2019
DOI: 10.1109/access.2019.2946713
|View full text |Cite
|
Sign up to set email alerts
|

Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement

Abstract: Fog architectures are currently present in many applications. Constrained devices equipped with sensors produce measurements that will be sent to a nearby gateway, called the fog. The fog verifies, aggregates and forwards them to the server. Group authentication among these devices allows them to securely accept messages of the group members, resulting in faster updates in their process. When defining a security scheme, it should be considered that edge and fog devices are susceptible to attacks. Privacy of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 47 publications
0
15
0
Order By: Relevance
“…Finally, a performance analysis of the communication and computation costs will be presented. The results show that the computation and communication costs is less than existing approaches [10].…”
Section: Introductionmentioning
confidence: 90%
See 3 more Smart Citations
“…Finally, a performance analysis of the communication and computation costs will be presented. The results show that the computation and communication costs is less than existing approaches [10].…”
Section: Introductionmentioning
confidence: 90%
“…Zhu, Hongfeng [26] developed an authenticated key agreement protocol with chaotic maps that can apply to a group of users without involving any central server. Recently, the approaches [10,27,28,29] proposed group key establishment schemes based on elliptic curve cryptography. In [17], the GSK is established using point operation and exclusive-or operation.…”
Section: Group Key Agreement and Establishmentmentioning
confidence: 99%
See 2 more Smart Citations
“…We choose to use Rubin-logic [29] to perform the verification of the protocol. Rubin-logic is a method used to do security protocols analysis by several authentications and key agreement protocols [30]- [33]. This method is based on welldefined specifications and uses Global sets, local sets, secret sets and actions.…”
Section: A Security Analysis 1) Formal Security Analysismentioning
confidence: 99%