A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
نویسندگان
چکیده
Fog-driven IoT architecture located between devices and the centralized cloud infrastructure is introduced to extend computing, storage network services edge of Internet therefore resources fog nodes are available closer end user device for providing mobility, low latency location awareness. However, paradigm computing due its inherited properties from as inherits security privacy concerns such spoofing, message replay, impersonation, man-in-the middle physical capturing etc. To address these in services, this paper, a lightweight anonymous authentication secure communication scheme proposed it only used one-way hash function bitwise XOR operations when cloud, mutually authenticate each other. After successful authentication, both fog-based participants can agree on session key encrypt subsequent messages. The be ensured during process by using Burrows-Abadi-Needham (BAN) logic performance comparisons with existing schemes demonstrate that highly efficient.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملAn efficient and secure anonymous authentication scheme for mobile satellite communication systems
This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-way hash function for avoiding complex computations for both mobile users and network control center (NCC), (2) it does not require sens...
متن کاملA Lightweight Authentication Scheme for Mobile Cloud Computing
The ABI Research believes that the number of mobile cloud computing users is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. The security risks have become a hurdle in the rapid adaptability of the mobile cloud computing technology. Significant efforts have been devoted in research organizations and academia to securing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3123234