|
Identity-Based and Anonymous Key Agreement Protocol for Fog Computing Resistant in the Canetti-Krawczyk Security Model This publication appears in: Wireless Networks Authors: S. Patonico, A. Braeken and K. Steenhaut Volume: 2019 Number of Pages: 13 Publication Date: Jul. 2019
Abstract: Fog computing allows to connect the edge ofthe network, consisting of low cost Internet of Thingsdevices, with high end cloud servers. Fog devices canperform data processing, which can signicantly re-duce the delay for the application. Moreover, data ag-gregation can be carried out by fog devices which de-crease the bandwidth needed being very important forthe wireless part of the communication with the cloudservers. The edge-fog-cloud architecture is currently be-ing rolled out for several applications in the eld of con-nected cars, health care monitoring, etc. In this paper,we propose an identity-based, mutual authenticated keyagreement protocol for this fog architecture, in whichend device and fog are able to establish a secure com-munication without leakage of their identities. Only thecloud server is able to control the identities of deviceand fog. We formally prove that the session keys arealso protected in the Canetti-Krawczyk security model,in which adversaries are considered to have access tosession state specic information, previous session keys,or long-term private keys. The scheme is very ecientas it only utilises elliptic curve operations and basicsymmetric key operations.
|
|