Affiliation:
1. College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China
2. Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China
Abstract
Recently, there has been rapid growth in the Internet of things, the Internet of vehicles, fog computing, and social Internet of vehicles
, which can generate large amounts of real-time data. Now, researchers have begun applying fog computing to the
to reduce the computing pressure on cloud servers. However, there are still security challenges in
. In this paper, we propose a lightweight and authenticated key agreement protocol based on fog nodes in
. The protocol completes the mutual authentication between entities and generates the session key for subsequent communication. Through a formal analysis of the Burrows–Abadi–Needham (BAN) logic, real-oracle random (ROR) model, and ProVerif, the security, validity, and correctness of the proposed protocol are demonstrated. In addition, informal security analysis shows that our proposed protocol can resist known security attacks. We also evaluate the performance of the proposed protocol and show that it achieves better performance in terms of computing power and communication cost.
Funder
Guangxi Key Laboratory of Trusted Software
Subject
Computer Networks and Communications,Computer Science Applications
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献