Loading…

Authenticated key agreement scheme for fog-driven IoT healthcare system

The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in...

Full description

Saved in:
Bibliographic Details
Published in:Wireless networks 2019-11, Vol.25 (8), p.4737-4750
Main Authors: Jia, Xiaoying, He, Debiao, Kumar, Neeraj, Choo, Kim-Kwang Raymond
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03
cites cdi_FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03
container_end_page 4750
container_issue 8
container_start_page 4737
container_title Wireless networks
container_volume 25
creator Jia, Xiaoying
He, Debiao
Kumar, Neeraj
Choo, Kim-Kwang Raymond
description The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.
doi_str_mv 10.1007/s11276-018-1759-3
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2046365235</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2046365235</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03</originalsourceid><addsrcrecordid>eNp1kEFLAzEQhYMoWKs_wNuC5-hMsptkj6VoFQpe6jmk2Um3td2tyVbovzelgicPwzyG997Ax9g9wiMC6KeEKLTigIajrmouL9gIKy24wVpdZg1CcABprtlNShsAMLKuR2w2OQwtdcPau4Ga4pOOhVtFol2-Fcm3WRShj3lWvInrb-qKt35RtOS2Q-tdpCId00C7W3YV3DbR3e8es4-X58X0lc_fZ2_TyZx7iWrgfhmk11IQOSNBBcJSa1WBXiLVNcnaexNQKm9UkFBKXTamwtKEyi0FNiDH7OHcu4_914HSYDf9IXb5pRVQKqkqIavswrPLxz6lSMHu43rn4tEi2BMve-ZlMy974mVlzohzJmVvt6L41_x_6AcmSWy9</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2046365235</pqid></control><display><type>article</type><title>Authenticated key agreement scheme for fog-driven IoT healthcare system</title><source>ABI/INFORM Global</source><source>Springer Nature</source><creator>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</creator><creatorcontrib>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</creatorcontrib><description>The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-018-1759-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Battlefields ; Cloud computing ; Communications Engineering ; Computer Communication Networks ; Cybersecurity ; Electrical Engineering ; Engineering ; Health care ; Internet of Things ; IT in Business ; Networks ; Protocols ; Wireless networks</subject><ispartof>Wireless networks, 2019-11, Vol.25 (8), p.4737-4750</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2018</rights><rights>Wireless Networks is a copyright of Springer, (2018). All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03</citedby><cites>FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03</cites><orcidid>0000-0002-2446-7436</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2046365235/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2046365235?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,778,782,11675,27911,27912,36047,44350,74650</link.rule.ids></links><search><creatorcontrib>Jia, Xiaoying</creatorcontrib><creatorcontrib>He, Debiao</creatorcontrib><creatorcontrib>Kumar, Neeraj</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><title>Authenticated key agreement scheme for fog-driven IoT healthcare system</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.</description><subject>Battlefields</subject><subject>Cloud computing</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cybersecurity</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Health care</subject><subject>Internet of Things</subject><subject>IT in Business</subject><subject>Networks</subject><subject>Protocols</subject><subject>Wireless networks</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp1kEFLAzEQhYMoWKs_wNuC5-hMsptkj6VoFQpe6jmk2Um3td2tyVbovzelgicPwzyG997Ax9g9wiMC6KeEKLTigIajrmouL9gIKy24wVpdZg1CcABprtlNShsAMLKuR2w2OQwtdcPau4Ga4pOOhVtFol2-Fcm3WRShj3lWvInrb-qKt35RtOS2Q-tdpCId00C7W3YV3DbR3e8es4-X58X0lc_fZ2_TyZx7iWrgfhmk11IQOSNBBcJSa1WBXiLVNcnaexNQKm9UkFBKXTamwtKEyi0FNiDH7OHcu4_914HSYDf9IXb5pRVQKqkqIavswrPLxz6lSMHu43rn4tEi2BMve-ZlMy974mVlzohzJmVvt6L41_x_6AcmSWy9</recordid><startdate>20191101</startdate><enddate>20191101</enddate><creator>Jia, Xiaoying</creator><creator>He, Debiao</creator><creator>Kumar, Neeraj</creator><creator>Choo, Kim-Kwang Raymond</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-2446-7436</orcidid></search><sort><creationdate>20191101</creationdate><title>Authenticated key agreement scheme for fog-driven IoT healthcare system</title><author>Jia, Xiaoying ; He, Debiao ; Kumar, Neeraj ; Choo, Kim-Kwang Raymond</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Battlefields</topic><topic>Cloud computing</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cybersecurity</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Health care</topic><topic>Internet of Things</topic><topic>IT in Business</topic><topic>Networks</topic><topic>Protocols</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jia, Xiaoying</creatorcontrib><creatorcontrib>He, Debiao</creatorcontrib><creatorcontrib>Kumar, Neeraj</creatorcontrib><creatorcontrib>Choo, Kim-Kwang Raymond</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jia, Xiaoying</au><au>He, Debiao</au><au>Kumar, Neeraj</au><au>Choo, Kim-Kwang Raymond</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Authenticated key agreement scheme for fog-driven IoT healthcare system</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2019-11-01</date><risdate>2019</risdate><volume>25</volume><issue>8</issue><spage>4737</spage><epage>4750</epage><pages>4737-4750</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud computing has its limitation for applications requiring low-latency and high mobility, particularly in adversarial settings (e.g. battlefields). To some extent, such limitations can be mitigated in a fog computing paradigm since the latter bridges the gap between remote cloud data center and the end devices (via some fog nodes). However, fog nodes are often deployed in remote and unprotected places. This necessitates the design of security solutions for a fog-based environment. In this paper, we investigate the fog-driven IoT healthcare system, focusing only on authentication and key agreement. Specifically, we propose a three-party authenticated key agreement protocol from bilinear pairings. We introduce the security model and present the formal security proof, as well as security analysis against common attacks. We then evaluate its performance, in terms of communication and computation costs.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-018-1759-3</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-2446-7436</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1022-0038
ispartof Wireless networks, 2019-11, Vol.25 (8), p.4737-4750
issn 1022-0038
1572-8196
language eng
recordid cdi_proquest_journals_2046365235
source ABI/INFORM Global; Springer Nature
subjects Battlefields
Cloud computing
Communications Engineering
Computer Communication Networks
Cybersecurity
Electrical Engineering
Engineering
Health care
Internet of Things
IT in Business
Networks
Protocols
Wireless networks
title Authenticated key agreement scheme for fog-driven IoT healthcare system
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T12%3A52%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Authenticated%20key%20agreement%20scheme%20for%20fog-driven%20IoT%20healthcare%20system&rft.jtitle=Wireless%20networks&rft.au=Jia,%20Xiaoying&rft.date=2019-11-01&rft.volume=25&rft.issue=8&rft.spage=4737&rft.epage=4750&rft.pages=4737-4750&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-018-1759-3&rft_dat=%3Cproquest_cross%3E2046365235%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c316t-cbf3c732eea8306fe14776507b1e99e39cc8f136c86f304374d85148f5ab21d03%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2046365235&rft_id=info:pmid/&rfr_iscdi=true