2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00091
|View full text |Cite
|
Sign up to set email alerts
|

MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Fog computing is a more interesting area to the researchers since it provides more advantages than cloud computing [ 23 , 24 , 25 ]. The work in [ 26 , 27 ] uses fog computing in an IoT environment, while [ 28 , 29 ] use fog computing in a VANET environment.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Fog computing is a more interesting area to the researchers since it provides more advantages than cloud computing [ 23 , 24 , 25 ]. The work in [ 26 , 27 ] uses fog computing in an IoT environment, while [ 28 , 29 ] use fog computing in a VANET environment.…”
Section: Related Workmentioning
confidence: 99%
“…The author in [ 26 ] proposes mutual authentication between fog nodes and users at the edge of the network using blockchain technology and a secret sharing technique. A fog node would maintain a blockchain that allows a user to authenticate any fog node in the architecture (fog nodes would be able to establish mutual authentication with each other).…”
Section: Related Workmentioning
confidence: 99%
“…Youcef et.al [12] proposed a novel, efficient authentication technique to implement a mutual authentication in fog computing. This scheme ensures the registration of fog nodes and fog users at the cloud level.…”
Section: Fig 2 Flow Of Authenticationmentioning
confidence: 99%
“…Identities sent over a public channel and hence prone to attacks Imine et al 26 The token-based approach based on the Ethereum platform -Remix IDE Evaluated was restricted to registration phase, addition and removal of fog devices Borgohain et al 10 Registration credentials are stored at the cloud level, and authentication is done at the fog level Dependence on the cloud makes it partially centralized. Moreover, no simulation described Patwary et al 27 Blockchain-based authentication model for fog devices while considering their dynamic nature.…”
Section: Heterogeneity Of Devices Introduces Complexity Overheadmentioning
confidence: 99%