Skip to main content
Log in

Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Real-time communication is a significant aspect of Internet of Things (IoT). IoT-enabled devices requires the immediate adoption of the highly distributed and heterogeneous framework of collateral merits. Moreover, cloud-based streaming services for IoT have disadvantages such as the inability to provide low latency, mobility support, location-awareness, and real-time data handling, which makes ubiquitous connectivity between the IoT device and server. At the same time, the concept of dew computing modifies the current mechanism of cloud-based services for IoT. It minimizes the response time of comprehensive data, which was collected by nearby resources. However, speedy advancement in IoT directs the evolving security aspects to address emerging challenges. To address the security issues, a mutual authentication architecture has been introduced for dew computing, which ensures secure and authorized session establishment without the requirement of a trusted server. The main objective of the proposed framework is to avoid bottleneck situations without compromising efficiency and security in real-time communication to IoT users through dew computing. To ensure the correctness of protocol, proof of security and simulation using AVISPA are presented. Analysis of performance and comparative study is also conducted to show the advantage in efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Guo Y, Mi Z, Yang Y, Ma H, Obaidat MS (2019) Efficient network resource preallocation on demand in multitenant cloud systems. IEEE Syst J 13:4027–4038

    Article  Google Scholar 

  2. Sharma B, Obaidat MS (2019) Comparative analysis of iot based products, technology and integration of iot with cloud computing. IET Netw 9:43–47

    Article  Google Scholar 

  3. Park D (2018) Future computing with iot and cloud computing. J Supercomput 74:6401–6407

    Article  Google Scholar 

  4. Vora J, Kaneriya S, Tanwar S, Tyagi S, Kumar N, Obaidat M (2019) Tilaa: Tactile internet-based ambient assistant living in fog environment. Future Gener Comput Syst 98:635–649

    Article  Google Scholar 

  5. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ACM, pp 13–16

  6. Pradeepa MAM, Gomathi B (2017) Towards fog computing based cloud sensor integration for internet of things. Int J Comput Sci Eng Commun 5:1761–1773

    Google Scholar 

  7. Bhatia T, Verma A (2017) Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. J Supercomput 73:2558–2631

    Article  Google Scholar 

  8. Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63:561–592

    Article  Google Scholar 

  9. Wang Y (2016) Definition and categorization of dew computing. Open J Cloud Comput (OJCC) 3:1–7

    Google Scholar 

  10. Tao D, Ma P, Obaidat MS (2019) Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks. Int J Commun Syst 32:e4099

    Article  Google Scholar 

  11. Gupta DS, Islam SH, Obaidat MS (2019) A secure identity-based three-party authenticated key agreement protocol using bilinear pairings. In: International Conference on Innovative Data Communication Technologies and Application, Springer, pp 1–11

  12. Wu T-Y, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen C-M (2020) An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access 8:28096–28108

    Article  Google Scholar 

  13. Meshram C, Obaidat MS, Lee C-C, Meshram SG (2020) An efficient key authentication procedure for ind-cca2 secure paillier-based cryptosystem. Soft Comput 24:6531–6537

    Article  Google Scholar 

  14. Pan Y, Thulasiraman P, Wang Y (2018) Overview of cloudlet, fog computing, edge computing, and dew computing. In: Proceedings of The 3rd International Workshop on Dew Computing, pp 20–23

  15. Ristov S, Cvetkov K, Gusev M (2016) Implementation of a horizontal scalable balancer for dew computing services. Scalable Comput Practice Exp 17:79–90

    Google Scholar 

  16. Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, IEEE, pp 1–8

  17. Wang Y (2015) Cloud-dew architecture. Int J Cloud Comput 4:199–210

    Article  Google Scholar 

  18. Butun I, Erol-Kantarci M, Kantarci B, Song H (2016) Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Commun Mag 54:47–53

    Article  Google Scholar 

  19. Rindos A, Wang Y (2016) Dew computing: The complementary piece of cloud computing. In: 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom). IEEE, pp 15–20

  20. Sojaat Z, Skalaa K (2017) The dawn of dew: Dew computing for advanced living environment. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, pp 347–352

  21. Dolui K, Datta SK (2017) Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In: 2017 Global Internet of Things Summit (GIoTS). IEEE, pp 1–6

  22. Gusev M (2017) A dew computing solution for iot streaming devices. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, pp 387–392

  23. Gordienko Y, Stirenko S, Alienin O, Skala K, Sojat Z, Rojbi A, Benito JL, González EA, Lushchyk U, Sajn L et al. (2017) Augmented coaching ecosystem for non-obtrusive adaptive personalized elderly care on the basis of cloud-fog-dew computing paradigm. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, pp 359–364

  24. Mane TS, Agrawal H (2017) Cloud-fog-dew architecture for refined driving assistance: The complete service computing ecosystem. In: 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB), IEEE, pp 1–7

  25. Srinivas J, Das AK, Kumar N, Rodrigues J (2018) Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans Dependable Secure Comput 17:942–956

    Article  Google Scholar 

  26. Guan Y, Shao J, Wei G, Xie M (2018) Data security and privacy in fog computing. IEEE Network 32(5):106–111. https://doi.org/10.1109/MNET.2018.1700250

    Article  Google Scholar 

  27. Patel HM, Chaudhari RR, Prajapati KR, Patel AA (2018) The interdependent part of cloud computing: Dew computing. In: Intelligent communication and computational technologies, Springer, pp 345–355

  28. Smart NP (2002) Identity-based authenticated key agreement protocol based on weil pairing. Electron lett 38:630–632

    Article  Google Scholar 

  29. Chen L, Cheng Z, Smart NP (2007) Identity-based key agreement protocols from pairings. Int J Inf Secur 6:213–241

    Article  Google Scholar 

  30. He D, Wang D (2015) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9:816–823

    Article  Google Scholar 

  31. Ying B, Nayak A (2014) Efficient authentication protocol for secure vehicular communications. In: 2014 IEEE 79th Vehicular Technology Conference (VTC Spring). IEEE, pp 1–5

  32. He D, Kumar N, Khan MK, Wang L, Shen J (2016) Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst J 12:1621–1631

    Article  Google Scholar 

  33. Tsai J-L, Lo N-W (2015) A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 9:805–815

    Article  Google Scholar 

  34. Chen C-M, Xiang B, Liu Y, Wang K-H (2019) A secure authentication protocol for internet of vehicles. IEEE Access 7:12047–12057

    Article  Google Scholar 

  35. Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems 91:475–492

    Article  Google Scholar 

  36. Botta A, Gallo L, Ventre G (2019) Cloud, fog, and dew robotics: architectures for next generation applications. In: 2019 7th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), IEEE, pp 16–23

  37. Ray PP (2019) Minimizing dependency on internetwork: Is dew computing a solution? Trans Emerg Telecommun Technol 30:e3496

    Article  Google Scholar 

  38. Longo M, Hirsch M, Mateos C, Zunino A (2019) Towards integrating mobile devices into dew computing: A model for hour-wise prediction of energy availability. Information 10:86

    Article  Google Scholar 

  39. Viganò L (2006) Automated security protocol analysis with the avispa tool. Electron Notes Theor Comput Sci 155:61–86

    Article  Google Scholar 

  40. Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 139–155

  41. Jakobsson M, Pointcheval D (2001) Mutual authentication for low-power mobile devices. In: International Conference on Financial Cryptography, Springer, pp 178–195

  42. Amin R, Islam SH, Biswas G, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener Comput Syst 80:483–495

    Article  Google Scholar 

  43. Chandrakar P, Om H (2017) A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ecc. Comput Commun 110:26–34

    Article  Google Scholar 

  44. Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Trans Dependable Secure Comput 17:1133–1146

    Article  Google Scholar 

  45. Odelu V, Das AK, Wazid M, Conti M (2018) Provably secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid 9:1900–1910

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dheerendra Mishra.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rana, S., Obaidat, M.S., Mishra, D. et al. Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems. J Supercomput 78, 3696–3714 (2022). https://doi.org/10.1007/s11227-021-04003-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04003-z

Keywords

Navigation