Mutual authentication scheme of IoT devices in fog computing environment

被引:0
|
作者
Sunakshi Singh
Vijay Kumar Chaurasiya
机构
[1] Indian Institute of Information Technology Allahabad,
来源
Cluster Computing | 2021年 / 24卷
关键词
Authentication; Security; Anonymous; Fog computing; Identity based encryption;
D O I
暂无
中图分类号
学科分类号
摘要
The radical shift in the technology with the advent of connected things has led to the significant proliferation in demand for IoT devices, commonly called ‘smart devices’. These devices are capable of data collection, which can help in umpteen applications, particularly in healthcare. With the tremendous growth in these resource-constrained end devices, there has been a substantial increase in the number of attack varieties. Since these end devices deal with the sensitive data that might cause severe damage if not handled properly. Hence, defending its integrity, preserving its privacy, and maintaining its confidentiality as well as availability is of utmost importance. However, there are many protocols, models, architecture tools, etc. proposed to provide security. Nevertheless, almost every solution propound so far is not fully resilient and lacks in giving full protection to the system in some way or the other. So here, we have proposed a lightweight anonymous mutual authentication scheme for end devices and fog nodes.
引用
收藏
页码:1643 / 1657
页数:14
相关论文
共 50 条
  • [41] A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices
    Aburukba, Raafat O.
    Landolsi, Taha
    Omer, Dalia
    [J]. Journal of Network and Computer Applications, 2021, 180
  • [42] An Enhanced Mutual Authentication Scheme Based on ECDH for IoT Devices Using ESP8266
    Phimphinith, Anothay
    Xiong Anping
    Zhu, Qingyi
    Jiang, Yi
    Shen, Yong
    [J]. 2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 490 - 496
  • [43] Uncertainty-Aware Authentication Model for Fog Computing in IoT
    Heydari, Mohammad
    Mylonas, Alexios
    Katos, Vasilios
    Balaguer-Ballester, Emili
    Tafreshi, Vahid Heydari Fami
    Benkhelifa, Elhadj
    [J]. 2019 FOURTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2019, : 52 - 59
  • [44] Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model
    Amanlou, Sanaz
    Hasan, Mohammad Kamrul
    Abu Bakar, Khairul Azmi
    [J]. COMPUTER NETWORKS, 2021, 199
  • [45] An authentication scheme for distributed computing environment
    Jan, Saeed Ullah
    Qayum, Fawad
    [J]. International Journal of Information and Computer Security, 2020, 13 (02): : 227 - 248
  • [46] A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
    Yu, SungJin
    Park, KiSung
    Park, YoungHo
    [J]. SENSORS, 2019, 19 (16)
  • [47] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    [J]. SYMMETRY-BASEL, 2020, 12 (01):
  • [48] Cryptanalysis of an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment
    Li, Zhen
    Yang, Lei
    Wu, Tsu-Yang
    Chen, Chien-Ming
    [J]. ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING (ECC 2021), 2022, 268 : 339 - 347
  • [49] End to end light weight mutual authentication scheme in IoT-based healthcare environment
    Suganthi S.D.
    Anitha R.
    Sureshkumar V.
    Harish S.
    Agalya S.
    [J]. Journal of Reliable Intelligent Environments, 2020, 6 (01): : 3 - 13
  • [50] AMLT: A Mutual Authentication Scheme for Mobile Cloud Computing
    Dey, Saurabh
    Ye, Qiang
    Sampalli, Srinivas
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 700 - 705