A clogging resistant secure authentication scheme for fog computing services

dc.authoridhttps://orcid.org/0000-0001-7567-3101en_US
dc.authoridhttps://orcid.org/0000-0002-9321-6956en_US
dc.authoridhttps://orcid.org/0000-0001-5046-7766en_US
dc.authoridhttps://orcid.org/0000-0003-2525-3074en_US
dc.contributor.authorAli, Zeeshan
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.contributor.authorMahmood, Khalid
dc.contributor.authorGarg, Sahil
dc.contributor.authorLv, Zhihan
dc.contributor.authorBin Zikria, Yousaf
dc.date.accessioned2023-07-04T11:27:42Z
dc.date.available2023-07-04T11:27:42Z
dc.date.issued2021en_US
dc.departmentMühendislik ve Mimarlık Fakültesien_US
dc.description.abstractFog computing (FC) is an infrastructure consisting of decentralized computing, where computing resources such as storage, applications, and data are scattered among the cloud and data source. Fog computing inherits similar privacy and security concerns present in cloud computing, such as authentication and key management issues. Recently, Wazid et al. presented a scheme of authentication key exchange for fog computing called SAKA-FC to address these issues. We analyzed and identified that the SAKA-FC suffers from some severe vulnerabilities. Furthermore, we presented an improved scheme to mitigate these problems while retaining its strengths. The formal security analysis of the proposed scheme is validated through BAN logic. At the same time, the AVISPA tool is employed for automated formal security verification. Informal security analysis is conducted to attest that the proposal can confront the known attacks. Using computation and communication costs as the metrics, the proposed scheme is also compared with some state-of-the-art schemes. The proposed scheme achieves the same communication cost as of SAKA-FC, whereas the difference in computation cost is 24%. This increase in computation cost is justifiable as the proposal is resistant to clogging attacks and provides better security than the prior schemes.en_US
dc.identifier.doi10.1016/j.comnet.2020.107731en_US
dc.identifier.endpage13en_US
dc.identifier.issn1389-1286
dc.identifier.issn1872-7069
dc.identifier.scopus2-s2.0-85097450323en_US
dc.identifier.scopusqualityQ1en_US
dc.identifier.startpage1en_US
dc.identifier.urihttps://hdl.handle.net/11363/4939
dc.identifier.urihttps://doi.org/
dc.identifier.volume185en_US
dc.identifier.wosWOS:000612218600007en_US
dc.identifier.wosqualityQ1en_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.indekslendigikaynakScopusen_US
dc.institutionauthorChaudhry, Shehzad Ashraf
dc.language.isoenen_US
dc.publisherELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDSen_US
dc.relation.ispartofComputer Networksen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectAuthenticationen_US
dc.subjectAuthentication protocolen_US
dc.subjectKey managementen_US
dc.subjectAccess controlen_US
dc.subjectFog computingen_US
dc.titleA clogging resistant secure authentication scheme for fog computing servicesen_US
dc.typeArticleen_US

Dosyalar

Orijinal paket
Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
İsim:
1-s2.0-S1389128620313219-main.pdf
Boyut:
1.85 MB
Biçim:
Adobe Portable Document Format
Açıklama:
Makale / Article
Lisans paketi
Listeleniyor 1 - 1 / 1
[ N/A ]
İsim:
license.txt
Boyut:
1.56 KB
Biçim:
Item-specific license agreed upon to submission
Açıklama: