标题:A secure authenticated and key exchange scheme for fog computing
作者:Chen C.-M.; Huang Y.; Wang K.-H.; Kumari S.; Wu M.-E.
作者机构:[Chen, C.-M] College of Computer Science and Engineering, Shandong University of Science and Technology, Shandong, China;[ Huang, Y] School of Compute 更多
通讯作者:Wu, ME(mnasia1@gmail.com)
通讯作者地址:[Wu, M.-E] Department of Information and Finance Management, National Taipei University of TechnologyTaiwan;
来源:Enterprise Information Systems
出版年:2020
DOI:10.1080/17517575.2020.1712746
关键词:authenticated key exchange scheme; ephemeral secret leakage attack; Fog computing
摘要:Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security challenges of cloud computing is inevitable. Recently, Jia et al. proposed an authenticated key exchange scheme for fog-driven IoT health care systems. Unfortunately, we discovered their scheme is vulnerable to an ephemeral secret leakage attack. In this paper, we propose an authenticated key exchange scheme for fog computing. Compared with previous schemes, our proposed scheme performs better in terms of performance and security. © 2020, © 2020 Informa UK Limited, trading as Taylor & Francis Group.
收录类别:SCOPUS
资源类型:期刊论文
原文链接:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85077897547&doi=10.1080%2f17517575.2020.1712746&partnerID=40&md5=d2f7affcd628cb6939d65793f49393bf
TOP