Chen et al., 2021 - Google Patents
A secure authenticated and key exchange scheme for fog computingChen et al., 2021
- Document ID
- 8570111598022503983
- Author
- Chen C
- Huang Y
- Wang K
- Kumari S
- Wu M
- Publication year
- Publication venue
- Enterprise Information Systems
External Links
Snippet
Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security challenges of cloud computing is inevitable. Recently, Jia et al. proposed an authenticated …
- 238000004519 manufacturing process 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | A secure authenticated and key exchange scheme for fog computing | |
Nikravan et al. | A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things | |
Mahmood et al. | An enhanced anonymous identity‐based key agreement protocol for smart grid advanced metering infrastructure | |
Porambage et al. | PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications | |
Wang et al. | New authentication scheme for wireless body area networks using the bilinear pairing | |
Shi et al. | A new user authentication protocol for wireless sensor networks using elliptic curves cryptography | |
Lee et al. | A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps | |
Jiang et al. | EAP-based group authentication and key agreement protocol for machine-type communications | |
Li et al. | Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors | |
Gong et al. | A secure chaotic maps-based key agreement protocol without using smart cards | |
Kasyoka et al. | Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system | |
Chou et al. | Two ID-based authenticated schemes with key agreement for mobile environments | |
Zhang et al. | OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems | |
Saurabh et al. | Lightweight security for IoT | |
Jammula et al. | Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system | |
Du et al. | A secure routing scheme for underwater acoustic networks | |
Chen et al. | A lightweight mutual authentication with wearable device in location-based mobile edge computing | |
Sun et al. | Efficient and privacy-preserving certificateless data aggregation in Internet of things–enabled smart grid | |
Chen et al. | A secure user authentication scheme against smart-card loss attack for wireless sensor networks using symmetric key techniques | |
Baccouri et al. | Lightweight authentication scheme based on elliptic curve el gamal | |
Kamil et al. | A secure and privacy-preserving lightweight authentication protocol for wireless communications | |
Bhattacharya et al. | A privacy-preserving efficient location-sharing scheme for mobile online social network applications | |
Boke et al. | Efficient key generation techniques for securing IoT communication protocols | |
Chen et al. | Secure access control method for wireless sensor networks | |
Ogundoyin | An anonymous lightweight authentication scheme with scalability for trustworthy pervasive social networking |