LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Security Enhancement on a Lightweight Authentication Scheme With Anonymity Fog Computing Architecture

Photo by anniespratt from unsplash

The multi-level, heterogeneous and third-party attributes of fog computing (FC) have caused great concern in the communication security of next-generation IoT systems. This paper proposes a secure authentication scheme for… Click to show full abstract

The multi-level, heterogeneous and third-party attributes of fog computing (FC) have caused great concern in the communication security of next-generation IoT systems. This paper proposes a secure authentication scheme for dynamic key generation capability, which can enhance the security of the entire heterogeneous network without the constraints on device types, attributes and communication protocols. The communication devices exchange IDs and random numbers for registration, then generate anonymous information. During the authentication process, the cloud device (e.g., the server) uses the pseudonym information to match the recorded random numbers. Both FC devices utilize the protocol with such random numbers to generate session keys and deliver updated random numbers. Comprehensive security and performance analysis shows that the scheme can meet the security requirements of the FC architecture with lower overhead.

Keywords: authentication; fog computing; random numbers; security; authentication scheme

Journal Title: IEEE Access
Year Published: 2020

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.