Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement
Fog architectures are currently present in many applications. Constrained devices equipped with sensors produce measurements that will be sent to a nearby gateway, called the fog. The fog verifies, aggregates and forwards them to the server. Group authentication among these devices allows them to se...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8865043/ |
id |
doaj-a951eba9710f4213890a0c44dc8bc02b |
---|---|
record_format |
Article |
spelling |
doaj-a951eba9710f4213890a0c44dc8bc02b2021-03-29T23:42:07ZengIEEEIEEE Access2169-35362019-01-01715024715026110.1109/ACCESS.2019.29467138865043Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key AgreementPlacide Shabisha0https://orcid.org/0000-0002-3622-1943An Braeken1https://orcid.org/0000-0002-9965-915XPardeep Kumar2Kris Steenhaut3Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel, Brussels, BelgiumDepartment of Engineering Technology (INDI), Vrije Universiteit Brussel, Brussels, BelgiumDepartment of Computer Science, Swansea University, Swansea, U.K.Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel, Brussels, BelgiumFog architectures are currently present in many applications. Constrained devices equipped with sensors produce measurements that will be sent to a nearby gateway, called the fog. The fog verifies, aggregates and forwards them to the server. Group authentication among these devices allows them to securely accept messages of the group members, resulting in faster updates in their process. When defining a security scheme, it should be considered that edge and fog devices are susceptible to attacks. Privacy of the devices should be guaranteed, with respect to outsiders and the fog. It should be impossible to track the connection pattern of devices with different fogs, even if several fogs are captured by an attacker. Inclusion of protection against potentially malicious fogs has not yet been considered in literature, especially not for group-based communications. We present a server-controlled group authentication and key agreement scheme, executed by the fog in collaboration with the devices that it can reach. The server, assumed to be fully trusted, is responsible for the registration and authorisation of the devices and initiates the key update process, whereas the fog takes care of the secure distribution process among its members. At the end, all entities in the group are ensured to possess the correct group key. Moreover, a pairwise secret key between device and server is obtained during the process. The proposed scheme is very efficient as it relies on elliptic curve cryptography and Lagrange interpolation. No initially shared secret key material among the entities needs to be pre-stored.https://ieeexplore.ieee.org/document/8865043/Edge-fog-cloud architectureelliptic curve cryptographygroup authenticationgroup keyRubin logic |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Placide Shabisha An Braeken Pardeep Kumar Kris Steenhaut |
spellingShingle |
Placide Shabisha An Braeken Pardeep Kumar Kris Steenhaut Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement IEEE Access Edge-fog-cloud architecture elliptic curve cryptography group authentication group key Rubin logic |
author_facet |
Placide Shabisha An Braeken Pardeep Kumar Kris Steenhaut |
author_sort |
Placide Shabisha |
title |
Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement |
title_short |
Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement |
title_full |
Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement |
title_fullStr |
Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement |
title_full_unstemmed |
Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement |
title_sort |
fog-orchestrated and server-controlled anonymous group authentication and key agreement |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
Fog architectures are currently present in many applications. Constrained devices equipped with sensors produce measurements that will be sent to a nearby gateway, called the fog. The fog verifies, aggregates and forwards them to the server. Group authentication among these devices allows them to securely accept messages of the group members, resulting in faster updates in their process. When defining a security scheme, it should be considered that edge and fog devices are susceptible to attacks. Privacy of the devices should be guaranteed, with respect to outsiders and the fog. It should be impossible to track the connection pattern of devices with different fogs, even if several fogs are captured by an attacker. Inclusion of protection against potentially malicious fogs has not yet been considered in literature, especially not for group-based communications. We present a server-controlled group authentication and key agreement scheme, executed by the fog in collaboration with the devices that it can reach. The server, assumed to be fully trusted, is responsible for the registration and authorisation of the devices and initiates the key update process, whereas the fog takes care of the secure distribution process among its members. At the end, all entities in the group are ensured to possess the correct group key. Moreover, a pairwise secret key between device and server is obtained during the process. The proposed scheme is very efficient as it relies on elliptic curve cryptography and Lagrange interpolation. No initially shared secret key material among the entities needs to be pre-stored. |
topic |
Edge-fog-cloud architecture elliptic curve cryptography group authentication group key Rubin logic |
url |
https://ieeexplore.ieee.org/document/8865043/ |
work_keys_str_mv |
AT placideshabisha fogorchestratedandservercontrolledanonymousgroupauthenticationandkeyagreement AT anbraeken fogorchestratedandservercontrolledanonymousgroupauthenticationandkeyagreement AT pardeepkumar fogorchestratedandservercontrolledanonymousgroupauthenticationandkeyagreement AT krissteenhaut fogorchestratedandservercontrolledanonymousgroupauthenticationandkeyagreement |
_version_ |
1724189119875121152 |