TY - GEN
T1 - AUASF
T2 - 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020
AU - Whaiduzzaman, Md
AU - Oliullah, Khondokar
AU - Mahi, Md Julkar Nayeen
AU - Barros, Alistair
N1 - Funding Information:
ACKNOWLEDGEMENT This research is partly supported through the Australian Research Council Discovery Project: DP190100314, “ReEngineering Enterprise Systems for Microservices in the Cloud.”
Publisher Copyright:
© 2020 IEEE.
PY - 2020/7
Y1 - 2020/7
N2 - Authentication is a challenging and emerging issue for Fog-IoT security paradigms. The fog nodes toward large-scale end-users offer various interacted IoT services. The authentication process usually involves expressing users' personal information such as username, email, and password to the Authentication Server (AS). However, users are not intended to express their identities or information over the fog or cloud servers. Hence, we have proposed an Anonymous User Authentication Scheme for Fog-IoT (AUASF) to keep the anonymity existence of the IoT users and detect the intruders. To provide anonymity, the user can send encrypted credentials such as username, email, and mobile number through the Cloud Service Provider (CSP) for registration. IoT user receives the response with a default password and a secret Id from the CSP. After that, the IoT user submits the default password for first-time access to Fog Service Provider (FSP). The FSP assigns a One Time Password (OTP) to each user for further access. The developed scheme is equipped with hash functions, symmetric encryptions, and decryptions for security perceptions across fog that serves better than the existing anonymity schemes.
AB - Authentication is a challenging and emerging issue for Fog-IoT security paradigms. The fog nodes toward large-scale end-users offer various interacted IoT services. The authentication process usually involves expressing users' personal information such as username, email, and password to the Authentication Server (AS). However, users are not intended to express their identities or information over the fog or cloud servers. Hence, we have proposed an Anonymous User Authentication Scheme for Fog-IoT (AUASF) to keep the anonymity existence of the IoT users and detect the intruders. To provide anonymity, the user can send encrypted credentials such as username, email, and mobile number through the Cloud Service Provider (CSP) for registration. IoT user receives the response with a default password and a secret Id from the CSP. After that, the IoT user submits the default password for first-time access to Fog Service Provider (FSP). The FSP assigns a One Time Password (OTP) to each user for further access. The developed scheme is equipped with hash functions, symmetric encryptions, and decryptions for security perceptions across fog that serves better than the existing anonymity schemes.
KW - Anonymous authentication
KW - Cloud
KW - Fog
KW - IoT
KW - OTP
UR - http://www.scopus.com/inward/record.url?scp=85096538987&partnerID=8YFLogxK
U2 - 10.1109/ICCCNT49239.2020.9225632
DO - 10.1109/ICCCNT49239.2020.9225632
M3 - Conference contribution
AN - SCOPUS:85096538987
T3 - 2020 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020
BT - 2020 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 1 July 2020 through 3 July 2020
ER -