Mutual authentication scheme of IoT devices in fog computing environment

被引:0
|
作者
Sunakshi Singh
Vijay Kumar Chaurasiya
机构
[1] Indian Institute of Information Technology Allahabad,
来源
Cluster Computing | 2021年 / 24卷
关键词
Authentication; Security; Anonymous; Fog computing; Identity based encryption;
D O I
暂无
中图分类号
学科分类号
摘要
The radical shift in the technology with the advent of connected things has led to the significant proliferation in demand for IoT devices, commonly called ‘smart devices’. These devices are capable of data collection, which can help in umpteen applications, particularly in healthcare. With the tremendous growth in these resource-constrained end devices, there has been a substantial increase in the number of attack varieties. Since these end devices deal with the sensitive data that might cause severe damage if not handled properly. Hence, defending its integrity, preserving its privacy, and maintaining its confidentiality as well as availability is of utmost importance. However, there are many protocols, models, architecture tools, etc. proposed to provide security. Nevertheless, almost every solution propound so far is not fully resilient and lacks in giving full protection to the system in some way or the other. So here, we have proposed a lightweight anonymous mutual authentication scheme for end devices and fog nodes.
引用
收藏
页码:1643 / 1657
页数:14
相关论文
共 50 条
  • [1] Mutual authentication scheme of IoT devices in fog computing environment
    Singh, Sunakshi
    Chaurasiya, Vijay Kumar
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1643 - 1657
  • [2] Mutual Authentication for IoT in the Context of Fog Computing
    Loffi, Leandro
    Westphall, Carla Merkle
    Grudtner, Lukas Derner
    Westphall, Carlos Becker
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2019, : 402 - 409
  • [3] Mutual Authentication Security Scheme in Fog Computing
    Rahman, Gohar
    Wen, Chuah Chai
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 443 - 451
  • [4] A Secure Mutual authentication approach to fog computing environment
    Kalaria, Rudri
    Kayes, A. S. M.
    Rahayu, Wenny
    Pardede, Eric
    [J]. COMPUTERS & SECURITY, 2021, 111
  • [5] A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment
    Dewanta, Favian
    Mambo, Masahiro
    [J]. IEEE ACCESS, 2019, 7 : 103095 - 103114
  • [6] MASFOG: An Efficient Mutual Authentication Scheme For Fog Computing Architecture
    Imine, Youcef
    Kouicem, Djamel-eddine
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 608 - 613
  • [7] FogSec: A secure and effective mutual authentication scheme for fog computing
    Sree, Thankaraja Raja
    Harish, R.
    Veni, T.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (12):
  • [8] Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet-of-Things-Fog environment
    Jain, Usha
    Pirasteh, Saied
    Hussain, Muzzammil
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (01):
  • [9] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    Pallavi, K. N.
    Ravi Kumar, V.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (04) : 3039 - 3060
  • [10] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    K. N. Pallavi
    V. Ravi Kumar
    [J]. Wireless Personal Communications, 2021, 116 : 3039 - 3060