A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services

Fog-driven IoT architecture located between IoT devices and the centralized cloud infrastructure is introduced to extend computing, storage and network services to the edge of the Internet and therefore resources and services of the fog nodes are available and are closer to the end user and end devi...

Full description

Bibliographic Details
Main Authors: Chi-Yao Weng, Chun-Ta Li, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9585460/
_version_ 1818826149753520128
author Chi-Yao Weng
Chun-Ta Li
Chin-Ling Chen
Cheng-Chi Lee
Yong-Yuan Deng
author_facet Chi-Yao Weng
Chun-Ta Li
Chin-Ling Chen
Cheng-Chi Lee
Yong-Yuan Deng
author_sort Chi-Yao Weng
collection DOAJ
description Fog-driven IoT architecture located between IoT devices and the centralized cloud infrastructure is introduced to extend computing, storage and network services to the edge of the Internet and therefore resources and services of the fog nodes are available and are closer to the end user and end device for providing mobility, low latency and location awareness. However, the paradigm of fog computing due to its inherited properties from cloud as inherits its security and privacy concerns such as spoofing, message replay, impersonation, man-in-the middle and physical capturing of IoT devices etc. To address these concerns in fog computing services, in this paper, a lightweight anonymous authentication and secure communication scheme is proposed and it only used secure one-way hash function and bitwise XOR operations when cloud, fog and user mutually authenticate each other. After the successful authentication, both fog-based participants can agree on a session key to encrypt the subsequent communication messages. The security can be ensured during authentication process by using the Burrows-Abadi-Needham (BAN) logic and the performance comparisons with existing schemes demonstrate that the proposed scheme is secure and highly efficient.
first_indexed 2024-12-19T00:23:05Z
format Article
id doaj.art-ff651c67e1354f4e8542a7d947cdc86e
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-19T00:23:05Z
publishDate 2021-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-ff651c67e1354f4e8542a7d947cdc86e2022-12-21T20:45:28ZengIEEEIEEE Access2169-35362021-01-01914552214553710.1109/ACCESS.2021.31232349585460A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing ServicesChi-Yao Weng0https://orcid.org/0000-0002-0501-8475Chun-Ta Li1https://orcid.org/0000-0003-0637-5666Chin-Ling Chen2https://orcid.org/0000-0002-4958-2043Cheng-Chi Lee3https://orcid.org/0000-0002-8918-1703Yong-Yuan Deng4https://orcid.org/0000-0002-9581-8184Department of Computer Science, National Pingtung University, Pingtung City, TaiwanDepartment of Information Management, Tainan University of Technology, Tainan, TaiwanDepartment of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung, TaiwanDepartment of Library and Information Science, Research and Development Center for Physical Education, Health, and Information Technology, Fu Jen Catholic University, New Taipei City, TaiwanDepartment of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung, TaiwanFog-driven IoT architecture located between IoT devices and the centralized cloud infrastructure is introduced to extend computing, storage and network services to the edge of the Internet and therefore resources and services of the fog nodes are available and are closer to the end user and end device for providing mobility, low latency and location awareness. However, the paradigm of fog computing due to its inherited properties from cloud as inherits its security and privacy concerns such as spoofing, message replay, impersonation, man-in-the middle and physical capturing of IoT devices etc. To address these concerns in fog computing services, in this paper, a lightweight anonymous authentication and secure communication scheme is proposed and it only used secure one-way hash function and bitwise XOR operations when cloud, fog and user mutually authenticate each other. After the successful authentication, both fog-based participants can agree on a session key to encrypt the subsequent communication messages. The security can be ensured during authentication process by using the Burrows-Abadi-Needham (BAN) logic and the performance comparisons with existing schemes demonstrate that the proposed scheme is secure and highly efficient.https://ieeexplore.ieee.org/document/9585460/Anonymous authenticationfog computingInternet of Thingssession key agreementsecurity
spellingShingle Chi-Yao Weng
Chun-Ta Li
Chin-Ling Chen
Cheng-Chi Lee
Yong-Yuan Deng
A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
IEEE Access
Anonymous authentication
fog computing
Internet of Things
session key agreement
security
title A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
title_full A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
title_fullStr A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
title_full_unstemmed A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
title_short A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
title_sort lightweight anonymous authentication and secure communication scheme for fog computing services
topic Anonymous authentication
fog computing
Internet of Things
session key agreement
security
url https://ieeexplore.ieee.org/document/9585460/
work_keys_str_mv AT chiyaoweng alightweightanonymousauthenticationandsecurecommunicationschemeforfogcomputingservices
AT chuntali alightweightanonymousauthenticationandsecurecommunicationschemeforfogcomputingservices
AT chinlingchen alightweightanonymousauthenticationandsecurecommunicationschemeforfogcomputingservices
AT chengchilee alightweightanonymousauthenticationandsecurecommunicationschemeforfogcomputingservices
AT yongyuandeng alightweightanonymousauthenticationandsecurecommunicationschemeforfogcomputingservices
AT chiyaoweng lightweightanonymousauthenticationandsecurecommunicationschemeforfogcomputingservices
AT chuntali lightweightanonymousauthenticationandsecurecommunicationschemeforfogcomputingservices
AT chinlingchen lightweightanonymousauthenticationandsecurecommunicationschemeforfogcomputingservices
AT chengchilee lightweightanonymousauthenticationandsecurecommunicationschemeforfogcomputingservices
AT yongyuandeng lightweightanonymousauthenticationandsecurecommunicationschemeforfogcomputingservices