Skip to main content

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 329))

Abstract

Today, security is a major issue in the cyberworld. The data generated by the devices are more susceptible to threats and attacks than being used. The emergence of cloud computing and IoT changed the whole concept of handling and interacting with data. The framework that we proposed for the security of data, which is being generated by IoT devices is divided into multiple phases. The first starting phase is mutual authentication. This phase guarantees the communicating parties are genuine. The paper presents the novel scheme for mutual authentication between two parties that are IoT device and Fog system. In the paper, we discuss and figure out how the IoT device and the Fog system will interact with each other and authenticate each other.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. L. Lamport, Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    MathSciNet  Google Scholar 

  2. C.J. Mitchell, I. Chen, Comments on the S/KEY user authentication scheme. ACM SIGOPS Oper. Syst. Rev. 30(4), 12–16 (1996)

    Google Scholar 

  3. C.M. Chen, W.C. Ku, Stolen-verifier attack on two new strong-password authentication protocol. IEICE Trans. Commun. E85-B(11), 2519–2521 (2002)

    Google Scholar 

  4. T. Hwang, Y. Chen, C.S. Laih, Non-interactive password authentications without password tables, in Proceedings of IEEE Region 10 Conference on Computer and Communication Systems (1990), pp. 429–431

    Google Scholar 

  5. M.S. Hwang, L.H. Li, A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1), 28–30 (2000)

    Google Scholar 

  6. C.K. Chan, L.M. Cheng, Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46, 992–993 (2000)

    Google Scholar 

  7. J.J. Shen, C.W. Lin, M.S. Hwang, A modified remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 49(2), 414–416 (2003)

    Google Scholar 

  8. H.Y. Chien, J.K. Jan, Y.M. Tseng, An efficient and practical solution to remote authentication: smart card. Comput. Secur. 21(4), 372–375 (2002)

    Google Scholar 

  9. H.M. Sun, an efficient remote user authentication scheme using smart cards. EEE Trans. Consum. Electron. 46(4), 958–961 (2000)

    Google Scholar 

  10. W.C. Ku, S.M. Chen, Weaknesses and improvements of an efficient password-based user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50(1), 204–207 (2004)

    Google Scholar 

  11. C.L. Hsu, Security of Chien et al.’s remote user authentication scheme using smart cards. J. Comput. Stand. Interfaces 26(3), 167–169 (2004)

    Google Scholar 

  12. S. Lee, H. Kim, K. Yoo, improved efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50(2), 565–567 (2004)

    Google Scholar 

  13. E. Yoon, K. Yoo, More efficient and secure remote user authentication scheme using smart cards, in Proceedings of 11th International Conference on Parallel and Distributed System (2005), pp. 73–77

    Google Scholar 

  14. N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card. J. Comput. Stand. Interfaces 27(2), 177–180 (2005)

    Google Scholar 

  15. S.T. Wu, B.C. Chieu, A user friendly remote authentication scheme with smart cards. J. Comput. Secur. 22(6), 547–550 (2003)

    Google Scholar 

  16. J. Xu, W.T. Zhu, D.G. Feng, An improved smart card-based password authentication scheme with provable security. J. Comput. Stand. Interfaces 31(4), 723–728 (2009)

    Google Scholar 

  17. S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.’s remote user authentication scheme using smart cards. J. Comput. Stand. Interfaces 27(2), 181–183 (2005)

    Google Scholar 

  18. R. Song, Advanced smart card-based password authentication protocol. J. Comput. Stand. Interfaces 32(5), 321–325 (2010)

    Google Scholar 

  19. X. Li, F. Wen, S. Cui, A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices. J. Appl. Math. Inf. Sci. 6(2), 217–222 (2012)

    MathSciNet  Google Scholar 

  20. S.K. Kim, M.G. Chung, More secure remote user authentication scheme. J. Comput. Commun. 32(6), 1018–1021 (2009)

    Google Scholar 

  21. H.B. Tang, X.S. Liu, L. Jiang, A robust and efficient timestamp-based remote user authentication scheme with smart card lost attack resistance. Int. J. Netw. Secur. 15(6), 360–368 (2013)

    Google Scholar 

  22. A.K. Awasthi, K. Srivastava, R.C. Mittal, An improved timestamp-based remote user authentication scheme. Comput. Electr. Eng. 37(6), 869–874 (2011)

    Google Scholar 

  23. J. Shen, Y. Du, Improving the password-based authentication against smart card security breach. J. Softw. 8(4), 979–986 (2013)

    Google Scholar 

  24. C.T. Li, C.C. Lee, A robust remote user authentication scheme against smart card security breach, in Proceedings of the 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (2011), pp. 231–238

    Google Scholar 

  25. Q. Jiang, J. Ma, G. Li, L. Yang, Robust two-factor authentication and key agreement preserving user privacy. Int. J. Netw. Secur. 16(4), 321–332 (2014)

    Google Scholar 

  26. L. Li, I. Lin, M. Hwang, A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans. Neural Netw. Learn. Syst. 12(6), 1498–1504 (2001)

    Google Scholar 

  27. I.C. Lin, M.S. Hwang, L.H. Li, A new remote user authentication scheme for multi-server architecture. Futur. Gener. Comput. Syst. 19(1), 13–22 (2003)

    MATH  Google Scholar 

  28. W.S. Juang, Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans. Consum. Electron. 50(1), 251–255 (2004)

    Google Scholar 

  29. W.-C. Ku, H.-M. Chuang, M.-H. Chiang, Cryptanalysis of a multi-server password authenticated key agreement scheme using smart cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E88-A(11), 3235–3238 (2005)

    Google Scholar 

  30. Y.P. Liao, S.S. Wang, A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(1), 24–29 (2009)

    Google Scholar 

  31. H.C. Hsiang, W.-K. Shih, Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(6), 1118–1123 (2009)

    Google Scholar 

  32. S.K. Sood, A.K. Sarje, K. Singh, A secure dynamic identity-based authentication protocol for multi-server architecture. J. Netw. Comput. Appl. 34(2), 609–618 (2011)

    Google Scholar 

  33. V. Odelu, A.K. Das, A. Goswami, A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensics Secur. 10(9), 1953–1966 (2015)

    Google Scholar 

  34. D. He, D. Wang, Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3), 816–823 (2015)

    Google Scholar 

  35. R. Lu, X. Li, X. Liang, X.S. Shen, X. Lin, GRS: the green, reliability, and security of emerging machine to machine communications. IEEE Commun. Mag. 49(4), 28–35 (2011)

    Google Scholar 

  36. M. Kumar, An enhanced remote user authentication scheme with smart card. Int J. Netw. Secur. 10(3), 175–184 (2010)

    Google Scholar 

  37. M. Kumar, A new secure remote user authentication scheme with smart cards. Int. J. Netw. Secur. 11(2), 88–93 (2010)

    Google Scholar 

  38. R. Lu, Z. Cao, Z. Chai, X. Liang, A simple user authentication scheme for grid computing. Int. J. Netw. Secur. 7(2), 202–206 (2008)

    Google Scholar 

  39. J.L. Tsai, Efficient nonce-based authentication scheme for session initiation protocol. Int. J. Netw. Secur. 9(1), 12–16 (2009)

    Google Scholar 

  40. M.H. Ibrahim, Octopus: an edge-fog mutual authentication scheme. IJ Netw. Secur. 18(6), 1089–1101 (2016)

    Google Scholar 

  41. F. Sameer, D. Prashar, Hybrid encryption algorithm in wireless body area networks (WBAN), in Intelligent Communication, Control and Devices (Springer, Singapore, 2018), pp. 401–410

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Farooq, S., Chawla, P. (2022). A Novel Approach of Mutual Authentication in Fog Computing. In: Rawat, S., Kumar, A., Kumar, P., Anguera, J. (eds) Proceedings of First International Conference on Computational Electronics for Wireless Communications. Lecture Notes in Networks and Systems, vol 329. Springer, Singapore. https://doi.org/10.1007/978-981-16-6246-1_48

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-6246-1_48

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-6245-4

  • Online ISBN: 978-981-16-6246-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics