2019
DOI: 10.1007/s11276-019-02084-6
|View full text |Cite
|
Sign up to set email alerts
|

Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model

Abstract: Fog computing allows to connect the edge of the network, consisting of low cost Internet of Things devices, with high end cloud servers. Fog devices can perform data processing, which can significantly reduce the delay for the application. Moreover, data aggregation can be carried out by fog devices which decrease the bandwidth needed being very important for the wireless part of the communication with the cloud servers. The edge-fog-cloud architecture is currently being rolled out for several applications in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 30 publications
(21 citation statements)
references
References 30 publications
(67 reference statements)
0
21
0
Order By: Relevance
“…However, no anonymity is offered in here. Finally, in [43], an efficient, elliptic curve and identity based mutual authentication protocol with anonymity protection for devices is proposed. This scheme also offers protection in case of a Canetti-Krawczyk (CK) adversary model [44].…”
Section: Fog Architecturementioning
confidence: 99%
See 4 more Smart Citations
“…However, no anonymity is offered in here. Finally, in [43], an efficient, elliptic curve and identity based mutual authentication protocol with anonymity protection for devices is proposed. This scheme also offers protection in case of a Canetti-Krawczyk (CK) adversary model [44].…”
Section: Fog Architecturementioning
confidence: 99%
“…Table 3 provides an overview of the required cryptographic operations for the different phases in the scheme. As there are no other group authentication schemes for such fog architecture, we give as information the performance of the scheme in [43], proposing an anonymous pairwise mutual authentication scheme for a fog architecture. If we focus on the most constrained device, being the edge, we can conclude that our scheme is in the same range as [43].…”
Section: A Computational Costsmentioning
confidence: 99%
See 3 more Smart Citations