Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

11-03-2021

Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment

Authors: Saurabh Rana, Dheerendra Mishra, Riya Arora

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Fog computing is an emerging paradigm that provides confluence facilities between Internet of Things (IoT) devices and cloud. The fog nodes process the information collected by the IoT devices, thereby providing services to the cloud. With the addition of an extra layer, the environment achieves better latency, mobility support, location-awareness, and real-time data handling. Further research in this area also draws attention to the existing quality of fog computing, and emerging security and privacy challenges. The increasing number of IoT devices and the introduction of middle-layer over public network introduces performance, correctness, accountability and security challenges. To ensure accountability along with privacy, a key agreement scheme is proposed for fog supported IoT environment. The proposed scheme is competent in term of security and efficiency. The security proof is proclaimed using the widely recognized random oracle model, which indicates that the proposed scheme is provably secure under any probabilistic polynomial time adversary. Moreover, the comparative analysis of performances is also satisfactory.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bellare, M., Pointcheval, D., & Rogaway, P. (2000). Authenticated key exchange secure against dictionary attacks. In International conference on the theory and applications of cryptographic techniques, (pp. 139–155). Springer Bellare, M., Pointcheval, D., & Rogaway, P. (2000). Authenticated key exchange secure against dictionary attacks. In International conference on the theory and applications of cryptographic techniques, (pp. 139–155). Springer
2.
go back to reference Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing, (pp. 13–16). ACM Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing, (pp. 13–16). ACM
3.
go back to reference Butun, I., Erol-Kantarci, M., Kantarci, B., & Song, H. (2016). Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Communications Magazine, 54(4), 47–53.CrossRef Butun, I., Erol-Kantarci, M., Kantarci, B., & Song, H. (2016). Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Communications Magazine, 54(4), 47–53.CrossRef
4.
go back to reference Chatterjee, S., Roy, S., Das, A. K., Chattopadhyay, S., Kumar, N., & Vasilakos, A. V. (2018). Secure biometric-based authentication scheme using chebyshev chaotic map for multi-server environment. IEEE Transactions on Dependable and Secure Computing, 15(5), 824–839.CrossRef Chatterjee, S., Roy, S., Das, A. K., Chattopadhyay, S., Kumar, N., & Vasilakos, A. V. (2018). Secure biometric-based authentication scheme using chebyshev chaotic map for multi-server environment. IEEE Transactions on Dependable and Secure Computing, 15(5), 824–839.CrossRef
5.
go back to reference Dastjerdi, A. V., & Buyya, R. (2016). Fog computing: Helping the internet of things realize its potential. Computer, 49(8), 112–116.CrossRef Dastjerdi, A. V., & Buyya, R. (2016). Fog computing: Helping the internet of things realize its potential. Computer, 49(8), 112–116.CrossRef
6.
go back to reference Dolui, K., & Datta, S. K. (2017). Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In 2017 Global Internet of Things Summit (GIoTS), (pp. 1–6). IEEE. Dolui, K., & Datta, S. K. (2017). Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In 2017 Global Internet of Things Summit (GIoTS), (pp. 1–6). IEEE.
7.
go back to reference Guan, Y., Shao, J., Wei, G., & Xie, M. (2018). Data security and privacy in fog computing. IEEE Network, 99, 1–6. Guan, Y., Shao, J., Wei, G., & Xie, M. (2018). Data security and privacy in fog computing. IEEE Network, 99, 1–6.
8.
go back to reference Hou, X., Li, Y., Chen, M., Di, W., Jin, D., & Chen, S. (2016). Vehicular fog computing: A viewpoint of vehicles as the infrastructures. IEEE Transactions on Vehicular Technology, 65(6), 3860–3873.CrossRef Hou, X., Li, Y., Chen, M., Di, W., Jin, D., & Chen, S. (2016). Vehicular fog computing: A viewpoint of vehicles as the infrastructures. IEEE Transactions on Vehicular Technology, 65(6), 3860–3873.CrossRef
9.
go back to reference Ibrahim, M. H. (2016). Octopus: An edge-fog mutual authentication scheme. IJ Network Security, 18(6), 1089–1101. Ibrahim, M. H. (2016). Octopus: An edge-fog mutual authentication scheme. IJ Network Security, 18(6), 1089–1101.
10.
go back to reference Jakobsson, M., & Pointcheval, D., (2001). Mutual authentication for low-power mobile devices. In International Conference on Financial Cryptography, (pp. 178–195). Springer. Jakobsson, M., & Pointcheval, D., (2001). Mutual authentication for low-power mobile devices. In International Conference on Financial Cryptography, (pp. 178–195). Springer.
11.
go back to reference Jia, X., He, D., Kumar, N., & Choo, K. -K. R. (2019). Authenticated key agreement scheme for fog-driven iot healthcare system. Wireless Networks, 25(8), 4737–4750. Jia, X., He, D., Kumar, N., & Choo, K. -K. R. (2019). Authenticated key agreement scheme for fog-driven iot healthcare system. Wireless Networks, 25(8), 4737–4750.
12.
go back to reference Li, H., Li, F., Song, C., & Yan, Y. (2015). Towards smart card based mutual authentication schemes in cloud computing. KSII Transactions on Internet and Information Systems (TIIS), 9(7), 2719–2735. Li, H., Li, F., Song, C., & Yan, Y. (2015). Towards smart card based mutual authentication schemes in cloud computing. KSII Transactions on Internet and Information Systems (TIIS), 9(7), 2719–2735.
13.
go back to reference Luan, T. H., Gao, L., Li, Z., Xiang, Y., Wei, G., & Sun, L. (2015). Fog computing: Focusing on mobile users at the edge. arXiv preprint arXiv:1502.01815. Luan, T. H., Gao, L., Li, Z., Xiang, Y., Wei, G., & Sun, L. (2015). Fog computing: Focusing on mobile users at the edge. arXiv preprint arXiv:​1502.​01815.
14.
go back to reference Madsen, H., Burtschy, B., Albeanu, G., & Popentiu-Vladicescu, F. L. (2013). Reliability in the utility computing era: Towards reliable fog computing. In 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP), (pp. 43–46). IEEE. Madsen, H., Burtschy, B., Albeanu, G., & Popentiu-Vladicescu, F. L. (2013). Reliability in the utility computing era: Towards reliable fog computing. In 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP), (pp. 43–46). IEEE.
15.
go back to reference Odelu, V., Das, A. K., Wazid, M., & Conti, M. (2018). Provably secure authenticated key agreement scheme for smart grid. IEEE Transactions on Smart Grid, 9(3), 1900–1910. Odelu, V., Das, A. K., Wazid, M., & Conti, M. (2018). Provably secure authenticated key agreement scheme for smart grid. IEEE Transactions on Smart Grid, 9(3), 1900–1910.
16.
go back to reference Arul Mozhi Pradeepa, M., & Gomathi, B. (2017). Towards fog computing based cloud sensor integration for internet of things. International Journal of Computer Science and Engineering Communications, 5(6), 1761–1773. Arul Mozhi Pradeepa, M., & Gomathi, B. (2017). Towards fog computing based cloud sensor integration for internet of things. International Journal of Computer Science and Engineering Communications, 5(6), 1761–1773.
17.
go back to reference Shen, J., Yang, H., Wang, A., Zhou, T., & Wang, C. (2019). Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing. Peer-to-Peer Networking and Applications, 12(4), 924–933. Shen, J., Yang, H., Wang, A., Zhou, T., & Wang, C. (2019). Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing. Peer-to-Peer Networking and Applications, 12(4), 924–933.
18.
go back to reference Srinivas, J., Das, A. K., Kumar, N., & Rodrigues, J. (2018). Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable and Secure Computing, 17, 942–956.CrossRef Srinivas, J., Das, A. K., Kumar, N., & Rodrigues, J. (2018). Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable and Secure Computing, 17, 942–956.CrossRef
19.
go back to reference Stojmenovic, I., & Wen S. (2014). The fog computing paradigm: Scenarios and security issues. In 2014 Federated conference on computer science and information systems, (pp. 1–8). IEEE. Stojmenovic, I., & Wen S. (2014). The fog computing paradigm: Scenarios and security issues. In 2014 Federated conference on computer science and information systems, (pp. 1–8). IEEE.
20.
go back to reference Stolfo, S. J., Salem, M. B., & Keromytis, A. D. (2012). Fog computing: Mitigating insider data theft attacks in the cloud. In 2012 IEEE symposium on security and privacy workshops, (pp. 125–128). IEEE. Stolfo, S. J., Salem, M. B., & Keromytis, A. D. (2012). Fog computing: Mitigating insider data theft attacks in the cloud. In 2012 IEEE symposium on security and privacy workshops, (pp. 125–128). IEEE.
21.
go back to reference Wazid, M., Das, A. K., Kumar, N., & Vasilakos, A. V. (2019). Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems, 91, 475–492.CrossRef Wazid, M., Das, A. K., Kumar, N., & Vasilakos, A. V. (2019). Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems, 91, 475–492.CrossRef
22.
go back to reference Yi, S., Li, C., & Li, Q. (2015). A survey of fog computing: concepts, applications and issues. In Proceedings of the 2015 workshop on mobile big data, (pp. 37–42). ACM. Yi, S., Li, C., & Li, Q. (2015). A survey of fog computing: concepts, applications and issues. In Proceedings of the 2015 workshop on mobile big data, (pp. 37–42). ACM.
Metadata
Title
Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment
Authors
Saurabh Rana
Dheerendra Mishra
Riya Arora
Publication date
11-03-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08234-4

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue