ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT Networks

نویسندگان

چکیده

Fog computing is one of the prominent technology that bridges gap between IoT nodes and cloud servers. For increasing efficiency at fog level, a federation can be employed. level controlled by coordinator. However, information exchange coordinator needs to secured. Recently, lightweight secure key (LKSE) protocol for was proposed. In this paper, cryptanalysis LKSE carried out. The indicates vulnerable spoofing man in middle attacks. To overcome limitation LKSE, design an ECC-based devices coordinators security strength designed method has been evaluated using BAN logic random oracle model. Simulations on AVISPA have performed automatic verification proposed method. A detailed functional comparison scheme with also

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IBAKE: Identity-Based Authenticated Key Exchange Protocol

The past decade has witnessed a surge in exploration of cryptographic concepts based on pairings over Elliptic Curves. In particular, identity-based cryptographic protocols have received a lot of attention, motivated mainly by the desire to eliminate the need for large-scale public key infrastructure. We follow this trend in this work, by introducing a new Identity-Based Authenticated Key Excha...

متن کامل

An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks

Mobile ad hoc networks (MANETs) are known to be unprotected due to the nature of message propagation and the openness of public channel. Another important characteristic of MANETs is their being basically energy constrained. While it is known that symmetric key cryptography provides a high degree of secrecy and efficiency, but has a number of significant difficulties for the MANET domain in key...

متن کامل

Password-Based Authenticated Key Exchange

Authenticated Key Exchange protocols enable several parties to establish a shared cryptographically strong key over an insecure network using various authentication means, such as strong cryptographic keys or short (i.e., low-entropy) common secrets. The latter example is definitely the most interesting in practice, since no additional device is required, but just a human-memorable password, fo...

متن کامل

Attribute-Based Authenticated Key Exchange

We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-AKE is presented based on the security models for group key exchange protocols and also taking into account the security requirements generally considered in the ciphertext policy attribute-based setting. We also exten...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2022

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2022/7264803