BDU IR

DESIGN SECURE AUTHENTICATION SCHEME FOR FOG COMPUTING

Show simple item record

dc.contributor.author NURHUSSEN, MENZA
dc.date.accessioned 2024-12-05T07:48:28Z
dc.date.available 2024-12-05T07:48:28Z
dc.date.issued 2023-07
dc.identifier.uri http://ir.bdu.edu.et/handle/123456789/16284
dc.description.abstract Fog computing is a system of decentralized computing in which data, applications, compute, and data storage are distributed among the data source (i.e., smart devices) and the cloud in the most logical and effective locations. Fog computing inherits security and privacy issues from cloud computing, ensuring enhanced security and privacy. Authentication is crucial for security in fog computing systems, requiring a new technique with lightweight encryption and mutual authentication to prevent malicious attacks and protect communication channels. Thus, we designed a secure and mutual authentication scheme for fog computing based on a hybrid (Advanced Encryption Standard and Elliptic Curve cryptography) algorithm. The scheme improves secure authentication and key exchange schemes between edge devices and fog nodes. The scheme was verify for security analysis using formal security verification under the widely known and accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool. We proved our scheme using Burrows Abdi Needham’s logic (BAN logic) to ensure that the scheme was secure through mutual authentication. The results show that our scheme provides better and more secure communication and authentication service than the existing schemes. Keywords: authentication, fog computing, hybrid cryptography en_US
dc.language.iso en_US en_US
dc.subject Computer Science en_US
dc.title DESIGN SECURE AUTHENTICATION SCHEME FOR FOG COMPUTING en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record