Abstract
Today, security is a major issue in the cyberworld. The data generated by the devices are more susceptible to threats and attacks than being used. The emergence of cloud computing and IoT changed the whole concept of handling and interacting with data. The framework that we proposed for the security of data, which is being generated by IoT devices is divided into multiple phases. The first starting phase is mutual authentication. This phase guarantees the communicating parties are genuine. The paper presents the novel scheme for mutual authentication between two parties that are IoT device and Fog system. In the paper, we discuss and figure out how the IoT device and the Fog system will interact with each other and authenticate each other.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
L. Lamport, Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)
C.J. Mitchell, I. Chen, Comments on the S/KEY user authentication scheme. ACM SIGOPS Oper. Syst. Rev. 30(4), 12–16 (1996)
C.M. Chen, W.C. Ku, Stolen-verifier attack on two new strong-password authentication protocol. IEICE Trans. Commun. E85-B(11), 2519–2521 (2002)
T. Hwang, Y. Chen, C.S. Laih, Non-interactive password authentications without password tables, in Proceedings of IEEE Region 10 Conference on Computer and Communication Systems (1990), pp. 429–431
M.S. Hwang, L.H. Li, A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1), 28–30 (2000)
C.K. Chan, L.M. Cheng, Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46, 992–993 (2000)
J.J. Shen, C.W. Lin, M.S. Hwang, A modified remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 49(2), 414–416 (2003)
H.Y. Chien, J.K. Jan, Y.M. Tseng, An efficient and practical solution to remote authentication: smart card. Comput. Secur. 21(4), 372–375 (2002)
H.M. Sun, an efficient remote user authentication scheme using smart cards. EEE Trans. Consum. Electron. 46(4), 958–961 (2000)
W.C. Ku, S.M. Chen, Weaknesses and improvements of an efficient password-based user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50(1), 204–207 (2004)
C.L. Hsu, Security of Chien et al.’s remote user authentication scheme using smart cards. J. Comput. Stand. Interfaces 26(3), 167–169 (2004)
S. Lee, H. Kim, K. Yoo, improved efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50(2), 565–567 (2004)
E. Yoon, K. Yoo, More efficient and secure remote user authentication scheme using smart cards, in Proceedings of 11th International Conference on Parallel and Distributed System (2005), pp. 73–77
N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card. J. Comput. Stand. Interfaces 27(2), 177–180 (2005)
S.T. Wu, B.C. Chieu, A user friendly remote authentication scheme with smart cards. J. Comput. Secur. 22(6), 547–550 (2003)
J. Xu, W.T. Zhu, D.G. Feng, An improved smart card-based password authentication scheme with provable security. J. Comput. Stand. Interfaces 31(4), 723–728 (2009)
S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.’s remote user authentication scheme using smart cards. J. Comput. Stand. Interfaces 27(2), 181–183 (2005)
R. Song, Advanced smart card-based password authentication protocol. J. Comput. Stand. Interfaces 32(5), 321–325 (2010)
X. Li, F. Wen, S. Cui, A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices. J. Appl. Math. Inf. Sci. 6(2), 217–222 (2012)
S.K. Kim, M.G. Chung, More secure remote user authentication scheme. J. Comput. Commun. 32(6), 1018–1021 (2009)
H.B. Tang, X.S. Liu, L. Jiang, A robust and efficient timestamp-based remote user authentication scheme with smart card lost attack resistance. Int. J. Netw. Secur. 15(6), 360–368 (2013)
A.K. Awasthi, K. Srivastava, R.C. Mittal, An improved timestamp-based remote user authentication scheme. Comput. Electr. Eng. 37(6), 869–874 (2011)
J. Shen, Y. Du, Improving the password-based authentication against smart card security breach. J. Softw. 8(4), 979–986 (2013)
C.T. Li, C.C. Lee, A robust remote user authentication scheme against smart card security breach, in Proceedings of the 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (2011), pp. 231–238
Q. Jiang, J. Ma, G. Li, L. Yang, Robust two-factor authentication and key agreement preserving user privacy. Int. J. Netw. Secur. 16(4), 321–332 (2014)
L. Li, I. Lin, M. Hwang, A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans. Neural Netw. Learn. Syst. 12(6), 1498–1504 (2001)
I.C. Lin, M.S. Hwang, L.H. Li, A new remote user authentication scheme for multi-server architecture. Futur. Gener. Comput. Syst. 19(1), 13–22 (2003)
W.S. Juang, Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans. Consum. Electron. 50(1), 251–255 (2004)
W.-C. Ku, H.-M. Chuang, M.-H. Chiang, Cryptanalysis of a multi-server password authenticated key agreement scheme using smart cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E88-A(11), 3235–3238 (2005)
Y.P. Liao, S.S. Wang, A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(1), 24–29 (2009)
H.C. Hsiang, W.-K. Shih, Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(6), 1118–1123 (2009)
S.K. Sood, A.K. Sarje, K. Singh, A secure dynamic identity-based authentication protocol for multi-server architecture. J. Netw. Comput. Appl. 34(2), 609–618 (2011)
V. Odelu, A.K. Das, A. Goswami, A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensics Secur. 10(9), 1953–1966 (2015)
D. He, D. Wang, Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3), 816–823 (2015)
R. Lu, X. Li, X. Liang, X.S. Shen, X. Lin, GRS: the green, reliability, and security of emerging machine to machine communications. IEEE Commun. Mag. 49(4), 28–35 (2011)
M. Kumar, An enhanced remote user authentication scheme with smart card. Int J. Netw. Secur. 10(3), 175–184 (2010)
M. Kumar, A new secure remote user authentication scheme with smart cards. Int. J. Netw. Secur. 11(2), 88–93 (2010)
R. Lu, Z. Cao, Z. Chai, X. Liang, A simple user authentication scheme for grid computing. Int. J. Netw. Secur. 7(2), 202–206 (2008)
J.L. Tsai, Efficient nonce-based authentication scheme for session initiation protocol. Int. J. Netw. Secur. 9(1), 12–16 (2009)
M.H. Ibrahim, Octopus: an edge-fog mutual authentication scheme. IJ Netw. Secur. 18(6), 1089–1101 (2016)
F. Sameer, D. Prashar, Hybrid encryption algorithm in wireless body area networks (WBAN), in Intelligent Communication, Control and Devices (Springer, Singapore, 2018), pp. 401–410
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Farooq, S., Chawla, P. (2022). A Novel Approach of Mutual Authentication in Fog Computing. In: Rawat, S., Kumar, A., Kumar, P., Anguera, J. (eds) Proceedings of First International Conference on Computational Electronics for Wireless Communications. Lecture Notes in Networks and Systems, vol 329. Springer, Singapore. https://doi.org/10.1007/978-981-16-6246-1_48
Download citation
DOI: https://doi.org/10.1007/978-981-16-6246-1_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-6245-4
Online ISBN: 978-981-16-6246-1
eBook Packages: EngineeringEngineering (R0)