4.5 Article

Authenticated key agreement scheme for fog-driven IoT healthcare system

Journal

WIRELESS NETWORKS
Volume 25, Issue 8, Pages 4737-4750

Publisher

SPRINGER
DOI: 10.1007/s11276-018-1759-3

Keywords

Fog computing; Cloud computing; Internet-of-Things (IoT); Healthcare; Authenticated key agreement

Funding

  1. National Natural Science Foundation of China [61501333, 61572379, U1536204]
  2. National High-Tech Research and Development Program of China (863 Program) [2015AA016004]
  3. Fundamental Research Funds for the Central Universities [CZY18034]

Ask authors/readers for more resources

The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available