2021
DOI: 10.1109/access.2021.3130471
|View full text |Cite
|
Sign up to set email alerts
|

Provable Secure Group Key Establishment Scheme for Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…In their article, there was no comparison of the significant security and functionality enhancements that were included. Using elliptic curve cryptography, Chen et al 15 introduced a mutual authentication group key establishment method applicable to the fog computing architecture. After both parties had successfully authenticated each other, the cloud server was able to hand off the burden of additional computing to the fog node.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In their article, there was no comparison of the significant security and functionality enhancements that were included. Using elliptic curve cryptography, Chen et al 15 introduced a mutual authentication group key establishment method applicable to the fog computing architecture. After both parties had successfully authenticated each other, the cloud server was able to hand off the burden of additional computing to the fog node.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The threat model we consider is the Canetti-Krawczyk (CK) adversary model [21][22][23], which is defined as follows:…”
Section: Threat Modelmentioning
confidence: 99%
“…ECC is a type of public key cryptography that offers security equivalent to more widely used cryptosystems such as the Rivest-Shamir-Adleman (RSA) algorithm while requiring fewer bits for computation [11,22]. Hence, the ECC is ideal for systems that are limited in terms of storage, bandwidth and power [11].…”
Section: Elliptic Curve Cryptographymentioning
confidence: 99%
“…Unquestionably, fog computing is a flexible, resource‐rich, and variable environment‐adapted network for efficient data sharing. However, its widespread distribution and open structural design expose it to various threats, jeopardizing the operation's security and safety 10 . In the IoT, fog nodes commonly comprise machines where information or data sharing takes place for the entire model based on trust.…”
Section: Introductionmentioning
confidence: 99%
“…However, its widespread distribution and open structural design expose it to various threats, jeopardizing the operation's security and safety. 10 In the IoT, fog nodes commonly comprise machines where information or data sharing takes place for the entire model based on trust. As a result, all processes and apps operating on fog benefit from efficient data sharing based on trust.…”
Section: Introductionmentioning
confidence: 99%