https://scholars.lib.ntu.edu.tw/handle/123456789/632361
標題: | Provable Secure Group Key Establishment Scheme for Fog Computing | 作者: | Chen W.-C Huang Y.-T SHENG-DE WANG |
關鍵字: | Canetti-Krawczyk adversary model; Elliptic curve cryptography; Fog computing; Mutual authentication | 公開日期: | 2021 | 卷: | 9 | 起(迄)頁: | 158682-158694 | 來源出版物: | IEEE Access | 摘要: | In the fog computing paradigms, fog nodes are closer to terminal devices and can extend services to the edge of the network, thereby reducing the impact of high latency and restricted networks in the Internet of Things (IoTs). Fog computing applications usually organize the terminal devices in groups and require some form of security protection. Previous studies on the establishment of group keys for fog computing architectures have high communication costs and cannot verify the authenticity of each entity. Therefore, in this paper, we propose a mutual authentication group key establishment scheme for the fog computing architecture by using elliptic curve cryptography. After mutual authentication, the cloud server can transfer the computing overhead to the fog node, which will be responsible for authenticating the device group and distributing the established group session key. The group session key consists of the private key of each entity and some random and temporarily stored values. We prove that the established group session key is protected by the Canetti-Krawczyk (CK) adversary model. Finally, we evaluate performance based on calculation and communication costs. Compared with previous studies, the proposed scheme is lightweight and effective because it only involves elliptic curve operations and symmetric cryptographic operations. © 2013 IEEE. |
URI: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85120055047&doi=10.1109%2fACCESS.2021.3130471&partnerID=40&md5=606d619a9f057cdade340f4276bb6eef https://scholars.lib.ntu.edu.tw/handle/123456789/632361 |
ISSN: | 21693536 | DOI: | 10.1109/ACCESS.2021.3130471 | SDG/關鍵字: | Authentication; Computer architecture; Costs; Curve fitting; Fog; Geometry; Network architecture; Public key cryptography; Adversary modeling; Canetti–; Cloud-computing; Edge computing; Elliptic curve; Group key; Key establishment schemes; Krawczyk adversary model; Mutual authentication; Session key; Fog computing |
顯示於: | 電機工程學系 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。