Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model

Fog computing allows to connect the edge of the network, consisting of low cost Internet of Things devices, with high end cloud servers. Fog devices can perform data processing, which can significantly reduce the delay for the application. Moreover, data aggregation can be carried out by fog devices which decrease the bandwidth needed being very important for the wireless part of the communication with the cloud servers. The edge-fog-cloud architecture is currently being rolled out for several applications in the field of connected cars, health care monitoring, etc. In this paper, we propose an identity-based, mutual authenticated key agreement protocol for this fog architecture, in which end device and fog are able to establish a secure communication without leakage of their identities. Only the cloud server is able to control the identities of device and fog. We formally prove that the session keys are also protected in the Canetti–Krawczyk security model, in which adversaries are considered to have access to session state specific information, previous session keys, or long-term private keys. The scheme is very efficient as it only utilises elliptic curve operations and basic symmetric key operations.

[1]  Depeng Jin,et al.  Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures , 2016, IEEE Transactions on Vehicular Technology.

[2]  T. Hallett,et al.  The impact of HCV therapy in a high HIV-HCV prevalence population: A modeling study on people who inject drugs in Ho Chi Minh City, Vietnam , 2017, PloS one.

[3]  Ting-Yi Chang,et al.  Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments , 2018, Symmetry.

[4]  Hua-Jun Hong From Cloud Computing to Fog Computing: Unleash the Power of Edge and End Devices , 2017, 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).

[5]  Mauro Conti,et al.  Provably Secure Authenticated Key Agreement Scheme for Smart Grid , 2018, IEEE Transactions on Smart Grid.

[6]  Giuseppe Piro,et al.  When Blockchain Makes Ephemeral Keys Authentic: A Novel Key Agreement Mechanism in the IoT World , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).

[7]  Ping Wang,et al.  On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions , 2014, Comput. Networks.

[8]  Yan Zhang,et al.  Attack Detection and Distributed Forensics in Machine-to-Machine Networks , 2016, IEEE Network.

[9]  Jia-Lun Tsai,et al.  Secure Anonymous Key Distribution Scheme for Smart Grid , 2016, IEEE Transactions on Smart Grid.

[10]  Dapeng Wu,et al.  Fault-Tolerant and Scalable Key Management for Smart Grid , 2011, IEEE Transactions on Smart Grid.

[11]  Jiri Hosek,et al.  On perspective of security and privacy-preserving solutions in the internet of things , 2016, Comput. Networks.

[12]  Xiong Li,et al.  Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol , 2015 .

[13]  Cheng-Chi Lee,et al.  A Computation-Efficient Three-Party Encrypted Key Exchange Protocol , 2012 .

[14]  Andrei Gurtov,et al.  Anonymous Secure Framework in Connected Smart Home Environments , 2017, IEEE Transactions on Information Forensics and Security.

[15]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[16]  Scott A. Vanstone,et al.  Provably Secure Implicit Certificate Schemes , 2002, Financial Cryptography.

[17]  An Braeken,et al.  An efficient anonymous authentication protocol in multiple server communication networks (EAAM) , 2017, The Journal of Supercomputing.

[18]  Kim-Kwang Raymond Choo,et al.  Authenticated key agreement scheme for fog-driven IoT healthcare system , 2018, Wirel. Networks.

[19]  Yuwen Chen,et al.  An Anonymous Authentication and Key Establish Scheme for Smart Grid: FAuth , 2017 .

[20]  Tzonelih Hwang,et al.  Three-party authenticated key agreements for optimal communication , 2017, PloS one.

[21]  David Pointcheval,et al.  Multi-factor Authenticated Key Exchange , 2008, ACNS.

[22]  Sonia Aïssa,et al.  Performance modeling of message dissemination in vehicular ad hoc networks , 2010, IEEE 5th International Symposium on Wireless Pervasive Computing 2010.

[23]  Victor Shoup,et al.  Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..

[24]  Bo Ai,et al.  On the Feasibility of High Speed Railway mmWave Channels in Tunnel Scenario , 2017, Wirel. Commun. Mob. Comput..

[25]  An Braeken,et al.  Efficient anonymous user authentication on server without secure channel during registration , 2016, 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech).

[26]  Sungyoung Lee,et al.  Health Fog: a novel framework for health and wellness applications , 2016, The Journal of Supercomputing.

[27]  Yongge Wang,et al.  Secure Key Distribution for the Smart Grid , 2012, IEEE Transactions on Smart Grid.

[28]  Hugo Krawczyk,et al.  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.

[29]  M. Shamim Hossain,et al.  A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography , 2017, IEEE Access.

[30]  Meng Wu,et al.  Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance , 2017, Comput. Networks.

[31]  Jianhua Li,et al.  Escrowable identity-based authenticated key agreement protocol with strong security , 2013, Comput. Math. Appl..

[32]  Li Gong,et al.  Lower bounds on messages and rounds for network authentication protocols , 1993, CCS '93.

[33]  Sherali Zeadally,et al.  Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography , 2017, Wirel. Commun. Mob. Comput..

[34]  Xiaoyan Wang,et al.  Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things , 2018, IEEE Communications Magazine.