首页|Analysis and Improvement of an Authentication Scheme for Fog Computing Services
Analysis and Improvement of an Authentication Scheme for Fog Computing Services
扫码查看
点击上方二维码区域,可以放大扫码查看
原文链接
NETL
NSTL
万方数据
Fog computing utilizes devices in the edge network to transmit data with very low latency and supports high mobility.How-ever,fog computing inherits security and privacy problems from cloud computing.Therefore,various privacy schemes for fog computing have been proposed to prevent different types of attacks.Recently,Weng et al proposed a fog computing authentication scheme;after ana-lyzing,we found that Weng et al's scheme cannot resist user tracking attack and user impersonation attack.Then,we propose an improved scheme through adding a password,modifying the calculation method of Ei,and adding timestamps.In addition,we also compare the im-proved scheme with existing authentication schemes in terms of security and computational efficiency.The results show that the improved scheme is more secure and has less computation.
authentication schemefog computingsecurity
HUO Yuyan、KANG Baoyuan、NIU Shufang、LI Anqian、ZUO Xinyu
展开 >
School of Software,Tiangong University,Tianjin 300387,China
School of Computer Science and Technology,Tiangong University,Tianjin 300387,China