Abstract
Nowadays, fog computing has become an emerging hot-topic for possessing the same advantages as cloud computing and the lower latency. Nevertheless, there are still many issues in fog computing that worth studying, the most importantly of which are key agreement and user authentication. In order to achieve secure communication among different entities, designing a secure key agreement and user authentication scheme becomes an urgent issue. Although many schemes have been investigated the key agreement and user authentication for cloud computing, these schemes cannot be directly applied to the fog computing due to efficiency and cost. To tackle this problem, we propose a secure and efficient key agreement and user authentication scheme for fog computing. Our scheme can establish secure sessions among different entities, and users can achieve cross-domain access to other fog server. Most importantly, Our scheme satisfies the perfect forward security and the complete anonymity. We prove that our scheme is secure in the random oracle model, and achieve formal security verification through the AVISPA tool. Finally, the performance analysis demonstrates that our scheme tends to be more efficient in comparison with similar schemes.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.