Mutual authentication scheme of IoT devices in fog computing environment

被引:0
|
作者
Sunakshi Singh
Vijay Kumar Chaurasiya
机构
[1] Indian Institute of Information Technology Allahabad,
来源
Cluster Computing | 2021年 / 24卷
关键词
Authentication; Security; Anonymous; Fog computing; Identity based encryption;
D O I
暂无
中图分类号
学科分类号
摘要
The radical shift in the technology with the advent of connected things has led to the significant proliferation in demand for IoT devices, commonly called ‘smart devices’. These devices are capable of data collection, which can help in umpteen applications, particularly in healthcare. With the tremendous growth in these resource-constrained end devices, there has been a substantial increase in the number of attack varieties. Since these end devices deal with the sensitive data that might cause severe damage if not handled properly. Hence, defending its integrity, preserving its privacy, and maintaining its confidentiality as well as availability is of utmost importance. However, there are many protocols, models, architecture tools, etc. proposed to provide security. Nevertheless, almost every solution propound so far is not fully resilient and lacks in giving full protection to the system in some way or the other. So here, we have proposed a lightweight anonymous mutual authentication scheme for end devices and fog nodes.
引用
收藏
页码:1643 / 1657
页数:14
相关论文
共 50 条
  • [31] A Secure Privacy-Preserving Mutual Authentication Scheme for Publish-Subscribe Fog Computing
    Salem, Fatty M.
    [J]. 2018 14TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2018, : 213 - 218
  • [32] Mutual authentication scheme for smart devices in IoT-enabled smart home systems
    Ma, Qingru
    Tan, Haowen
    Zhou, Tianqi
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [33] A secure mutual authentication protocol for IoT environment
    Panda P.K.
    Chattopadhyay S.
    [J]. Journal of Reliable Intelligent Environments, 2020, 6 (2) : 79 - 94
  • [34] Balanced Computing Offloading for Selfish IoT Devices in Fog Computing
    Sun Yu-Jie
    Wang Hui
    Zhang Cheng-Xiang
    [J]. IEEE ACCESS, 2022, 10 : 30890 - 30898
  • [35] LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for N-Times Computing Offloading in IoT
    Wang, Fei
    Xu, Yongjun
    Zhu, Liehuang
    Du, Xiaojiang
    Guizani, Mohsen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 4462 - 4471
  • [36] Analysis and Improvement of an Authentication Scheme for Fog Computing Services
    HUO Yuyan
    KANG Baoyuan
    NIU Shufang
    LI Anqian
    ZUO Xinyu
    [J]. Wuhan University Journal of Natural Sciences., 2024, 29 (03) - 218
  • [37] A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices
    Aburukba, Raafat O.
    Landolsi, Taha
    Omer, Dalia
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 180
  • [38] A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices
    Aburukba, Raafat O.
    Landolsi, Taha
    Omer, Dalia
    [J]. Journal of Network and Computer Applications, 2021, 180
  • [39] Performance analysis of StaaS on IoT devices in fog computing environment using embedded systems
    Machado, Jose dos Santos
    Silva, Danilo Souza
    Fontes, Raphael Silva
    Menezes, Adauto Cavalcante
    Moreno, Edward David
    Lima Ribeiro, Admilson de Ribamar
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2020, 11 (04) : 554 - 567
  • [40] An Enhanced Mutual Authentication Scheme Based on ECDH for IoT Devices Using ESP8266
    Phimphinith, Anothay
    Xiong Anping
    Zhu, Qingyi
    Jiang, Yi
    Shen, Yong
    [J]. 2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 490 - 496