LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment

Photo by hudsoncrafted from unsplash

The application of the Internet of Things has been greatly expanded; meanwhile, real-time and efficient communication has become an important feature of the Internet of Things. However, the centralized characteristics… Click to show full abstract

The application of the Internet of Things has been greatly expanded; meanwhile, real-time and efficient communication has become an important feature of the Internet of Things. However, the centralized characteristics of cloud computing cannot meet the needs of low latency and high computing efficiency. To solve these issues, we utilized fog computing which is a new distributed computing paradigm that extends cloud services to the edge of the network, with mobility and low latency. Nevertheless, fog computing also brings new security issues, especially identity authentication. Authentication and key exchange are significant challenges that need to be taken into consideration in fog computing. Therefore, in this research, we proposed the architecture of the mutual authentication key establishment scheme based on elliptic curve cryptography for fog computing. After mutual authentication, the cloud server can transfer the remaining verification work to fog nodes, and fog nodes will be responsible for authenticating the device and distributing the established session key, thereby reducing the computational cost of the cloud server. Moreover, to evaluate the security of the proposed scheme, we not only used the random oracle model and the extended Canetti-Krawczyk (eCK) threat model to conduct a detailed analysis, but also proved that the security of the proposed scheme is strong enough against several attacks.

Keywords: authentication; authenticated key; scheme; fog; fog computing; key agreement

Journal Title: IEEE Access
Year Published: 2023

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.