Research Area:  Fog Computing
The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.
Keywords:  
Author(s) Name:  Xiaoying Jia, Debiao He, Neeraj Kumar & Kim-Kwang Raymond Choo
Journal name:  Wireless Networks
Conferrence name:  
Publisher name:  Springer
DOI:  10.1007/s11276-018-1759-3
Volume Information:  volume 25, pages4737–4750 (2019)
Paper Link:   https://link.springer.com/article/10.1007/s11276-018-1759-3