A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment

@article{Dewanta2019AMA,
  title={A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment},
  author={Favian Dewanta and Masahiro Mambo},
  journal={IEEE Access},
  year={2019},
  volume={7},
  pages={103095-103114}
}
Handover schemes play a vital role on fog computing service (FCS) provided through vehicular network. It not only determines the quality of services (QoSs) but also the security and safety of vehicular network system against adversaries. As a part of handover process, authentication between vehicles and a new fog node (FN) significantly contributes to protecting private information and infrastructure of vehicular network at once. In this paper, we propose a lightweight and secure mutual… Expand
BPT Scheme: Establishing Trusted Vehicular Fog Computing Service for Rural Area Based on Blockchain Approach
TLDR
A method called Bidding-Price-based Transaction (BPT) is proposed for vehicular fog computing service in rural areas that can be achieved without the direct assistance of any trusted third party as a validating entity and can be realized by adjusting vehicle speed and transmission range with respect to the size of offloaded data. Expand
Enabling Fog Complex Security Services in Mobile Cloud Environments
TLDR
A proactive complex security service replication protocol for increasing availability of fog security services is proposed that is able to manage proactively replicas whenever they are requested and shows better achieved availability and reasonable response time for complex security services in different configurations. Expand
Security and Privacy Challenges in Connected Vehicular Cloud Computing
TLDR
A state-of-the-art study of VCC that focuses on VCC architecture, its features analysis, and extensive VCC applications is presented and the proposed threats identification taxonomy and an exhaustive survey on security and privacy issues in VCC are presented. Expand
Secure Microservices Deployment for Fog Computing Services in a Remote Office
  • Favian Dewanta
  • 2020 3rd International Conference on Information and Communications Technology (ICOIACT)
  • 2020
Microservices deployment remains insecure because it relies on the knowledge of microservices’ users against security aspects in some particular fog computing networks. As a consequence, the usersExpand
Neuro-Fuzzy Based Handover Authentication Protocol for Ultra Dense 5G Networks
TLDR
The simulation results show that the proposed 5G key management and handover protocol preserves perfect forward key secrecy, is robust against de-synchronization, replay, man-in-the-middle (MITM), denial of services (DoS) and jamming attacks, and has low communication overheads, space complexity and hand over authentication latencies. Expand
A Method for Microservices Handover in A Local Area Network
TLDR
This paper is focusing on microservices handover that follows user’s movement, which shows that delay of SSH is always higher than FTP in all experiments, in which the largest delays are 484.026 seconds for SSH protocol and 146.41 seconds for FTP protocols. Expand
Architecture of Fog Computing, Issues and Challenges: A Review
In the recent past, majority of IoT services and applications are designed to make the human life easy. The number of IoT devices is increasing day by day. Smart cities, smart objects, smart phones,Expand
Migrasi Mikroservis Pada Fog Computing Untuk Mendukung Kinerja Komputasi Robot dengan Cakupan Pergerakan yang Luas
TLDR
Kekuatan komputasi robot sangat bergantung pada jenis processor, hard disk, memory, sertaJenis software/bahasa pemrograman yang mengeksekusi algoritma pada robot tersebut yang dikerjakan suatu robot, semakin besar pula kebutuhan kom putasi yang harus dipenuhi. Expand

References

SHOWING 1-10 OF 46 REFERENCES
A survey on authentication schemes in VANETs for secured communication
TLDR
The main objective of this paper is to provide a taxonomy of authentication schemes in VANET, and discuss their mechanisms, advantages, disadvantages, performance and scope of research. Expand
Reliable and Secure Vehicular Fog Service Provision
TLDR
This paper proposes a novel mechanism which consists of a VF construction method and a VFS access method to ensure VFS reliability and security without sacrificing performance and investigates the impact of the proposed mechanism on VF throughput. Expand
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
TLDR
The rigorous formal and informal security analysis shows that the proposed scheme is capable to defend various malicious attacks and the ns-2 simulation demonstrates the practicability of the proposed schemes in VANET environment. Expand
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
TLDR
A temporal-credential-based mutual authentication scheme among the user, GWN and the sensor node and a lightweight key agreement scheme is proposed to embed into the protocol that is realistic and well adapted for resource-constrained wireless sensor networks. Expand
Design of authentication protocol for wireless sensor network-based smart vehicular system
TLDR
An architecture of data traffic/movement in vehicular sensor network and authenticate the entities is proposed and the protocol is strongly protected against security attacks and relatively better in terms of overhead such as computation and communication. Expand
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
TLDR
This paper revisits the scheme of Amin and Biswas and reveals previously unknown vulnerabilities in the scheme, as well as demonstrating the security of the proposed scheme using Proverif and evaluating the good performance of the scheme using NS-2 simulation. Expand
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
TLDR
A mutual authentication and key agreement scheme for WSN using chaotic maps is proposed, the first to be proposed based on chaotic maps, and the superiority of the proposed scheme over its predecessor schemes is shown by means of detailed security analysis and comparative evaluation. Expand
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
TLDR
An efficient and security dynamic identity based authentication protocol for multi-server architecture that removes the aforementioned weaknesses and is extremely suitable for use in distributed multi- server architecture. Expand
Secure and efficient user authentication scheme for multi-gateway wireless sensor networks
TLDR
A novel authentication and key agreement scheme for WSNs using biohashing that facilitates elimination of false accept rates without increasing occurrence of false rejection rate, and has highly clear separation of imposter populations and genuine, and zero equal error rate level is proposed. Expand
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
TLDR
The proposed protocol not only resists the above mentioned security weaknesses, but also achieves complete security requirements including specially energy efficiency, user anonymity, mutual authentication and user-friendly password change phase. Expand
...
1
2
3
4
5
...