首页|Analysis and Improvement of an Authentication Scheme for Fog Computing Services

Analysis and Improvement of an Authentication Scheme for Fog Computing Services

扫码查看
Fog computing utilizes devices in the edge network to transmit data with very low latency and supports high mobility.How-ever,fog computing inherits security and privacy problems from cloud computing.Therefore,various privacy schemes for fog computing have been proposed to prevent different types of attacks.Recently,Weng et al proposed a fog computing authentication scheme;after ana-lyzing,we found that Weng et al's scheme cannot resist user tracking attack and user impersonation attack.Then,we propose an improved scheme through adding a password,modifying the calculation method of Ei,and adding timestamps.In addition,we also compare the im-proved scheme with existing authentication schemes in terms of security and computational efficiency.The results show that the improved scheme is more secure and has less computation.

authentication schemefog computingsecurity

HUO Yuyan、KANG Baoyuan、NIU Shufang、LI Anqian、ZUO Xinyu

展开 >

School of Software,Tiangong University,Tianjin 300387,China

School of Computer Science and Technology,Tiangong University,Tianjin 300387,China

2024

武汉大学自然科学学报(英文版)
武汉大学

武汉大学自然科学学报(英文版)

CSTPCD
影响因子:0.066
ISSN:1007-1202
年,卷(期):2024.29(3)