Gelişmiş Arama

Basit öğe kaydını göster

dc.contributor.authorAli, Zeeshan
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.contributor.authorMahmood, Khalid
dc.contributor.authorGarg, Sahil
dc.contributor.authorLv, Zhihan
dc.contributor.authorBin Zikria, Yousaf
dc.date.accessioned2023-07-04T11:27:42Z
dc.date.available2023-07-04T11:27:42Z
dc.date.issued2021en_US
dc.identifier.issn1389-1286
dc.identifier.issn1872-7069
dc.identifier.urihttps://hdl.handle.net/11363/4939
dc.description.abstractFog computing (FC) is an infrastructure consisting of decentralized computing, where computing resources such as storage, applications, and data are scattered among the cloud and data source. Fog computing inherits similar privacy and security concerns present in cloud computing, such as authentication and key management issues. Recently, Wazid et al. presented a scheme of authentication key exchange for fog computing called SAKA-FC to address these issues. We analyzed and identified that the SAKA-FC suffers from some severe vulnerabilities. Furthermore, we presented an improved scheme to mitigate these problems while retaining its strengths. The formal security analysis of the proposed scheme is validated through BAN logic. At the same time, the AVISPA tool is employed for automated formal security verification. Informal security analysis is conducted to attest that the proposal can confront the known attacks. Using computation and communication costs as the metrics, the proposed scheme is also compared with some state-of-the-art schemes. The proposed scheme achieves the same communication cost as of SAKA-FC, whereas the difference in computation cost is 24%. This increase in computation cost is justifiable as the proposal is resistant to clogging attacks and provides better security than the prior schemes.en_US
dc.language.isoengen_US
dc.publisherELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDSen_US
dc.relation.isversionof10.1016/j.comnet.2020.107731en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectAuthenticationen_US
dc.subjectAuthentication protocolen_US
dc.subjectKey managementen_US
dc.subjectAccess controlen_US
dc.subjectFog computingen_US
dc.titleA clogging resistant secure authentication scheme for fog computing servicesen_US
dc.typearticleen_US
dc.relation.ispartofComputer Networksen_US
dc.departmentMühendislik ve Mimarlık Fakültesien_US
dc.authoridhttps://orcid.org/0000-0001-7567-3101en_US
dc.authoridhttps://orcid.org/0000-0002-9321-6956en_US
dc.authoridhttps://orcid.org/0000-0001-5046-7766en_US
dc.authoridhttps://orcid.org/0000-0003-2525-3074en_US
dc.identifier.volume185en_US
dc.identifier.startpage1en_US
dc.identifier.endpage13en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.institutionauthorChaudhry, Shehzad Ashraf


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster

info:eu-repo/semantics/openAccess
Aksi belirtilmediği sürece bu öğenin lisansı: info:eu-repo/semantics/openAccess