Identity-Based and Anonymous Key Agreement Protocol for Fog Computing Resistant in the Canetti-Krawczyk Security Model
This publication appears in: Wireless Networks
Authors: S. Patonico, A. Braeken and K. Steenhaut
Number of Pages: 13
Publication Date: Jul. 2019
Fog computing allows to connect the edge ofthe network, consisting of low cost Internet of Thingsdevices, with high end cloud servers. Fog devices canperform data processing, which can signicantly re-duce the delay for the application. Moreover, data ag-gregation can be carried out by fog devices which de-crease the bandwidth needed being very important forthe wireless part of the communication with the cloudservers. The edge-fog-cloud architecture is currently be-ing rolled out for several applications in the eld of con-nected cars, health care monitoring, etc. In this paper,we propose an identity-based, mutual authenticated keyagreement protocol for this fog architecture, in whichend device and fog are able to establish a secure com-munication without leakage of their identities. Only thecloud server is able to control the identities of deviceand fog. We formally prove that the session keys arealso protected in the Canetti-Krawczyk security model,in which adversaries are considered to have access tosession state specic information, previous session keys,or long-term private keys. The scheme is very ecientas it only utilises elliptic curve operations and basicsymmetric key operations.