A Secure Authenticated And Key Exchange Scheme For Fog Computing

ENTERPRISE INFORMATION SYSTEMS(2021)

引用 126|浏览61
暂无评分
摘要
Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security challenges of cloud computing is inevitable. Recently, Jia et al. proposed an authenticated key exchange scheme for fog-driven IoT health care systems. Unfortunately, we discovered their scheme is vulnerable to an ephemeral secret leakage attack. In this paper, we propose an authenticated key exchange scheme for fog computing. Compared with previous schemes, our proposed scheme performs better in terms of performance and security.
更多
查看译文
关键词
Fog computing, authenticated key exchange scheme, ephemeral secret leakage attack
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要