2023
DOI: 10.1109/access.2023.3275017
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment

Abstract: The application of the Internet of Things has been greatly expanded; meanwhile, real-time and efficient communication has become an important feature of the Internet of Things. However, the centralized characteristics of cloud computing cannot meet the needs of low latency and high computing efficiency. To solve these issues, we utilized fog computing which is a new distributed computing paradigm that extends cloud services to the edge of the network, with mobility and low latency. Nevertheless, fog computing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…However, they faces several problems such as the handling of enormous IoT devices, privacy leakage, malicious attacks, and failure in single point centralized operation. Specifically, the IoT has inherent problems for scalability and capacity, especially in healthcare [2,3]. In a real-time scenario, IoT devices create a huge amount of healthcare data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, they faces several problems such as the handling of enormous IoT devices, privacy leakage, malicious attacks, and failure in single point centralized operation. Specifically, the IoT has inherent problems for scalability and capacity, especially in healthcare [2,3]. In a real-time scenario, IoT devices create a huge amount of healthcare data.…”
Section: Introductionmentioning
confidence: 99%
“…16, x FOR PEER REVIEW where ๐‘ = {0,1, โ€ฆ . , ๐‘ โˆ’ 1} , ๐‘ is represented as a prime number, and ๐‘Ž โˆง ๐‘ โˆˆ ๐‘ satisfy the criteria presented in Equation(2).4๐‘Ž + 27๐‘ โ‰  0 ๐‘š๐‘œ๐‘‘๐‘where the point at infinity is represented asฮŒ and it acts as an identity element The inverse of a point ๐‘ƒ = ๐‘ฅ, ๐‘ฆ โˆˆ ๐ธ ๐‘, ๐‘Ž, ๐‘ is specified in Equation(3).โˆ’๐‘ƒ = ฮŒ ๐‘ƒ=ฮŒ ๐‘ฅ, ๐‘ โˆ’ ๐‘ฆ ๐‘œ๐‘กโ„Ž๐‘’๐‘Ÿ๐‘ค๐‘–๐‘ ๐‘’In every pair of points ๐‘ƒ, ๐‘„ โˆˆ ๐ธ ๐‘, ๐‘Ž, ๐‘ , the sum point ๐‘… = ๐‘ƒ + ๐‘„ is determined inverse of 3rd intersection line ๐‘ƒ๐‘„ ยด with curve ๐ธ . If ๐‘ƒ = โˆ’๐‘„ , the additional resu determined ฮŒ, as shown in Equation (4).…”
mentioning
confidence: 99%