Paper Title :Lightweight Authentication for Mobile Users in the Context of Fog Computing
Author :Wesam Almobaideen, Maha Saadeh
Article Citation :Wesam Almobaideen ,Maha Saadeh ,
(2018 ) " Lightweight Authentication for Mobile Users in the Context of Fog Computing " ,
International Journal of Advance Computational Engineering and Networking (IJACEN) ,
pp. 17-22,
Volume-6, Issue-12
Abstract : In the context of fog computing, users’ authentication is crucial in order to achieve trusted communication
between fog computing components and end users. This paper presents a lightweight authentication protocol based on digital
signatures. It consists of five phases; two setup phases, extract phase, signing phase, and verification phase. The signer user
issues a digital signature using a signing key which is generated based on its identity. A mathematical proof for the
verification process is presented. Moreover, a comparison with other related protocols according to the key generation
method, key distribution method, and the security attacks model is discussed. The performance of the proposed protocol is
evaluated based on the number and time of computation operations. The evaluation shows that the proposed protocol has a
lower computation cost than its rivals. This makes it more efficient and suitable in supporting constrained devices of mobile
users.
Keywords - Fog Computing, Hierarchical Architecture, Lightweight Authentication, Identity Based Signature, User
Mobility.
Type : Research paper
Published : Volume-6, Issue-12
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-14436
View Here
Copyright: © Institute of Research and Journals
|
|
| |
|
PDF |
| |
Viewed - 61 |
| |
Published on 2019-02-21 |
|