[go: up one dir, main page]

Chen et al., 2021 - Google Patents

A secure authenticated and key exchange scheme for fog computing

Chen et al., 2021

Document ID
8570111598022503983
Author
Chen C
Huang Y
Wang K
Kumari S
Wu M
Publication year
Publication venue
Enterprise Information Systems

External Links

Snippet

Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security challenges of cloud computing is inevitable. Recently, Jia et al. proposed an authenticated …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Similar Documents

Publication Publication Date Title
Chen et al. A secure authenticated and key exchange scheme for fog computing
Nikravan et al. A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things
Mahmood et al. An enhanced anonymous identity‐based key agreement protocol for smart grid advanced metering infrastructure
Porambage et al. PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
Wang et al. New authentication scheme for wireless body area networks using the bilinear pairing
Shi et al. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
Lee et al. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
Jiang et al. EAP-based group authentication and key agreement protocol for machine-type communications
Li et al. Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
Gong et al. A secure chaotic maps-based key agreement protocol without using smart cards
Kasyoka et al. Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system
Chou et al. Two ID-based authenticated schemes with key agreement for mobile environments
Zhang et al. OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems
Saurabh et al. Lightweight security for IoT
Jammula et al. Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system
Du et al. A secure routing scheme for underwater acoustic networks
Chen et al. A lightweight mutual authentication with wearable device in location-based mobile edge computing
Sun et al. Efficient and privacy-preserving certificateless data aggregation in Internet of things–enabled smart grid
Chen et al. A secure user authentication scheme against smart-card loss attack for wireless sensor networks using symmetric key techniques
Baccouri et al. Lightweight authentication scheme based on elliptic curve el gamal
Kamil et al. A secure and privacy-preserving lightweight authentication protocol for wireless communications
Bhattacharya et al. A privacy-preserving efficient location-sharing scheme for mobile online social network applications
Boke et al. Efficient key generation techniques for securing IoT communication protocols
Chen et al. Secure access control method for wireless sensor networks
Ogundoyin An anonymous lightweight authentication scheme with scalability for trustworthy pervasive social networking