Abstract
The persons supporting the cloud computing model also support that the Edge, Fog and Dew models, which give users a nicer experience. The dew server is a cloud server on the local PC. In this continuation, Dew for IoT systems (may name as “IoT-enabled Dew”) is another new computing model. As communication in these systems occurs over an open channel, many security concerns come into the picture, and the same applies to IoT in Dew. Thus, it is necessary to focus on authorization in data access, secure session establishment, and user privacy to have confidence in the system and data secrecy. As cloud servers do not completely control data, security and authorized access remain key concerns in Dew. There is a need for a secure interaction between a sensor device and a user. This can be fulfilled after creating a session key between these two entities. The existing schemes based on factorization and discrete logs present in various literature support the creation of the session key in the dew-assisted system and are secure in the pre-quantum era, which may not be suitable for the post-quantum era. This paper proposes a quantum secure and efficient authenticated key agreement scheme. We present the formal security of the proposed scheme, which shows that once the credential database is threatened, the opponent cannot obtain any private information about the user even if the number of trials using the random oracle model (ROM) by the probabilistic polynomial time (PPT) opponent exceeds a threshold number. We also include a comprehensive performance evaluation and comparative study.






Similar content being viewed by others
Data availability
Data sharing is not applicable to this article as no new data were created or analyzed in this study.
References
Guo, Y., Mi, Z., Yang, Y., Ma, H., Obaidat, M.S.: Efficient network resource preallocation on demand in multitenant cloud systems. IEEE Syst. J. 13(4), 4027–4038 (2019)
Vora, J., Kaneriya, S., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M.: TILAA: tactile internet-based ambient assistant living in fog environment. Futur. Gener. Comput. Syst. 98, 635–649 (2019)
Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM (2012)
Pradeepa, M.A.M., Gomathi, B.: Towards fog computing based cloud sensor integration for internet of things. In. J. Comput. Sci. Eng. Commun. 5(6), 1761–1773 (2017)
Sharma, B., Obaidat, M.S.: Comparative analysis of IoT based products, technology and integration of IoT with cloud computing. IET Netw. 9(2), 43–47 (2019)
Naik, B., Obaidat, M.S., Nayak, J., Pelusi, D., Vijayakumar, P., Islam, S.H.: Intelligent secure ecosystem based on metaheuristic and functional link neural network for edge of things. IEEE Trans. Industr. Inf. 16(3), 1947–1956 (2020)
Garg, S., Singh, A., Kaur, K., Aujla, G.S., Batra, S., Kumar, N., Obaidat, M.S.: Edge computing-based security framework for big data analytics in vanets. IEEE Netw. 33(2), 72–81 (2019)
Šojat, Z., Skala, K.: Views on the role and importance of dew computing in the service and control technology. In: 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 164–168. IEEE (2016)
Gordienko, Y., Stirenko, S., Alienin, O., Skala, K., Sojat, Z., Rojbi, A., Benito, J.L., González, E.A., Lushchyk, U., Sajn, L.: Augmented coaching ecosystem for non-obtrusive adaptive personalized elderly care on the basis of cloud-fog-dew computing paradigm. In: 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 359–364. IEEE (2017)
Ray, P.P.: An introduction to dew computing: definition, concept and implications. IEEE Access 6, 723–737 (2017)
Tao, D., Ma, P., Obaidat, M.S.: Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks. Int. J. Commun. Syst. 32(14), e4099 (2019)
Gupta, D.S., Islam, S.H., Obaidat, M.S.: A secure identity-based three-party authenticated key agreement protocol using bilinear pairings. In: International Conference on Innovative Data Communication Technologies and Application, pp. 1–11. Springer (2019)
Wu, T.-Y., Lee, Z., Obaidat, M.S., Kumari, S., Kumar, S., Chen, C.-M.: An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access 8, 28096–28108 (2020)
Meshram, C., Obaidat, M.S., Lee, C.-C., Meshram, S.G.: An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem. Soft Comput. (2020). https://doi.org/10.1007/s00500-020-04768-0
Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, pp. 1–8. IEEE (2014)
Wang, Y.: Cloud-dew architecture. Int. J. Cloud Comput. 4(3), 199–210 (2015)
Wang, Y.: Definition and categorization of dew computing. Open J. Cloud Comput. (OJCC) 3(1), 1–7 (2016)
Rindos, A., Wang, Y.: Dew computing: the complementary piece of cloud computing. In: IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom), pp. 15–20. IEEE (2016)
Sojaat, Z., Skalaa, K.: The dawn of dew: dew computing for advanced living environment. In: 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 347–352. IEEE (2017)
Ristov, S., Cvetkov, K., Gusev, M.: Implementation of a horizontal scalable balancer for dew computing services. Scalable Comput. Pract. Exp. 17(2), 79–90 (2016)
Dolui, K., Datta, S.K.: Comparison of edge computing implementations: fog computing, cloudlet and mobile edge computing. In: Global Internet of Things Summit (GIoTS), pp. 1–6. IEEE (2017)
Gusev, M.: A dew computing solution for IoT streaming devices. In: 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 387–392. IEEE (2017)
Srinivas, J., Das, A.K., Kumar, N., Rodrigues, J.: Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans. Depend. Secur. Comput. (2018). https://doi.org/10.1109/TDSC.2018.2828306
Patel, H.M., Chaudhari, R.R., Prajapati, K.R., Patel, A.A.: The interdependent part of cloud computing: dew computing. In: Intelligent Communication and Computational Technologies, pp. 345–355. Springer (2018)
Mane, T.S., Agrawal, H.: Cloud-fog-dew architecture for refined driving assistance: the complete service computing ecosystem. In: 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB), pp. 1–7. IEEE (2017)
Botta, A., Gallo, L., Ventre, G.: Cloud, fog, and dew robotics: architectures for next generation applications. In: 2019 7th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 16–23. IEEE (2019)
Hati, S., De, D., Mukherjee, A.: Dewbcity: blockchain network-based dew-cloud modeling for distributed and decentralized smart cities. J. Supercomput. 78(6), 8977–8997 (2022)
Wazid, M., Das, A.K., Kumar, N., Vasilakos, A.V.: Design of secure key management and user authentication scheme for fog computing services. Futur. Gener. Comput. Syst. 91, 475–492 (2019)
Rana, S., Obaidat, M.S., Mishra, D., Mishra, A., Rao, Y.S.: Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems. J. Supercomput. (2022). https://doi.org/10.1007/s11227-021-04003-z
Ma, Y., Ma, Y., Cheng, Q.: Cryptanalysis and enhancement of an authenticated key agreement protocol for dew-assisted IoT systems. Secur. Commun. Netw. (2022). https://doi.org/10.1155/2022/7125491
Braeken, A.: Authenticated key agreement protocols for dew-assisted IoT systems. J. Supercomput. 78(10), 12093–12113 (2022)
Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science, pp. 124–134. IEEE (1994)
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)
Ding, J., Alsayigh, S., Lancrenon, J., Saraswathy, R., Snook, M.: Provably secure password authenticated key exchange based on RLWE for the post-quantum world. In: Cryptographers Track at the RSA Conference, pp. 183–204. Springer (2017)
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197–206 (2008)
Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267–302 (2007)
Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. J. ACM (JACM) 60(6), 1–35 (2013)
Zhang, J., Zhang, Z., Ding, J., Snook, M., Dagdelen, Ö.: Authenticated key exchange from ideal lattices. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 719–751. Springer (2015)
Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland. Proceedings 8, pp. 65–84. Springer (2005)
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. cryptology eprint archive (2004)
Funding
Not applicable
Author information
Authors and Affiliations
Contributions
Author Names: DM, KP, MS, and AM. Contribution: The authors confirm their contribution to the paper as follows: Analysis of Existing protocol’s security and efficiency: KP. Designing the protocol: DM. Discussion on protocol security and Efficiency: MS Designing the proof and discussing the proof of security: AM. Analysis of performance and Comparative Study: DM. Wrote the main manuscript text: Komal Pursharthi and Ankita Mishra. Proofreading: DM and MS. All authors reviewed the results and approved the final version of the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The author would like to report that they have no conflicts.
Consent to publish
All authors give their Consent to publish.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Mishra, D., Pursharthi, K., Singh, M. et al. Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems. Int. J. Inf. Secur. 24, 19 (2025). https://doi.org/10.1007/s10207-024-00932-x
Published:
DOI: https://doi.org/10.1007/s10207-024-00932-x