Authenticated key agreement scheme for fog-driven IoT healthcare system
- 432 Downloads
The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.
KeywordsFog computing Cloud computing Internet-of-Things (IoT) Healthcare Authenticated key agreement
The work was supported in part by the National Natural Science Foundation of China (Nos. 61501333, 61572379, U1536204) and the National High-Tech Research and Development Program of China (863 Program) (No. 2015AA016004) and in part by the Fundamental Research Funds for the Central Universities under Grant CZY18034.
- 4.Bonomi, F., Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing: A platform for internet of things and analytics. In Big data and internet of things: A roadmap for smart environments (pp. 169–186). Cham: Springer.Google Scholar
- 5.Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012, August). Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing (pp. 13–16). ACM.Google Scholar
- 10.Gia, T. N., Jiang, M., Rahmani, A. M., Westerlund, T., Liljeberg, P., & Tenhunen, H. (2015, October). Fog computing in healthcare internet of things: A case study on ecg feature extraction. In IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) (pp. 356–363). IEEE.Google Scholar
- 24.Sookhak, M., Yu, R., He, Y., Talebian, H., Safa, N. S., Zhao, N., et al. (2017). Fog vehicular computing: Augmentation of fog computing using vehicular cloud computing. IEEE Vehicular Technology Magazine, PP(99), 1–1.Google Scholar
- 25.Stojmenovic, I., & Wen, S. (2014, September). The fog computing paradigm: Scenarios and security issues. In Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on (pp. 1–8). IEEE.Google Scholar
- 31.Yi, S., Qin, Z., & Li, Q. (2015). Security and privacy issues of fog computing: A survey. In International conference on wireless algorithms, systems, and applications (pp. 685–695). Springer.Google Scholar