A clogging resistant secure authentication scheme for fog computing services
dc.authorid | https://orcid.org/0000-0001-7567-3101 | en_US |
dc.authorid | https://orcid.org/0000-0002-9321-6956 | en_US |
dc.authorid | https://orcid.org/0000-0001-5046-7766 | en_US |
dc.authorid | https://orcid.org/0000-0003-2525-3074 | en_US |
dc.contributor.author | Ali, Zeeshan | |
dc.contributor.author | Chaudhry, Shehzad Ashraf | |
dc.contributor.author | Mahmood, Khalid | |
dc.contributor.author | Garg, Sahil | |
dc.contributor.author | Lv, Zhihan | |
dc.contributor.author | Bin Zikria, Yousaf | |
dc.date.accessioned | 2023-07-04T11:27:42Z | |
dc.date.available | 2023-07-04T11:27:42Z | |
dc.date.issued | 2021 | en_US |
dc.department | Mühendislik ve Mimarlık Fakültesi | en_US |
dc.description.abstract | Fog computing (FC) is an infrastructure consisting of decentralized computing, where computing resources such as storage, applications, and data are scattered among the cloud and data source. Fog computing inherits similar privacy and security concerns present in cloud computing, such as authentication and key management issues. Recently, Wazid et al. presented a scheme of authentication key exchange for fog computing called SAKA-FC to address these issues. We analyzed and identified that the SAKA-FC suffers from some severe vulnerabilities. Furthermore, we presented an improved scheme to mitigate these problems while retaining its strengths. The formal security analysis of the proposed scheme is validated through BAN logic. At the same time, the AVISPA tool is employed for automated formal security verification. Informal security analysis is conducted to attest that the proposal can confront the known attacks. Using computation and communication costs as the metrics, the proposed scheme is also compared with some state-of-the-art schemes. The proposed scheme achieves the same communication cost as of SAKA-FC, whereas the difference in computation cost is 24%. This increase in computation cost is justifiable as the proposal is resistant to clogging attacks and provides better security than the prior schemes. | en_US |
dc.identifier.doi | 10.1016/j.comnet.2020.107731 | en_US |
dc.identifier.endpage | 13 | en_US |
dc.identifier.issn | 1389-1286 | |
dc.identifier.issn | 1872-7069 | |
dc.identifier.scopus | 2-s2.0-85097450323 | en_US |
dc.identifier.scopusquality | Q1 | en_US |
dc.identifier.startpage | 1 | en_US |
dc.identifier.uri | https://hdl.handle.net/11363/4939 | |
dc.identifier.uri | https://doi.org/ | |
dc.identifier.volume | 185 | en_US |
dc.identifier.wos | WOS:000612218600007 | en_US |
dc.identifier.wosquality | Q1 | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.institutionauthor | Chaudhry, Shehzad Ashraf | |
dc.language.iso | en | en_US |
dc.publisher | ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS | en_US |
dc.relation.ispartof | Computer Networks | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Authentication | en_US |
dc.subject | Authentication protocol | en_US |
dc.subject | Key management | en_US |
dc.subject | Access control | en_US |
dc.subject | Fog computing | en_US |
dc.title | A clogging resistant secure authentication scheme for fog computing services | en_US |
dc.type | Article | en_US |