement scheme
    Lee, SW
    Kim, HS
    Yoo, KY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1049 - 1053
  • [44] Cryptanalysis of Lee-Lee authenticated key agreement scheme
    Kim, KW
    Ryu, EK
    Yoo, KY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 163 (01) : 193 - 198
  • [45] Provably Secure Authenticated Key Agreement Scheme for Smart Grid
    Odelu, Vanga
    Das, Ashok Kumar
    Wazid, Mohammad
    Conti, Mauro
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (03) : 1900 - 1910
  • [46] An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid
    Baruah, Barnana
    Dhal, Subhasish
    2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, : 447 - 455
  • [47] A NEW LIGHTWEIGHT AUTHENTICATED KEY AGREEMENT PROTOCOL FOR IOT IN CLOUD COMPUTING
    Aly, Ahmed H.
    Ghalwash, Atef
    Nasr, Mona
    Abd El-Hafez, Ahmed
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2021, 16 (05): : 3987 - 4005
  • [48] Authenticated key agreement protocols for dew-assisted IoT systems
    An Braeken
    The Journal of Supercomputing, 2022, 78 : 12093 - 12113
  • [49] Security weaknesses of a signature scheme and authenticated key agreement protocols
    Nose, Peter
    INFORMATION PROCESSING LETTERS, 2014, 114 (03) : 107 - 115
  • [50] Authenticated key agreement protocols for dew-assisted IoT systems
    Braeken, An
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (10): : 12093 - 12113