Abstract
This paper introduces a mutual authentication protocol designed for the IoT-Fog-Cloud environment, utilizing Elliptic Curve Cryptography (ECC). The proposed protocol supports the management of energy consumption and network usage. Smart energy management not only helps to reduce energy costs but also minimizes carbon emissions. Hence, it achieves sustainability. The protocol undergoes rigorous formal and informal security analyses and has proven to achieve session key security along with mutual authentication. Formal security analysis is conducted using ProVerif, while informal assessments reveal the protocol’s resilience against various attacks, including replay attacks, session key disclosure attacks, man-in-the-middle attacks, traffic analysis attacks, Denial-of-Service (DoS) attacks, desynchronization attacks and ESL attacks. Additionally, it provides perfect forward secrecy. The protocol incurs a computational cost of 14.88 milliseconds and requires 5824 bits for message exchange, keeping security as the top priority ensures swift and secure interaction between IoT devices and fog nodes. Also, simulation has been done using iFogSim to assess the practicability of the proposed scheme in real-life scenarios. The energy consumption, network usage, application loop delay, and execution time of various configurations are computed and compared. Compared to existing protocols, the proposed one confirms provable security and offers enhanced security features in the IoT-Fog-Cloud environment.














Similar content being viewed by others
Data Availability
This is not applicable.
References
Ali U, Idris MY, Frnda J, Ayub MN, Khan MA, Khan N, Jasim AA, Ullah I, Babar M (2023) Enhanced lightweight and secure certificateless authentication scheme (elwscas) for internet of things environment. Internet of Things 100923. https://doi.org/10.1016/j.iot.2023.100923
Chaudhry SA, Irshad A, Yahya K, Kumar N, Alazab M, Zikria YB (2021) Rotating behind privacy: An improved lightweight authentication scheme for cloud-based iot environment. ACM Transactions on Internet Technology (TOIT) 21(3):1–19. https://doi.org/10.1145/3425707
Servati MR, Safkhani M (2023) Eccbas: An ecc based authentication scheme for healthcare iot systems. Pervasive Mob Comput 90:101753. https://doi.org/10.1016/j.pmcj.2023.101753
Ashton K (2009) That ‘internet of things’ thing. RFID journal 22(7):97–114
Erroutbi A, El Hanjri A, Sekkaki A (2019) Secure and lightweight hmac mutual authentication protocol for communication between iot devices and fog nodes. In: 2019 IEEE International Smart Cities Conference (ISC2), pp. 251–257. https://doi.org/10.1109/ISC246665.2019.9071788
Association et al (2020) The mobile economy 2020. GSMA HEAD OFFICE
Chen Z, Cheng Z, Luo W, Ao J, Liu Y, Sheng K, Chen L (2023) Fsmfa: Efficient firmware-secure multi-factor authentication protocol for iot devices. Internet of Things 21:100685. https://doi.org/10.1016/j.iot.2023.100685
Ogundoyin SO, Kamil IA (2022) Secure and privacy-preserving d2d communication in fog computing services. Comput Netw 210:108942. https://doi.org/10.1016/j.comnet.2022.108942
Mahmud R, Kotagiri R, Buyya R (2018) Fog computing: A taxonomy, survey and future directions. Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives, 103–130. https://doi.org/10.1007/978-981-10-5861-5_5
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. https://doi.org/10.1145/2342509.2342513
Bonomi F, Milito R, Natarajan P, Zhu J (2014) Fog computing: A platform for internet of things and analytics. Big data and internet of things: A roadmap for smart environments 169–186. https://doi.org/10.1007/978-3-319-05029-4_7
Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 Workshop on Mobile Big Data, pp. 37–42. https://doi.org/10.1145/2757384.2757397
Guo Y, Zhang Z, Guo Y (2020) Fog-centric authenticated key agreement scheme without trusted parties. IEEE Syst J 15(4):5057–5066. https://doi.org/10.1109/JSYST.2020.3022244
Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems 91:475–492. https://doi.org/10.1016/j.future.2018.09.017
Sicari S, Rizzardi A, Coen-Porisini A (2022) Insights into security and privacy towards fog computing evolution. Computers & Security 102822. https://doi.org/10.1016/j.cose.2022.102822
Hazra A, Rana P, Adhikari M, Amgoth T (2023) Fog computing for next-generation internet of things: fundamental, state-of-the-art and research challenges. Computer Science Review 48:100549. https://doi.org/10.1016/j.cosrev.2023.100549
Peng L, Dhaini AR, Ho PH (2018) Toward integrated cloud–fog networks for efficient iot provisioning: Key challenges and solutions. Future Generation Computer Systems 88:606–613. https://doi.org/10.1016/j.future.2018.05.015
Saharan K, Kumar A (2015) Fog in comparison to cloud: A survey. International Journal of Computer Applications 122(3). https://doi.org/10.5120/21679-4773
Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for internet of things applications: Challenges and solutions. IEEE Communications Surveys & Tutorials 20(1):601–628. https://doi.org/10.1109/COMST.2017.2762345
Ibrahim MH (2016) Octopus: An edge-fog mutual authentication scheme. Int. J. Netw. Secur. 18:1089–1101
Wazid, M., Das, A.K., Shetty, S., JPC Rodrigues, J., Park, Y.: Ldakm-eiot: Lightweight device authentication and key management mechanism for edge-based iot deployment. Sensors 19(24), 5539 (2019) 10.3390/s19245539
Gope, P.: Laap: Lightweight anonymous authentication protocol for d2d-aided fog computing paradigm. computers & security 86, 223–237 (2019) 10.1016/j.cose.2019.06.003
Amin, R., Kunal, S., Saha, A., Das, D., Alamri, A.: Cfsec: Password based secure communication protocol in cloud-fog environment. Journal of Parallel and Distributed Computing 140, 52–62 (2020) 10.1016/j.jpdc.2020.02.005
Verma, U., Bhardwaj, D.: Design of lightweight authentication protocol for fog enabled internet of things - a centralized authentication framework. International Journal of Communication Networks and Information Security (IJCNIS) 12(2), (2022) 10.17762/ijcnis.v12i2.4464
Kalaria, R., Kayes, A., Rahayu, W., Pardede, E.: A secure mutual authentication approach to fog computing environment. computers & security 111, 102483 (2021) 10.1016/j.cose.2021.102483
Loffi, L., Westphall, C.M., Grüdtner, L.D., Westphall, C.B.: Mutual authentication with multi-factor in iot-fog-cloud environment. Journal of Network and Computer Applications 176, 102932 (2021) 10.1016/j.jnca.2020.102932
Lin, Y., Wang, X., Gan, Q., Yao, M.: A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing. Journal of Information Security and Applications 63, 103022 (2021) 10.1016/j.jisa.2021.103022
Chatterjee U, Ray S, Khan MK, Dasgupta M, Chen C-M (2022) An ecc-based lightweight remote user authentication and key management scheme for iot communication in context of fog computing. Computing 104(6):1359–1395. https://doi.org/10.1007/s00607-022-01055-8
Guo, Y., Guo, Y.: Fogha: An efficient handover authentication for mobile devices in fog computing. Computers & Security 108, 102358 (2021) 10.1016/j.cose.2021.102358
Roy KS, Deb S, Kalita HK (2022) A novel hybrid authentication protocol utilizing lattice-based cryptography for iot devices in fog networks. Digital Communications and Networks. https://doi.org/10.1016/j.dcan.2022.12.003
Wang W, Huang H, Xiao F, Li Q, Xue L, Jiang J (2021) Computation-transferable authenticated key agreement protocol for smart healthcare. J Syst Architect 118:102215. https://doi.org/10.1016/j.sysarc.2021.102215
Ma Y, Ma Y, Liu Y, Cheng Q (2023) A secure and efficient certificateless authenticated key agreement protocol for smart healthcare, vol. 86, p. 103735. Elsevier. https://doi.org/10.1016/j.csi.2023.103735
Amanlou S, Hasan MK, Bakar KAA (2021) Lightweight and secure authentication scheme for iot network based on publish-subscribe fog computing model. Comput Netw 199:108465. https://doi.org/10.1016/j.comnet.2021.108465
Ma M, He D, Wang H, Kumar N, Choo KKR (2019) An efficient and provably-secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet of Things Journal PP, 1–1. https://doi.org/10.1109/JIOT.2019.2902840
Eftekhari SA, Nikooghadam M, Rafighi M (2021) Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications. Vehicular Communications 28:100306. https://doi.org/10.1016/j.vehcom.2020.100306
Hamada M, Salem SA, Salem FM (2022) Lamas: Lightweight anonymous mutual authentication scheme for securing fog computing environments. Ain Shams Engineering Journal 13(6):101752
Liu S, Chen L, Han J, Yu J, Li X (2022) Lightweight id-based broadcast signcryption for cloud-fog-assisted iot. J Syst Architect 130:102648. https://doi.org/10.1016/j.sysarc.2022.102648
Mahmood K, Ayub MF, Hassan SZ, Ghaffar Z, Lv Z, Chaudhry SA (2022) A seamless anonymous authentication protocol for mobile edge computing infrastructure. Comput Commun 186:12–21. https://doi.org/10.1016/j.comcom.2022.01.005
Chaudhry S, Naqvi H, Mahmood K, Ahmad H, Khan K (2017) An improved remote user authentication scheme using elliptic curve cryptography. Wireless Pers Commun 90:1–19. https://doi.org/10.1007/s11277-016-3745-3
Lohachab A (2019) Karambir: Ecc based inter-device authentication and authorization scheme using mqtt for iot networks. Journal of Information Security and Applications 46:1–12. https://doi.org/10.1016/j.jisa.2019.02.005
Guo J, Du Y, Zhang Y, Li M (2021) A provably secure ecc-based access and handover authentication protocol for space information networks. J Netw Comput Appl 193:103183. https://doi.org/10.1016/j.jnca.2021.103183
Eddine MS, Ferrag MA, Friha O, Maglaras L (2021) Easbf: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles. Journal of Information Security and Applications 59:102802. https://doi.org/10.1016/j.jisa.2021.102802
Kamil IA, Ogundoyin SO (2021) A lightweight mutual authentication and key agreement protocol for remote surgery application in tactile internet environment. Comput Commun 170:1–18. https://doi.org/10.1016/j.comcom.2021.01.025
Solutions CFC (2015) Unleash the power of the internet of things. Cisco Systems Inc
Zhang P, Zhou M, Fortino G (2018) Security and trust issues in fog computing: A survey. Futur Gener Comput Syst 88. https://doi.org/10.1016/j.future.2018.05.008
Rathi S, Nagpal R, Mehrotra D, Srivastava G (2022) A metric focused performance assessment of fog computing environments: A critical review. Comput Electr Eng 103:108350. https://doi.org/10.1016/j.compeleceng.2022.108350
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208. https://doi.org/10.1109/TIT.1983.1056650
Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. In: Advances in Cryptology—EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques Amsterdam, The Netherlands, April 28–May 2, 2002 Proceedings 21, pp. 337–351. Springer. https://doi.org/10.1007/3-540-46035-7_22
Guo Y, Zhang Z, Guo Y (2022) Secfhome: Secure remote authentication in fog-enabled smart home environment. Comput Netw 207:108818. https://doi.org/10.1016/j.comnet.2022.108818
Cui J, Cheng F, Zhong H, Zhang Q, Gu C, Liu L (2023) Multi-factor based session secret key agreement for the industrial internet of things. Ad Hoc Netw 138:102997. https://doi.org/10.1016/j.adhoc.2022.102997
Wazid M, Das AK, Hussain R, Succi G, Rodrigues J (2018) Authentication in cloud-driven iot-based big data environment: Survey and outlook. J Syst Architect 97. https://doi.org/10.1016/j.sysarc.2018.12.005
Wu L, Wang J, Choo KKR, He D (2018) Secure key agreement and key protection for mobile device user authentication. IEEE Transactions on Information Forensics and Security PP, 1–1. https://doi.org/10.1109/TIFS.2018.2850299
Indushree M, Raj M, Mishra VK, Shashidhara R, Das AK, Bhat V (2022) Mobile-chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks. Comput Commun 200. https://doi.org/10.1016/j.comcom.2022.12.026
Gupta BB, Quamara M (2018) An identity based access control and mutual authentication framework for distributed cloud computing services in iot environment using smart cards. Procedia Computer Science 132:189–197. https://doi.org/10.1016/j.procs.2018.05.185 . International Conference on Computational Intelligence and Data Science
Lohachab A (2018) Using quantum key distribution and ecc for secure inter-device authentication and communication in iot infrastructure. SSRN Electron J. https://doi.org/10.2139/ssrn.3166511
Blanchet B (2014) Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif
Nyangaresi VO (2022) Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography. J Syst Architect 133:102763. https://doi.org/10.1016/j.sysarc.2022.102763
Sureshkumar V, Amin R, Vijaykumar V, Sekar SR (2019) Robust secure communication protocol for smart healthcare system with fpga implementation. Futur Gener Comput Syst 100:938–951. https://doi.org/10.1016/j.future.2019.05.058
Shukla S, Thakur S, Hussain S, Breslin JG, Jameel SM (2021) Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model. Internet of Things 15:100422. https://doi.org/10.1016/j.iot.2021.100422
Funding
This is not applicable.
Author information
Authors and Affiliations
Contributions
Swati Priyambada Satpathy: Conceptualization, Methodology, Formal analysis, Writing - original draft, Visualization. Sujata Mohanty: Supervision, Validation, Reviewing & Editing. Manabhanjan Pradhan: Validation, Reviewing.
Corresponding author
Ethics declarations
Ethics Approval
This paper contains no studies with human participants or animals performed by authors.
Consent to publish
All authors have approved this manuscript for publication.
Competing Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Satpathy, S.P., Mohanty, S. & Pradhan, M. A sustainable mutual authentication protocol for IoT-Fog-Cloud environment. Peer-to-Peer Netw. Appl. 18, 35 (2025). https://doi.org/10.1007/s12083-024-01843-3
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12083-024-01843-3