dc.contributor.author | Ali, Zeeshan | |
dc.contributor.author | Chaudhry, Shehzad Ashraf | |
dc.contributor.author | Mahmood, Khalid | |
dc.contributor.author | Garg, Sahil | |
dc.contributor.author | Lv, Zhihan | |
dc.contributor.author | Bin Zikria, Yousaf | |
dc.date.accessioned | 2023-07-04T11:27:42Z | |
dc.date.available | 2023-07-04T11:27:42Z | |
dc.date.issued | 2021 | en_US |
dc.identifier.issn | 1389-1286 | |
dc.identifier.issn | 1872-7069 | |
dc.identifier.uri | https://hdl.handle.net/11363/4939 | |
dc.description.abstract | Fog computing (FC) is an infrastructure consisting of decentralized computing, where computing resources such
as storage, applications, and data are scattered among the cloud and data source. Fog computing inherits similar
privacy and security concerns present in cloud computing, such as authentication and key management issues.
Recently, Wazid et al. presented a scheme of authentication key exchange for fog computing called SAKA-FC
to address these issues. We analyzed and identified that the SAKA-FC suffers from some severe vulnerabilities.
Furthermore, we presented an improved scheme to mitigate these problems while retaining its strengths. The
formal security analysis of the proposed scheme is validated through BAN logic. At the same time, the AVISPA
tool is employed for automated formal security verification. Informal security analysis is conducted to attest
that the proposal can confront the known attacks. Using computation and communication costs as the metrics,
the proposed scheme is also compared with some state-of-the-art schemes. The proposed scheme achieves the
same communication cost as of SAKA-FC, whereas the difference in computation cost is 24%. This increase
in computation cost is justifiable as the proposal is resistant to clogging attacks and provides better security
than the prior schemes. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS | en_US |
dc.relation.isversionof | 10.1016/j.comnet.2020.107731 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Authentication | en_US |
dc.subject | Authentication protocol | en_US |
dc.subject | Key management | en_US |
dc.subject | Access control | en_US |
dc.subject | Fog computing | en_US |
dc.title | A clogging resistant secure authentication scheme for fog computing services | en_US |
dc.type | article | en_US |
dc.relation.ispartof | Computer Networks | en_US |
dc.department | Mühendislik ve Mimarlık Fakültesi | en_US |
dc.authorid | https://orcid.org/0000-0001-7567-3101 | en_US |
dc.authorid | https://orcid.org/0000-0002-9321-6956 | en_US |
dc.authorid | https://orcid.org/0000-0001-5046-7766 | en_US |
dc.authorid | https://orcid.org/0000-0003-2525-3074 | en_US |
dc.identifier.volume | 185 | en_US |
dc.identifier.startpage | 1 | en_US |
dc.identifier.endpage | 13 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.institutionauthor | Chaudhry, Shehzad Ashraf | |