Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment
The application of the Internet of Things has been greatly expanded; meanwhile, real-time and efficient communication has become an important feature of the Internet of Things. However, the centralized characteristics of cloud computing cannot meet the needs of low latency and high computing efficie...
Gespeichert in:
Veröffentlicht in: | IEEE access 2023, Vol.11, p.46871-46881 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The application of the Internet of Things has been greatly expanded; meanwhile, real-time and efficient communication has become an important feature of the Internet of Things. However, the centralized characteristics of cloud computing cannot meet the needs of low latency and high computing efficiency. To solve these issues, we utilized fog computing which is a new distributed computing paradigm that extends cloud services to the edge of the network, with mobility and low latency. Nevertheless, fog computing also brings new security issues, especially identity authentication. Authentication and key exchange are significant challenges that need to be taken into consideration in fog computing. Therefore, in this research, we proposed the architecture of the mutual authentication key establishment scheme based on elliptic curve cryptography for fog computing. After mutual authentication, the cloud server can transfer the remaining verification work to fog nodes, and fog nodes will be responsible for authenticating the device and distributing the established session key, thereby reducing the computational cost of the cloud server. Moreover, to evaluate the security of the proposed scheme, we not only used the random oracle model and the extended Canetti-Krawczyk (eCK) threat model to conduct a detailed analysis, but also proved that the security of the proposed scheme is strong enough against several attacks. |
---|---|
ISSN: | 2169-3536 2169-3536 |
DOI: | 10.1109/ACCESS.2023.3275017 |