Authenticated key agreement scheme for fog-driven IoT healthcare system
The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in...
Gespeichert in:
Veröffentlicht in: | Wireless networks 2019-11, Vol.25 (8), p.4737-4750 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 4750 |
---|---|
container_issue | 8 |
container_start_page | 4737 |
container_title | Wireless networks |
container_volume | 25 |
creator | Jia, Xiaoying He, Debiao Kumar, Neeraj Choo, Kim-Kwang Raymond |
description | The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs. |
doi_str_mv | 10.1007/s11276-018-1759-3 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2046365235</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2046365235</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03</originalsourceid><addsrcrecordid>eNp1kEFLAzEQhYMoWKs_wNuC5-hMsptkj6VoFQpe6jmk2Um3td2tyVbovzelgicPwzyG997Ax9g9wiMC6KeEKLTigIajrmouL9gIKy24wVpdZg1CcABprtlNShsAMLKuR2w2OQwtdcPau4Ga4pOOhVtFol2-Fcm3WRShj3lWvInrb-qKt35RtOS2Q-tdpCId00C7W3YV3DbR3e8es4-X58X0lc_fZ2_TyZx7iWrgfhmk11IQOSNBBcJSa1WBXiLVNcnaexNQKm9UkFBKXTamwtKEyi0FNiDH7OHcu4_914HSYDf9IXb5pRVQKqkqIavswrPLxz6lSMHu43rn4tEi2BMve-ZlMy974mVlzohzJmVvt6L41_x_6AcmSWy9</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2046365235</pqid></control><display><type>article</type><title>Authenticated key agreement scheme for fog-driven IoT healthcare system</title><source>SpringerLink Journals - AutoHoldings</source><creator>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</creator><creatorcontrib>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</creatorcontrib><description>The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-018-1759-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Battlefields ; Cloud computing ; Communications Engineering ; Computer Communication Networks ; Cybersecurity ; Electrical Engineering ; Engineering ; Health care ; Internet of Things ; IT in Business ; Networks ; Protocols ; Wireless networks</subject><ispartof>Wireless networks, 2019-11, Vol.25 (8), p.4737-4750</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2018</rights><rights>Wireless Networks is a copyright of Springer, (2018). All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03</citedby><cites>FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03</cites><orcidid>0000-0002-2446-7436</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11276-018-1759-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11276-018-1759-3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Jia, Xiaoying</creatorcontrib><creatorcontrib>He, Debiao</creatorcontrib><creatorcontrib>Kumar, Neeraj</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><title>Authenticated key agreement scheme for fog-driven IoT healthcare system</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.</description><subject>Battlefields</subject><subject>Cloud computing</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cybersecurity</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Health care</subject><subject>Internet of Things</subject><subject>IT in Business</subject><subject>Networks</subject><subject>Protocols</subject><subject>Wireless networks</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kEFLAzEQhYMoWKs_wNuC5-hMsptkj6VoFQpe6jmk2Um3td2tyVbovzelgicPwzyG997Ax9g9wiMC6KeEKLTigIajrmouL9gIKy24wVpdZg1CcABprtlNShsAMLKuR2w2OQwtdcPau4Ga4pOOhVtFol2-Fcm3WRShj3lWvInrb-qKt35RtOS2Q-tdpCId00C7W3YV3DbR3e8es4-X58X0lc_fZ2_TyZx7iWrgfhmk11IQOSNBBcJSa1WBXiLVNcnaexNQKm9UkFBKXTamwtKEyi0FNiDH7OHcu4_914HSYDf9IXb5pRVQKqkqIavswrPLxz6lSMHu43rn4tEi2BMve-ZlMy974mVlzohzJmVvt6L41_x_6AcmSWy9</recordid><startdate>20191101</startdate><enddate>20191101</enddate><creator>Jia, Xiaoying</creator><creator>He, Debiao</creator><creator>Kumar, Neeraj</creator><creator>Choo, Kim-Kwang Raymond</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-2446-7436</orcidid></search><sort><creationdate>20191101</creationdate><title>Authenticated key agreement scheme for fog-driven IoT healthcare system</title><author>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Battlefields</topic><topic>Cloud computing</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cybersecurity</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Health care</topic><topic>Internet of Things</topic><topic>IT in Business</topic><topic>Networks</topic><topic>Protocols</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jia, Xiaoying</creatorcontrib><creatorcontrib>He, Debiao</creatorcontrib><creatorcontrib>Kumar, Neeraj</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jia, Xiaoying</au><au>He, Debiao</au><au>Kumar, Neeraj</au><au>Choo, Kim-Kwang Raymond</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Authenticated key agreement scheme for fog-driven IoT healthcare system</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2019-11-01</date><risdate>2019</risdate><volume>25</volume><issue>8</issue><spage>4737</spage><epage>4750</epage><pages>4737-4750</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-018-1759-3</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-2446-7436</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1022-0038 |
ispartof | Wireless networks, 2019-11, Vol.25 (8), p.4737-4750 |
issn | 1022-0038 1572-8196 |
language | eng |
recordid | cdi_proquest_journals_2046365235 |
source | SpringerLink Journals - AutoHoldings |
subjects | Battlefields Cloud computing Communications Engineering Computer Communication Networks Cybersecurity Electrical Engineering Engineering Health care Internet of Things IT in Business Networks Protocols Wireless networks |
title | Authenticated key agreement scheme for fog-driven IoT healthcare system |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T07%3A28%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Authenticated%20key%20agreement%20scheme%20for%20fog-driven%20IoT%20healthcare%20system&rft.jtitle=Wireless%20networks&rft.au=Jia,%20Xiaoying&rft.date=2019-11-01&rft.volume=25&rft.issue=8&rft.spage=4737&rft.epage=4750&rft.pages=4737-4750&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-018-1759-3&rft_dat=%3Cproquest_cross%3E2046365235%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2046365235&rft_id=info:pmid/&rfr_iscdi=true |