2022
DOI: 10.1002/cpe.7172
|View full text |Cite
|
Sign up to set email alerts
|

A secure lightweight anonymous elliptic curve cryptography‐based authentication and key agreement scheme for fog assisted‐Internet of Things enabled networks

Abstract: Summary The fog assisted‐Internet of Things (IoT) enabled network has been a novel topic in recent years. With the rapid development of the IoT, it is imperative to accomplish security in the fog computing environment. The surface for cryptographic attacks is expanded since the fog node can analyze, store, and process data between cloud and IoT device. This article proposes elliptic curve cryptography (ECC) based mutual authentication and key agreement scheme to support secure communication between device and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…The payload of an encrypted message is proportional to the size of the encryption key. For instance, the payload size and required encryption key size for ECC NIST P-256 and ECC NIST P-384 are both 256 and 384 bits, respectively [173]. Regrettably, ECC necessitates more computing power and memory than alternative public key techniques.…”
Section: Elliptical Curve Cryptography (Ecc)mentioning
confidence: 99%
“…The payload of an encrypted message is proportional to the size of the encryption key. For instance, the payload size and required encryption key size for ECC NIST P-256 and ECC NIST P-384 are both 256 and 384 bits, respectively [173]. Regrettably, ECC necessitates more computing power and memory than alternative public key techniques.…”
Section: Elliptical Curve Cryptography (Ecc)mentioning
confidence: 99%
“…The simulation results of the proposed scheme are discussed in this section. To evaluate the level of safety of various cryptographic protocols and establish the degree to which they are safe, AVISPA software is used as a simulator 35 . OFMC and CL‐AtSe add an intruder into the middle of the conversation who can retain the communications and resend them.…”
Section: Formal Security Verification Using Avispamentioning
confidence: 99%
“…Moreover, Verma and Bhardwaj [31] have planned a mutual authentication and key agreement technique, based on ECC, to facilitate safe D2D communication and Fog servers. ECC is short for elliptic curve cryptography.…”
Section: Literature Reviewmentioning
confidence: 99%