Publication | Closed Access
A secure authenticated and key exchange scheme for fog computing
152
Citations
53
References
2020
Year
EngineeringFog Computing SecurityInformation SecuritySmart ManufacturingIot SecurityKey Exchange SchemeHardware SecurityFog ComputingInternet Of ThingsSecure ProtocolAuthentication ProtocolLightweight Authentication MechanismData PrivacyComputer ScienceMobile ComputingData SecurityCryptographyEdge ComputingCloud Computing
Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security challenges of cloud computing is inevitable. Recently, Jia et al. proposed an authenticated key exchange scheme for fog-driven IoT health care systems. Unfortunately, we discovered their scheme is vulnerable to an ephemeral secret leakage attack. In this paper, we propose an authenticated key exchange scheme for fog computing. Compared with previous schemes, our proposed scheme performs better in terms of performance and security.
| Year | Citations | |
|---|---|---|
Page 1
Page 1