Fog computing allows to connect the edge of
the network, consisting of low cost Internet of Things
devices, with high end cloud servers. Fog devices can
perform data processing, which can signicantly re-
duce the delay for the application. Moreover, data ag-
gregation can be carried out by fog devices which de-
crease the bandwidth needed being very important for
the wireless part of the communication with the cloud
servers. The edge-fog-cloud architecture is currently be-
ing rolled out for several applications in the eld of con-
nected cars, health care monitoring, etc. In this paper,
we propose an identity-based, mutual authenticated key
agreement protocol for this fog architecture, in which
end device and fog are able to establish a secure com-
munication without leakage of their identities. Only the
cloud server is able to control the identities of device
and fog. We formally prove that the session keys are
also protected in the Canetti-Krawczyk security model,
in which adversaries are considered to have access to
session state specic information, previous session keys,
or long-term private keys. The scheme is very ecient
as it only utilises elliptic curve operations and basic
symmetric key operations.
Original languageEnglish
JournalWireless Networks
Publication statusAccepted/In press - 26 Jun 2019

    Research areas

  • Fog computing , Authentication, Canetti-Krawczyk, ECQV certificates, Session key security, Anonymity

ID: 46143083