Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model

Simone Patonico, An Braeken, Kris Steenhaut
2019 Wireless networks  
Fog computing allows to connect the edge of the network, consisting of low cost Internet of Things devices, with high end cloud servers. Fog devices can perform data processing, which can significantly reduce the delay for the application. Moreover, data aggregation can be carried out by fog devices which decrease the bandwidth needed being very important for the wireless part of the communication with the cloud servers. The edge-fog-cloud architecture is currently being rolled out for several
more » ... pplications in the field of connected cars, health care monitoring, etc. In this paper, we propose an identitybased, mutual authenticated key agreement protocol for this fog architecture, in which end device and fog are able to establish a secure communication without leakage of their identities. Only the cloud server is able to control the identities of device and fog. We formally prove that the session keys are also protected in the Canetti-Krawczyk security model, in which adversaries are considered to have access to session state specific information, previous session keys, or long-term private keys. The scheme is very efficient as it only utilises elliptic curve operations and basic symmetric key operations.
doi:10.1007/s11276-019-02084-6 fatcat:nsd2p6l6rbanpmwa7rwgzdwhp4