Authenticated key agreement scheme for fog-driven IoT healthcare system

The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless networks 2019-11, Vol.25 (8), p.4737-4750
Hauptverfasser: Jia, Xiaoying, He, Debiao, Kumar, Neeraj, Choo, Kim-Kwang Raymond
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 4750
container_issue 8
container_start_page 4737
container_title Wireless networks
container_volume 25
creator Jia, Xiaoying
He, Debiao
Kumar, Neeraj
Choo, Kim-Kwang Raymond
description The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.
doi_str_mv 10.1007/s11276-018-1759-3
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2046365235</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2046365235</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03</originalsourceid><addsrcrecordid>eNp1kEFLAzEQhYMoWKs_wNuC5-hMsptkj6VoFQpe6jmk2Um3td2tyVbovzelgicPwzyG997Ax9g9wiMC6KeEKLTigIajrmouL9gIKy24wVpdZg1CcABprtlNShsAMLKuR2w2OQwtdcPau4Ga4pOOhVtFol2-Fcm3WRShj3lWvInrb-qKt35RtOS2Q-tdpCId00C7W3YV3DbR3e8es4-X58X0lc_fZ2_TyZx7iWrgfhmk11IQOSNBBcJSa1WBXiLVNcnaexNQKm9UkFBKXTamwtKEyi0FNiDH7OHcu4_914HSYDf9IXb5pRVQKqkqIavswrPLxz6lSMHu43rn4tEi2BMve-ZlMy974mVlzohzJmVvt6L41_x_6AcmSWy9</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2046365235</pqid></control><display><type>article</type><title>Authenticated key agreement scheme for fog-driven IoT healthcare system</title><source>SpringerLink Journals - AutoHoldings</source><creator>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</creator><creatorcontrib>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</creatorcontrib><description>The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-018-1759-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Battlefields ; Cloud computing ; Communications Engineering ; Computer Communication Networks ; Cybersecurity ; Electrical Engineering ; Engineering ; Health care ; Internet of Things ; IT in Business ; Networks ; Protocols ; Wireless networks</subject><ispartof>Wireless networks, 2019-11, Vol.25 (8), p.4737-4750</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2018</rights><rights>Wireless Networks is a copyright of Springer, (2018). All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03</citedby><cites>FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03</cites><orcidid>0000-0002-2446-7436</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11276-018-1759-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11276-018-1759-3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Jia, Xiaoying</creatorcontrib><creatorcontrib>He, Debiao</creatorcontrib><creatorcontrib>Kumar, Neeraj</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><title>Authenticated key agreement scheme for fog-driven IoT healthcare system</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.</description><subject>Battlefields</subject><subject>Cloud computing</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cybersecurity</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Health care</subject><subject>Internet of Things</subject><subject>IT in Business</subject><subject>Networks</subject><subject>Protocols</subject><subject>Wireless networks</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kEFLAzEQhYMoWKs_wNuC5-hMsptkj6VoFQpe6jmk2Um3td2tyVbovzelgicPwzyG997Ax9g9wiMC6KeEKLTigIajrmouL9gIKy24wVpdZg1CcABprtlNShsAMLKuR2w2OQwtdcPau4Ga4pOOhVtFol2-Fcm3WRShj3lWvInrb-qKt35RtOS2Q-tdpCId00C7W3YV3DbR3e8es4-X58X0lc_fZ2_TyZx7iWrgfhmk11IQOSNBBcJSa1WBXiLVNcnaexNQKm9UkFBKXTamwtKEyi0FNiDH7OHcu4_914HSYDf9IXb5pRVQKqkqIavswrPLxz6lSMHu43rn4tEi2BMve-ZlMy974mVlzohzJmVvt6L41_x_6AcmSWy9</recordid><startdate>20191101</startdate><enddate>20191101</enddate><creator>Jia, Xiaoying</creator><creator>He, Debiao</creator><creator>Kumar, Neeraj</creator><creator>Choo, Kim-Kwang Raymond</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-2446-7436</orcidid></search><sort><creationdate>20191101</creationdate><title>Authenticated key agreement scheme for fog-driven IoT healthcare system</title><author>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Battlefields</topic><topic>Cloud computing</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cybersecurity</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Health care</topic><topic>Internet of Things</topic><topic>IT in Business</topic><topic>Networks</topic><topic>Protocols</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jia, Xiaoying</creatorcontrib><creatorcontrib>He, Debiao</creatorcontrib><creatorcontrib>Kumar, Neeraj</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jia, Xiaoying</au><au>He, Debiao</au><au>Kumar, Neeraj</au><au>Choo, Kim-Kwang Raymond</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Authenticated key agreement scheme for fog-driven IoT healthcare system</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2019-11-01</date><risdate>2019</risdate><volume>25</volume><issue>8</issue><spage>4737</spage><epage>4750</epage><pages>4737-4750</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-018-1759-3</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-2446-7436</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1022-0038
ispartof Wireless networks, 2019-11, Vol.25 (8), p.4737-4750
issn 1022-0038
1572-8196
language eng
recordid cdi_proquest_journals_2046365235
source SpringerLink Journals - AutoHoldings
subjects Battlefields
Cloud computing
Communications Engineering
Computer Communication Networks
Cybersecurity
Electrical Engineering
Engineering
Health care
Internet of Things
IT in Business
Networks
Protocols
Wireless networks
title Authenticated key agreement scheme for fog-driven IoT healthcare system
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T07%3A28%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Authenticated%20key%20agreement%20scheme%20for%20fog-driven%20IoT%20healthcare%20system&rft.jtitle=Wireless%20networks&rft.au=Jia,%20Xiaoying&rft.date=2019-11-01&rft.volume=25&rft.issue=8&rft.spage=4737&rft.epage=4750&rft.pages=4737-4750&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-018-1759-3&rft_dat=%3Cproquest_cross%3E2046365235%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2046365235&rft_id=info:pmid/&rfr_iscdi=true