2021
DOI: 10.1016/j.jisa.2020.102689
|View full text |Cite
|
Sign up to set email alerts
|

Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 62 publications
0
9
0
Order By: Relevance
“…It can be a single‐centric network to address the key benefits of sensor‐based cloud architecture such as virtual sensing, caching, and pricing. Moreover, it has three different entities such as end‐user, sensing units, and cloud service providers to enable sensor virtualization through mobility‐as‐a‐service (MaaS) 68 . In the sensor‐based cloud, the pricing mechanism applies a pay‐per‐use model to rent the application services.…”
Section: Research Methodologiesmentioning
confidence: 99%
See 1 more Smart Citation
“…It can be a single‐centric network to address the key benefits of sensor‐based cloud architecture such as virtual sensing, caching, and pricing. Moreover, it has three different entities such as end‐user, sensing units, and cloud service providers to enable sensor virtualization through mobility‐as‐a‐service (MaaS) 68 . In the sensor‐based cloud, the pricing mechanism applies a pay‐per‐use model to rent the application services.…”
Section: Research Methodologiesmentioning
confidence: 99%
“…Moreover, it has three different entities such as end-user, sensing units, and cloud service providers to enable sensor virtualization through mobility-as-a-service (MaaS). 68 In the sensor-based cloud, the pricing mechanism applies a pay-per-use model to rent the application services. In other words, the device owners earn the service benefits upon the usage of the sensing units.…”
Section: Mobile Sensor Networkmentioning
confidence: 99%
“…In 2013, harn [13] proposed an idea of group authentication whose complexity (O(n)) is very much less than general approach of authentication (O(n 2 )) [14]. Recently, [27], [28] and [29] have used group-based authentication in fog computing, drones network and Intelligent transportation system (ITS) respectively. In [16], Chien et al demonstrates the flaws in Harn's asynchronous methods and propose a new scheme to overcome the issues such as spoofing attack and make it more efficient.…”
Section: Related Workmentioning
confidence: 99%
“…A secure channel is needed for the exchange of tokens among the nodes as in [27], [28] and [29]which makes these schemes uneconomical with latency. In our work, we have proposed a novel group-based authentication scheme that eliminates secure channels' dependency.…”
Section: Proposed Schemementioning
confidence: 99%
“…Secure group communication and membership authentication is needed for hours. Recently, [26]- [28] have used group-based authentication in fog computing, drones network and Intelligent transportation system (ITS), respectively. Studies on group authentication are mostly based on secret sharing schemes.…”
Section: Related Workmentioning
confidence: 99%