Lightweight and secure authentication scheme for IoT networks based on publish-subscribe fog computing model

2021 ◽  
pp. 108465
Author(s):  
Sanaz Amanlou ◽  
Mohmmad Kamrul Hasan ◽  
Khairul Azmi Abu Bakar
2021 ◽  
Vol 185 ◽  
pp. 107731
Author(s):  
Zeeshan Ali ◽  
Shehzad Ashraf Chaudhry ◽  
Khalid Mahmood ◽  
Sahil Garg ◽  
Zhihan Lv ◽  
...  

2021 ◽  
Vol 67 ◽  
pp. 102726
Author(s):  
Xiangqing Wang ◽  
Yajie Li ◽  
Haokun Song ◽  
Kongni Zhu ◽  
Jie Zhang

2016 ◽  
Vol 64 ◽  
pp. 50-60 ◽  
Author(s):  
J. Sánchez-García ◽  
J.M. García-Campos ◽  
D.G. Reina ◽  
S.L. Toral ◽  
F. Barrero

1998 ◽  
Vol 65 (4) ◽  
pp. 189-193
Author(s):  
Tzonelih Hwang ◽  
Wang Chih-Hung

Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 188
Author(s):  
Shadi Nashwan

Smart irrigation is considered one of the most significant agriculture management systems worldwide, considering the current context of water scarcity. There is a clear consensus that such smart systems will play an essential role in achieving the economic growth of other vital sectors. In general, the consequences of global warming and the unavailability of clean water sources for the agricultural sector are clear indications that the demand for these systems will increase in the near future, especially considering the recent expansions in the use of the Internet of Things (IoT) and Wireless Sensor Network (WSN) technologies, which have been employed in the development of such systems. An obvious result is that security challenges will be one of the main obstacles to attaining the widespread adoption of such systems. Therefore, this paper proposes a secure authentication scheme using Diffie–Hellman key agreement for smart IoT irrigation systems using WSNs. This scheme is based on Diffie–Hellman and one-way hash cryptographic functions in order to support the basic security services with a high data rate and ability to resist well-known attacks. The Burrows–Abadi–Needham (BAN) logic model is used to verify the proposed scheme formally. Based on various possible attack scenarios, a resistance analysis of the proposed scheme is discussed. Further analyses are performed in terms of the storage size, intercommunication, and running time costs. Therefore, the proposed scheme not only can be considered a secure authentication scheme but is also practical for smart IoT irrigation systems due to its reasonable efficiency factors.


2021 ◽  
Vol 2021 ◽  
pp. 1-14 ◽  
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Qian Meng ◽  
Xinglan Guo ◽  
Chien-Ming Chen

Smart wearable devices, as a popular mobile device, have a broad market. Smart wearable medical devices implemented in wearable health monitoring systems can monitor the data pertaining to a patient’s body and let the patient know their own physical condition. In addition, these data can be stored, analyzed, and processed in the cloud to effectively prevent diseases. As an Internet-of-things technology, fog computing can process, store, and control data around devices in real time. However, the distributed attributes of fog nodes make the monitored body data and medical reports at risk of privacy disclosure. In this paper, we propose a fog-driven secure authentication and key exchange scheme for wearable health monitoring systems. Furthermore, we conduct a formal analysis using the Real-Oracle-Random model, Burrows–Abadi–Needham logic, and ProVerif tools and an informal analysis to perform security verification. Finally, a performance comparison with other related schemes shows that the proposed scheme has the best advantages in terms of security, computing overhead, and communication cost.


Sign in / Sign up

Export Citation Format

Share Document