当前位置: X-MOL 学术Enterp. Inf. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A secure authenticated and key exchange scheme for fog computing
Enterprise Information Systems ( IF 4.4 ) Pub Date : 2020-01-10 , DOI: 10.1080/17517575.2020.1712746
Chien-Ming Chen, Yanyu Huang, King-Hang Wang, Saru Kumari, Mu-En Wu

ABSTRACT

Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security challenges of cloud computing is inevitable. Recently, Jia et al. proposed an authenticated key exchange scheme for fog-driven IoT health care systems. Unfortunately, we discovered their scheme is vulnerable to an ephemeral secret leakage attack. In this paper, we propose an authenticated key exchange scheme for fog computing. Compared with previous schemes, our proposed scheme performs better in terms of performance and security.



中文翻译:

一种用于雾计算的安全认证和密钥交换方案

摘要

雾计算架构用于智能制造、车载自组织网络等各种环境。但是,作为云计算的延伸,继承云计算的安全挑战是不可避免的。最近,贾等人。提出了一种用于雾驱动物联网医疗保健系统的经过身份验证的密钥交换方案。不幸的是,我们发现他们的方案容易受到短暂的秘密泄漏攻击。在本文中,我们提出了一种用于雾计算的认证密钥交换方案。与之前的方案相比,我们提出的方案在性能和安全性方面表现更好。

更新日期:2020-01-10
down
wechat
bug