Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Unboxing fog security: a review of fog security and authentication mechanisms

Published: 15 August 2023 Publication History

Abstract

Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a strong need to bring connectivity to a very accessible level. To enable the execution of real-time applications at the device end or network edge for connected devices, fog computing was introduced. Due to the resource constraint nature and geographical distribution of fog devices, security and privacy concerns may arise. With an increased number of smart devices, authentication is turning to be more and more vital to enable secure communication for fog-based applications. Hence, it is mandatory to use a strong authentication mechanism for each device or application installed in the fog network system. Our survey paper focuses on a complete understanding of fog computing in terms of its architecture, features, and security. We have done a rigorous study on existing authentication mechanisms with their working principles, performance, and limitations. Also, we provided a taxonomy of security issues in fog computing for a better understanding of all security concerns that would help the researchers to work in the right direction in this domain. To design an effective authentication system for fog security, we provided future research directions and open challenges.

References

[1]
Aazam M, Huh EN (2015) Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT. In: 2015 IEEE 29th international conference on advanced information networking and applications (pp 687-694). IEEE
[2]
Abbas N, Asim M, Tariq N, Baker T, and Abbas S A mechanism for securing IoT-enabled applications at the fog layer J Sens Actuator Netw 2019 8 1 16
[3]
Abraham WK, Saravanan S, Smith K (2019) Security and privacy challenges in fog computing. In: International conference on fog computing
[4]
Adel A Utilizing technologies of fog computing in educational IoT systems: privacy, security, and agility perspective J Big Data 2020 7 1 1-29
[5]
Akello P, Beebe NL, Choo KKR (2022) A literature survey of security issues in cloud, fog, and edge IT infrastructure. Electron Comm Res 1-35
[6]
Albakri A, Maddumala M, Harn L (2018) Hierarchical polynomial-based key management scheme in fog computing. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE) (pp 1593-1597). IEEE
[7]
Alharbi S, Rodriguez P, Maharaja R, Iyer P, Subaschandrabose N, Ye Z (2017) Secure the internet of things with challenge response authentication in fog computing. In: 2017 IEEE 36th international performance computing and communications conference (IPCCC) (pp 1-2). IEEE
[8]
Ali Z, Chaudhry SA, Mahmood K, Garg S, Lv Z, and Zikria YB A clogging resistant secure authentication scheme for fog computing services Comput Netw 2021 185 107731
[9]
Almadhoun R, Kadadha M, Alhemeiri M, Alshehhi M, Salah K (2018) A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In: 2018 IEEE/ACS 15th international conference on computer systems and applications (AICCSA) (pp 1-8). IEEE
[10]
Alrawais A, Alhothaily A, Hu C, and Cheng X Fog computing for the internet of things: security and privacy issues IEEE Internet Comput 2017 21 2 34-42
[11]
Alrawais A, Alhothaily A, Hu C, and Cheng X Fog computing for the internet of things: security and privacy issues IEEE Internet Comput 2017 21 2 34-42
[12]
Alzoubi YI, Osmanaj VH, Jaradat A, and Al-Ahmad A Fog computing security and privacy for the Internet of Thing applications: state-of-the-art Secur Priv 2021 4 2 e145
[13]
Amanlou S, Hasan MK, and Bakar KAA Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model Comput Netw 2021 199 108465
[14]
Arivazhagan C, Natarajan V (2020) A survey on fog computing paradigms, challenges and opportunities in IoT. In: 2020 international conference on communication and signal processing (ICCSP) (pp 0385-0389). IEEE
[15]
Arun M, Balamurali S, Rawal BS, Duan Q, Kumar RL, Balamurugan B (2020) Mutual authentication and authorized data access between fog and user based on blockchain technology. In: IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp 37-42). IEEE
[16]
Atlam HF, Walters RJ, and Wills GB Fog computing and the internet of things: a review Big Data Cognit Comput 2018 2 2 10
[17]
Baccarelli E, Naranjo PGV, Scarpiniti M, Shojafar M, and Abawajy JH Fog of everything: energy-efficient networked computing architectures, research challenges, and a case study IEEE Access 2017 5 9882-9910
[18]
Bavishi J, Shaikh MS, Patel R (2020) Scalable and efficient mutual authentication strategy in fog computing. In: 2020 8th IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud) (pp 77-83). IEEE
[19]
Bellavista P, Berrocal J, Corradi A, Das SK, Foschini L, and Zanni A A survey on fog computing for the Internet of Things Pervasive Mob Comput 2019 52 71-99
[20]
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing (pp 13-16)
[21]
Brogi A and Forti S QoS-aware deployment of IoT applications through the fog IEEE Internet Things J 2017 4 5 1185-1192
[22]
Chakraborty A, Kumar M, Chaurasia N, and Gill SS Journey from cloud of things to fog of things: survey, new trends, and research directions Softw Pract Exp 2023 53 2 496-551
[23]
Chatterjee U, Ray S, Khan MK, Dasgupta M, and Chen CM An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing Computing 2022 104 6 1359-1395
[24]
Chaudhry SA, Albeshri A, Xiong N, Lee C, and Shon T A privacy preserving authentication scheme for roaming in ubiquitous networks Clust Comput 2017 20 2 1223-1236
[25]
Chen CM, Huang Y, Wang KH, Kumari S, Wu ME (2020) A secure authenticated and key exchange scheme for fog computing. Enterprise Inf Syst 1-16
[26]
Choo KKR, Gai K, Chiaraviglio L, Yang Q (2020) A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management
[27]
Din IU, Ahmad B, Almogren A, Almajed H, Mohiuddin I, and Rodrigues JJ Left-right-front caching strategy for vehicular networks in ICN-based Internet of Things IEEE Access 2020 9 595-605
[28]
Dolui K, Datta SK (2017) Comparison of edge computing implementations: fog computing, cloudlet and mobile edge computing. In: 2017 global Internet of Things summit (GIoTS) (pp 1-6). IEEE
[29]
Dong MT and Xu H Group key management scheme for multicast communication fog computing networks Processes 2020 8 10 1300
[30]
Ekanayake BN, Halgamuge MN, Syed A (2018) Security and privacy issues of fog computing for the internet of things (IoT). In: Cognitive computing for big data systems over IoT, 139-174
[31]
Elkhodr M, Shahrestani S, Cheung H (2016) The internet of things: new interoperability, management and security challenges. arXiv preprint arXiv:1604.04824
[32]
Forti S, Ibrahim A, and Brogi A Mimicking FogDirector application management SICS Softw Intens Cyber Phys Syst 2019 34 151-161
[33]
Forti S, Pagiaro A, and Brogi A Simulating fogdirector application management Simul Model Pract Theory 2020 101 102021
[34]
Garg T, Kagalwalla N, Churi P, Pawar A, and Deshmukh S A survey on security and privacy issues in IoV Int J Electr Comput Eng 2020 10 5 2088-8708
[35]
Giang NK, Blackstock M, Lea R, Leung VC (2015) Developing IoT applications in the fog: a distributed dataflow approach. In: 2015 5th international conference on the Internet of Things (IOT) (pp 155-162). IEEE
[36]
Gope P LAAP: lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm Comput Secur 2019 86 223-237
[37]
Gowda NC, Manvi SS, Malakreddy B, Lorenz P (2023) BSKM-FC: blockchain-based secured key management in a fog computing environment. Future Gener Comput Syst
[38]
Gowda NC, Manvi SS (2021) An efficient authentication scheme for fog computing environment using symmetric cryptographic methods. In: 2021 IEEE 9th region 10 humanitarian technology conference (R10-HTC), 2021, pp 01-06,
[39]
Group OCAW, et al. (2016) OpenFog architecture overview. White Paper, pp. 1-35
[40]
Guan Y, Shao J, Wei G, and Xie M Data security and privacy in fog computing IEEE Network 2018 32 5 106-111
[41]
Guo Y, Guo Y (2021) FogHA: an efficient handover authentication for mobile devices in fog computing. Comput Secur 102358
[42]
Guo Y, Zhang Z, Guo Y (2020) Fog-centric authenticated key agreement scheme without trusted parties. IEEE Syst J
[43]
Gupta H, Vahid Dastjerdi A, Ghosh SK, and Buyya R iFogSim: a toolkit for modeling and simulation of resource management techniques in the Internet of Things, edge and fog computing environments Softw Pract Exp 2017 47 9 1275-1296
[44]
Hafeez M and Sumra IA Fog computing security and privacy issues: a survey Eng Sci Technol Int Res J 2019 3 4 80-86
[45]
Han M, Liu S, Ma S, and Wan A Anonymous-authentication scheme based on fog computing for VANET PLoS ONE 2020 15 2 e0228319
[46]
Hassen HB, Ayari N, and Hamdi B A home hospitalization system based on the Internet of things, fog computing and cloud computing Inf Med Unlock 2020 20 100368
[47]
Hassen HB, Ayari N, and Hamdi B A home hospitalization system based on the Internet of things, fog computing and cloud computing Inf Med Unlock 2020 20 100368
[48]
Heydari M, Mylonas A, Katos V, Balaguer-Ballester E, Tafreshi VHF, Benkhelifa E (2019) Uncertainty-aware authentication model for fog computing in IoT. In: 2019 fourth international conference on fog and mobile edge computing (FMEC) (pp 52-59). IEEE
[49]
Hosseinpour F, Plosila J, Tenhunen H (2016) An approach for smart management of big data in the fog computing context. In: 2016 IEEE international conference on cloud computing technology and science (CloudCom) (pp 468-471). IEEE
[50]
Hu P, Dhelim S, Ning H, and Qiu T Survey on fog computing: architecture, key technologies, applications and open issues J Netw Comput Appl 2017 98 27-42
[51]
Hu P, Dhelim S, Ning H, and Qiu T Survey on fog computing: architecture, key technologies, applications and open issues J Netw Comput Appl 2017 98 27-42
[52]
Hu P, Dhelim S, Ning H, and Qiu T Survey on fog computing: architecture, key technologies, applications and open issues J Netw Comput Appl 2017 98 27-42
[53]
Huang B, Cheng X, Cao Y, Zhang L (2018) Lightweight hardware based secure authentication scheme for fog computing. In: 2018 IEEE/ACM symposium on edge computing (SEC) (pp 433-439). IEEE
[54]
Ibrahim MH Octopus: an edge-fog mutual authentication scheme Int J Netw Secur 2016 18 6 1089-1101
[55]
Ijaz M, Li G, Lin L, Cheikhrouhou O, Hamam H, and Noor A Integration and applications of fog computing and cloud computing based on the Internet of Things for provision of healthcare services at home Electronics 2021 10 9 1077
[56]
Imine Y, Kouicem DE, Bouabdallah A, Ahmed L (2018) MASFOG: an efficient mutual authentication scheme for fog computing architecture. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE) (pp 608-613). IEEE
[57]
Intharawijitr K, Iida K, Koga H (2016) Analysis of fog model considering computing and communication latency in 5G cellular networks. In: 2016 IEEE international conference on pervasive computing and communication workshops (PerCom workshops) (pp 1-4). IEEE
[58]
Jia X, He D, Kumar N, and Choo KKR Authenticated key agreement scheme for fog-driven IoT healthcare system Wireless Netw 2019 25 8 4737-4750
[59]
Kalaria R, Kayes ASM, Rahayu W, and Pardede E A secure mutual authentication approach to fog computing environment Comput Secur 2021 111 102483
[60]
Katal A, Sethi V (2023) Communication protocols in fog computing: a survey and challenges. In: Fog computing (pp 153-170). Chapman and Hall/CRC
[61]
Kaur J, Agrawal A, and Khan RA Security issues in fog environment: a systematic literature review Int J Wirel Inf Netw 2020 27 467-483
[62]
Kaur K, Garg S, Kaddoum G, Gagnon F, Ahmed SH (2019) Blockchain-based lightweight authentication mechanism for vehicular fog infrastructure. In: 2019 IEEE international conference on communications workshops (ICC workshops) (pp 1-6). IEEE
[63]
Khalid T, Abbasi MAK, Zuraiz M, Khan AN, Ali M, Ahmad RW, and Aslam M A survey on privacy and access control schemes in fog computing Int J Commun Syst 2021 34 2 e4181
[64]
Khalid M, Mujahid U, Muhammad NUI (2019) Ultralightweight RFID authentication protocols for low-cost passive RFID tags. Secur Commun Netw
[65]
Khan S, Parkinson S, and Qin Y Fog computing security: a review of current applications and security solutions J Cloud Comput 2017 6 1 1-22
[66]
Kumar P, Zaidi N, Choudhury T (2016, November) Fog computing: common security issues and proposed countermeasures. In: 2016 international conference system modeling & advancement in research trends (SMART) (pp 311-315). IEEE
[67]
Lee TF and Chen WY Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things J Inf Secur Appl 2021 59 102817
[68]
Lee K, Kim D, Ha D, Rajput U, Oh H (2015) On security and privacy issues of fog computing supported Internet of Things environment. In: 2015 6th international conference on the network of the future (NOF) (pp 1-3). IEEE
[69]
Lera I, Guerrero C, and Juiz C YAFS: a simulator for IoT scenarios in fog computing IEEE Access 2019 7 91745-91758
[70]
Li Z, Liu Y, Liu D, Li C, Cui W, and Hu G A key management scheme based on hypergraph for fog computing China Commun 2018 15 11 158-170
[71]
Linthicum DS Connecting fog and cloud computing IEEE Cloud Comput 2017 4 2 18-20
[72]
Liu X, Fan L, Xu J, Li X, Gong L, Grundy J, Yang Y (2019) FogWorkflowSim: an automated simulation toolkit for workflow performance evaluation in fog computing. In: 2019 34th IEEE/ACM international conference on automated software engineering (ASE) (pp 1114-1117). IEEE
[73]
Lopes MM, Higashino WA, Capretz MA, Bittencourt LF (2017) Myifogsim: a simulator for virtual machine migration in fog computing. In: Companion proceedings of the 10th international conference on utility and cloud computing (pp 47-52)
[74]
Machado JDS, Moreno ED, and Ribeiro ADRL A survey on fog computing and its research challenges Int J Grid Util Comput 2020 11 4 486-495
[75]
Manzoor A, Shah MA, Khattak HA, Din IU, Khan MK (2019) Multi-tier authentication schemes for fog computing: architecture, security perspective, and challenges. Int J Commun Syst e4033
[76]
Margariti SV, Dimakopoulos VV, and Tsoumanis G Modeling and simulation tools for fog computing-a comprehensive survey from a cost perspective Future Internet 2020 12 5 89
[77]
Mohan N, Kangasharju J (2016) Edge-Fog cloud: a distributed cloud for Internet of Things computations. In: 2016 cloudification of the Internet of Things (CIoT) (pp 1-6). IEEE
[78]
Mookherji S, Odelu V, Prasath R, Das AK, Park Y (2023) Fog-based single sign-on authentication protocol for electronic healthcare applications. IEEE Internet Things J
[79]
Mostafavi S and Shafik W Fog computing architectures, privacy and security solutions J Commun Technol Electron Comput Sci 2019 24 1-14
[80]
Mounnan O, El Mouatasim A, Manad O, Hidar T, Abou El Kalam A, Idboufker N (2020) Privacy-aware and authentication based on blockchain with fault tolerance for IoT enabled fog computing. In: 2020 fifth international conference on fog and mobile edge computing (FMEC) (pp 347-352). IEEE
[81]
Mouradian C, Naboulsi D, Yangui S, Glitho RH, Morrow MJ, and Polakos PA A comprehensive survey on fog computing: state-of-the-art and research challenges IEEE Commun Surv Tutor 2017 20 1 416-464
[82]
Moura J, Hutchison D (2020) Fog computing systems: state of the art, research issues and future trends, with a focus on resilience. J Netw Comput Appl 102784
[83]
Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, and Kumar V Security and privacy in fog computing: challenges IEEE Access 2017 5 19293-19304
[84]
Mukherjee M, Shu L, and Wang D Survey of fog computing: fundamental, network applications, and research challenges IEEE Commun Surv Tutor 2018 20 3 1826-1857
[85]
Munir A, Kansakar P, and Khan SU IFCIoT: integrated fog cloud IoT: a novel architectural paradigm for the future Internet of Things IEEE Consum Electron Mag 2017 6 3 74-82
[86]
Mutlag AA, Khanapi Abd Ghani M, Mohammed MA, Maashi MS, Mohd O, Mostafa SA, and de la Torre Díez I MAFC: multi-agent fog computing model for healthcare critical tasks management Sensors 2020 20 7 1853
[87]
Naha RK, Garg S, Chan A (2018) Fog computing architecture: survey and challenges. arXiv preprint arXiv:1811.09047
[88]
Nath SB, Gupta H, Chakraborty S, Ghosh SK (2018) A survey of fog computing and communication: current researches and future directions. arXiv preprint arXiv:1804.04365
[89]
Ni J, Zhang K, Lin X, and Shen X Securing fog computing for internet of things applications: challenges and solutions IEEE Commun Surv Tutor 2017 20 1 601-628
[90]
Pallavi KN and Kumar VR Authentication-based access control and data exchanging mechanism of IoT devices in fog computing environment Wirel Pers Commun 2021 116 4 3039-3060
[91]
Patwary AAN, Fu A, Naha RK, Battula SK, Garg S, Patwary MAK, Aghasian E (2020) Authentication, access control, privacy, threats and trust management towards securing fog computing environments: a review. arXiv preprint arXiv:2003.00395
[92]
Patwary AAN, Fu A, Battula SK, Naha RK, Garg S, and Mahanti A FogAuthChain: a secure location-based authentication scheme in fog computing environments using Blockchain Comput Commun 2020 162 212-224
[93]
Patwary AAN, Naha RK, Garg S, Battula SK, Patwary MAK, Aghasian E, and Gong M Towards secure fog computing: a survey on trust management, privacy, authentication, threats and access control Electronics 2021 10 10 1171
[94]
Petac E and Petac AO About security solutions in fog computing Ovidius Univ Ann Econ Sci Ser 2016 16 1 380-385
[95]
Pokorni SJ Reliability and availability of the Internet of Things Vojnotehnički glasnik 2019 67 3 588-600
[96]
Puliafito C, Mingozzi E, Longo F, Puliafito A, and Rana O Fog computing for the internet of things: a survey ACM Trans Internet Technol (TOIT) 2019 19 2 1-41
[97]
Puliafito C, Gonçalves DM, Lopes MM, Martins LL, Madeira E, Mingozzi E, and Bittencourt LF MobFogSim: simulation of mobility and migration for fog computing Simul Model Pract Theory 2020 101 102062
[98]
Puthal D, Mohanty SP, Bhavake SA, Morgan G, and Ranjan R Fog computing security challenges and future directions bibenergy and security IEEE Consum Electron Mag 2019 8 3 92-96
[99]
Qayyum T, Malik AW, Khattak MAK, Khalid O, and Khan SU FogNetSim++: a toolkit for modeling and simulation of distributed fog environment IEEE Access 2018 6 63570-63583
[100]
Rahman G and Wen CC Fog computing, applications, security and challenges, review Int J Eng Technol 2018 7 3 1615-1621
[101]
Rahman G and Wen CC Fog computing, applications, security and challenges, review Int J Eng Technol 2018 7 3 1615-1621
[102]
Rahman G and Wen CC Fog computing, applications, security and challenges, review Int J Eng Technol 2018 7 3 1615-1621
[103]
Rahmani AM, Mohammadi M, Rashidi S, Lansky J, Mildeova S, Safkhani M, and Hosseinzadeh M Questioning the security of three recent authentication and key agreement protocols IEEE Access 2021 9 98204-98217
[104]
Rana M, Mahmood K, Saleem MA, Al-Turjman F, Kolhar MS, and Altrjman C Towards a provably secure authentication protocol for fog-driven IoT-based systems Appl Sci 2023 13 3 1424
[105]
Rayani PK, Bhushan B, and Thakare VR Multi-layer token based authentication through honey password in fog computing Int J Fog Comput (IJFC) 2018 1 1 50-62
[106]
Rezapour R, Asghari P, Javadi HHS, and Ghanbari S Security in fog computing: a systematic review on issues, challenges and solutions Comput Sci Rev 2021 41 100421
[107]
Roman R, Lopez J, and Mambo M Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges Futur Gener Comput Syst 2018 78 680-698
[108]
Saad M Fog computing and its role in the internet of things: concept, security and privacy issues Int J Comput Appl 2018 180 32 7-9
[109]
Saad ZM and Mhmood MR Fog computing system for internet of things: survey Texas J Eng Technol 2023 16 1-10
[110]
Sabireen H and Neelanarayanan VJIE A review on fog computing: architecture, fog with IoT, algorithms and research challenges Ict Express 2021 7 2 162-176
[111]
Saharan KP, Kumar A (2015) Fog in comparison to cloud: a survey. Int J Comput Appl 122(3)
[112]
Saleem MA, Mahmood K, and Kumari S Comments on AKM-IoV: authenticated key management protocol in fog computing-based Internet of Vehicles deployment’ IEEE Internet Things J 2020 7 5 4671-4675
[113]
Sarhan QI Internet of things: a survey of challenges and issues Int J Internet Things Cyber-Assur 2018 1 1 40-75
[114]
Shi W, Cao J, Zhang Q, Li Y, and Xu L Edge computing: vision and challenges IEEE Internet Things J 2016 3 5 637-646
[115]
Sicari S, Rizzardi A, Coen-Porisini A (2022) Insights into security and privacy towards fog computing evolution. Comput Secur 102822
[116]
Singh S and Chaurasiya VK Mutual authentication scheme of IoT devices in fog computing environment Clust Comput 2021 24 3 1643-1657
[117]
Singh J, Singh P, and Gill SS Fog computing: a taxonomy, systematic review, current trends and research challenges J Parallel Distribut Comput 2021 157 56-85
[118]
Son S, Lee J, Kim M, Yu S, Das AK, and Park Y Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain IEEE Access 2020 8 192177-192191
[119]
Stojmenovic I (2014, November) Fog computing: a cloud to the ground support for smart things and machine-to-machine networks. In: 2014 Australasian telecommunication networks and applications conference (ATNAC) (pp 117-122). IEEE
[120]
Stolfo SJ, Salem MB, Keromytis AD (2012) Fog computing: Mitigating insider data theft attacks in the cloud. In: 2012 IEEE symposium on security and privacy workshops (pp 125-128). IEEE
[121]
Sun Y and Zhang N A resource-sharing model based on a repeated game in fog computing Saudi J Biol Sci 2017 24 3 687-694
[122]
Tange K, De Donno M, Fafoutis X, and Dragoni N A systematic survey of industrial Internet of Things security: requirements and fog computing opportunities IEEE Commun Surv Tutor 2020 22 4 2489-2520
[123]
Tawalbeh LA, Muheidat F, Tawalbeh M, and Quwaider M IoT privacy and security: challenges and solutions Appl Sci 2020 10 12 4102
[124]
Tuli S, Mahmud R, Tuli S, and Buyya R Fogbus: a blockchain-based lightweight framework for edge and fog computing J Syst Softw 2019 154 22-36
[125]
Vasudev H, Das D, and Vasilakos AV Secure message propagation protocols for IoVs communication components Comput Electr Eng 2020 82 106555
[126]
Veerraju T and Kumar KK A survey on fog computing: research challenges in security and privacy issues Int J Eng Technol 2018 7 2.7 335-340
[127]
Verma U and Bhardwaj D Design of lightweight authentication protocol for fog enabled Internet of Things-a centralized authentication framework Int J Commun Netw Inf Secur 2020 12 2 162-167
[128]
Vigano L Automated security protocol analysis with the AVISPA tool Electronic Notes in Theoretical Computer Science 2006 155 61-86
[129]
Wang L, An H, and Chang Z Security enhancement on a lightweight authentication scheme with anonymity fog computing architecture IEEE Access 2020 8 97267-97278
[130]
Wang F, Wang J, and Yang W Efficient incremental authentication for the updated data in fog computing Futur Gener Comput Syst 2021 114 130-137
[131]
Wazid M, Bagga P, Das AK, Shetty S, Rodrigues JJ, and Park Y AKM-IoV: authenticated key management protocol in fog computing-based Internet of vehicles deployment IEEE Internet Things J 2019 6 5 8804-8817
[132]
Wazid M, Das AK, Kumar N, and Vasilakos AV Design of secure key management and user authentication scheme for fog computing services Futur Gener Comput Syst 2019 91 475-492
[133]
Wazid M, Das AK, Kumar N, and Vasilakos AV Design of secure key management and user authentication scheme for fog computing services Futur Gener Comput Syst 2019 91 475-492
[134]
Wazid M, Das AK, Shetty S, Gope P, and Rodrigues JJ Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap IEEE Access 2020 9 4466-4489
[135]
Wheelus C and Zhu X Iot network security: threats, risks, and a data-driven defense framework IoT 2020 1 2 259-285
[136]
Wu TY, Guo X, Chen YC, Kumari S, and Chen CM Sgxap: Sgx-based authentication protocol in iov-enabled fog computing Symmetry 2022 14 7 1393
[137]
Xia Z, Fang Z, Gu K, Wang J, Tan J, and Wang G Effective charging identity authentication scheme based on fog computing in V2G networks J Inf Secur Appl 2021 58 102649
[138]
Xiong H, Mei Q, and Zhao Y Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments IEEE Syst J 2019 14 1 310-320
[139]
Xiong H, Wu Y, Jin C, and Kumari S Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT IEEE Internet Things J 2020 7 12 11713-11724
[140]
Yakubu J, Christopher HA, Chiroma H, and Abdullahi M Security challenges in fog-computing environment: a systematic appraisal of current developments J Reliab Intell Environ 2019 5 4 209-233
[141]
Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data (pp 37-42)
[142]
Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data (pp 37-42)
[143]
Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: International conference on wireless algorithms, systems, and applications (pp 685-695). Springer, Cham
[144]
Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: International conference on wireless algorithms, systems, and applications (pp 685-695). Springer, Cham
[145]
Yousefpour A, Fung C, Nguyen T, Kadiyala K, Jalali F, Niakanlahiji A, Jue JP (2018) All one needs to know about fog computing and related edge computing paradigms. J Syst Archit
[146]
Yu S, Lee J, Park K, Das AK, and Park Y IoV-SMAP: secure and efficient message authentication protocol for IoV in smart city environment IEEE Access 2020 8 167875-167886
[147]
Zamfiroiu A, Iancu B, Boja C, Georgescu TM, Cartas C, Popa M, Toma CV (2020) IoT communication security issues for companies: challenges, protocols and the web of data. In: Proceedings of the international conference on business excellence (Vol 14, No 1, pp 1109-1120). Sciendo
[148]
Zhang L (2019) Key management scheme for secure channel establishment in fog computing. IEEE Trans Cloud Comput
[149]
Zhang P, Liu JK, Yu FR, Sookhak M, Au MH, and Luo X A survey on access control in fog computing IEEE Commun Mag 2018 56 2 144-149
[150]
Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and privacy in cloud computing: a survey. In 2010 sixth international conference on semantics, knowledge and grids (pp 105-112). IEEE

Cited By

View all
  • (2024)TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing EnvironmentsThe Journal of Supercomputing10.1007/s11227-023-05712-380:5(6855-6890)Online publication date: 1-Mar-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Computing
Computing  Volume 105, Issue 12
Dec 2023
247 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 15 August 2023
Accepted: 06 August 2023
Received: 31 August 2022

Author Tags

  1. Fog computing
  2. Fog security
  3. Fog security threats
  4. Fog security challenges
  5. Fog authentication mechanisms

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing EnvironmentsThe Journal of Supercomputing10.1007/s11227-023-05712-380:5(6855-6890)Online publication date: 1-Mar-2024

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media