4.7 Article

A clogging resistant secure authentication scheme for fog computing services

期刊

COMPUTER NETWORKS
卷 185, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.comnet.2020.107731

关键词

Authentication; Authentication protocol; Key management; Access control; Fog computing

资金

  1. National Natural Science Foundation of China [61902203]
  2. Key Research and Development Plan - Major Scientific and Technological Innovation Projects of ShanDong Province, China [2019JZZY020101]

向作者/读者索取更多资源

This passage introduces fog computing infrastructure and its similarities to cloud computing in terms of privacy and security issues, as well as the SAKA-FC scheme to address these issues. It identifies vulnerabilities in SAKA-FC and proposes an improved scheme, which is validated through formal and informal security analysis to be effective, and compared in terms of costs with other schemes.
Fog computing (FC) is an infrastructure consisting of decentralized computing, where computing resources such as storage, applications, and data are scattered among the cloud and data source. Fog computing inherits similar privacy and security concerns present in cloud computing, such as authentication and key management issues. Recently, Wazid et al. presented a scheme of authentication key exchange for fog computing called SAKA-FC to address these issues. We analyzed and identified that the SAKA-FC suffers from some severe vulnerabilities. Furthermore, we presented an improved scheme to mitigate these problems while retaining its strengths. The formal security analysis of the proposed scheme is validated through BAN logic. At the same time, the AVISPA tool is employed for automated formal security verification. Informal security analysis is conducted to attest that the proposal can confront the known attacks. Using computation and communication costs as the metrics, the proposed scheme is also compared with some state-of-the-art schemes. The proposed scheme achieves the same communication cost as of SAKA-FC, whereas the difference in computation cost is 24%. This increase in computation cost is justifiable as the proposal is resistant to clogging attacks and provides better security than the prior schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据