Research Area:  Internet of Things
Fog computing as an extension to the cloud computing infrastructure has been invaluable in enhancing the applicability of the Internet of Things (IoT) paradigm. IoT based Fog systems magnify the range and minimize the latency of IoT applications. However, as fog nodes are considered transient and they offer authenticated services, when an IoT end device loses connectivity with a fog node, it must authenticate freshly with a secondary fog node. In this work, we present a new security mechanism to leverage the initial authentication to perform fast lightweight secondary authentication to ensure smooth failover among fog nodes. The proposed scheme is secure in the presence of a current de-facto Canetti and Krawczyk (CK)-adversary. We demonstrate the security of the proposed scheme with a detailed security analysis using formal security under the broadly recognized Real-Or-Random (ROR) model, informal security analysis as well as through formal security verification using the broadly-used Automated Validation of Internet Security Protocols and Applications (AVISPA) software tool. A testbed experiment for measuring computational time for different cryptographic primitives using the Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) has been done. Finally, through comparative analysis with other related schemes, we show how the presented approach is uniquely advantageous over other schemes.
Keywords:  
Author(s) Name:  Soumya Banerjee ,Ashok Kumar Das ,Samiran Chattopadhyay ,Sajjad Shaukat Jamal ,Joel J. P. C. Rodrigues and Youngho Park
Journal name:   Electronics
Conferrence name:  
Publisher name:  MDPI
DOI:   10.3390/electronics10121417
Volume Information:  Volume 10 Issue 12
Paper Link:   https://www.mdpi.com/2079-9292/10/12/1417