메뉴 건너뛰기




Volumn 18, Issue 6, 2016, Pages 1089-1101

Octopus: An edge-fog mutual authentication scheme

Author keywords

Cloud computing; Edge layer; Fog layer; Mutual authentication; Rogue nodes; Smart cards

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; FOG; NETWORK ARCHITECTURE; PUBLIC KEY CRYPTOGRAPHY; SMART CARDS; TRANSPORTATION;

EID: 84991768903     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (161)

References (42)
  • 9
    • 79951676054 scopus 로고    scopus 로고
    • Privacy-preserving universal authentication protocol for wireless communications
    • D. He, J. Bu, S. Chan, C. Chen and M. Yin, "Privacy-preserving universal authentication protocol for wireless communications," IEEE Transactions on Wireless Communications, vol. 10, no. 2, pp. 431-436, 2011
    • (2011) IEEE Transactions on Wireless Communications , vol.10 , Issue.2 , pp. 431-436
    • He, D.1    Bu, J.2    Chan, S.3    Chen, C.4    Yin, M.5
  • 10
    • 84881388540 scopus 로고    scopus 로고
    • Strong roaming authentication technique for wireless and mobile networks
    • D. He, C. Chen, S. Chan and J. Bu, "Strong roaming authentication technique for wireless and mobile networks," International Journal of Communication Systems, vol. 26, no. 8, pp. 1028-1037, 2013
    • (2013) International Journal of Communication Systems , vol.26 , Issue.8 , pp. 1028-1037
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 11
    • 67349219359 scopus 로고    scopus 로고
    • Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
    • Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung and J. H. Park, "Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 400-411, 2009
    • (2009) IEEE Journal on Selected Areas in Communications , vol.27 , Issue.4 , pp. 400-411
    • Huang, Y.M.1    Hsieh, M.Y.2    Chao, H.C.3    Hung, S.H.4    Park, J.H.5
  • 12
    • 84991775226 scopus 로고    scopus 로고
    • AATCT: Anonymously authenticated transmission on the cloud with traceability
    • M. H. Ibrahim, "AATCT: Anonymously authenticated transmission on the cloud with traceability," International Journal of Advanced Computer Science & Applications, vol. 6, no. 9, pp. 251-259, 2015
    • (2015) International Journal of Advanced Computer Science & Applications , vol.6 , Issue.9 , pp. 251-259
    • Ibrahim, M.H.1
  • 13
    • 77953042205 scopus 로고    scopus 로고
    • Resisting traitors in linkable democratic group signatures
    • M. H. Ibrahim, "Resisting traitors in linkable democratic group signatures," International Journal of Network Security, vol. 9, no. 1, pp. 51-60, 2009
    • (2009) International Journal of Network Security , vol.9 , Issue.1 , pp. 51-60
    • Ibrahim, M.H.1
  • 14
    • 84991775214 scopus 로고    scopus 로고
    • 'Noninteractive, anonymously authenticated, and traceable message transmission for VANETs,'
    • M. H. Ibrahim, "Noninteractive, anonymously authenticated, and traceable message transmission for VANETs," International Journal of Vehicular Technology, 2009
    • (2009) International Journal of Vehicular Technology
    • Ibrahim, M.H.1
  • 15
    • 84991757910 scopus 로고    scopus 로고
    • 'Secure anonymously authenticated and traceable enterprise DRM system,'
    • September
    • M. H. Ibrahim, "Secure anonymously authenticated and traceable enterprise DRM system," International Journal of Computer Applications, vol. 126, no. 3, September 2015
    • (2015) International Journal of Computer Applications , vol.126 , Issue.3
    • Ibrahim, M.H.1
  • 16
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • A. Jøsang, R. Ismail and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 17
    • 84875286190 scopus 로고    scopus 로고
    • An enhanced remote user authentication scheme with smart card
    • M. Kumar, "An enhanced remote user authentication scheme with smart card," International Journal of Network Security, vol. 10, no. 3, pp. 175-184, 2010
    • (2010) International Journal of Network Security , vol.10 , Issue.3 , pp. 175-184
    • Kumar, M.1
  • 18
    • 77958081838 scopus 로고    scopus 로고
    • A new secure remote user authentication scheme with smart cards
    • M. Kumar, "A new secure remote user authentication scheme with smart cards," International Journal of Network Security, vol. 11, no. 2, pp. 88-93, 2010
    • (2010) International Journal of Network Security , vol.11 , Issue.2 , pp. 88-93
    • Kumar, M.1
  • 19
    • 84875095444 scopus 로고    scopus 로고
    • Guessing attacks on strong-password authentication protocol
    • C. C. Lee, C. H. Liu and M. S. Hwang, "Guessing attacks on strong-password authentication protocol," International Journal of Network Security, vol. 15, no. 1, pp. 64-67, 2013
    • (2013) International Journal of Network Security , vol.15 , Issue.1 , pp. 64-67
    • Lee, C.C.1    Liu, C.H.2    Hwang, M.S.3
  • 20
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • M. Li, W. Lou and K. Ren, "Data security and privacy in wireless body area networks," IEEE Wireless Communications, vol. 17, no. 1, pp. 51-58, 2010
    • (2010) IEEE Wireless Communications , vol.17 , Issue.1 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 21
    • 84937436587 scopus 로고    scopus 로고
    • Efficient authenticated key exchange protocols for wireless body area networks
    • J. Liu, Q. Li, R. Yan and R. Sun, "Efficient authenticated key exchange protocols for wireless body area networks," EURASIP Journal on Wireless Communications and Networking, vol. 2015, no. 1, pp. 1-11, 2015
    • (2015) EURASIP Journal on Wireless Communications and Networking , vol.2015 , Issue.1 , pp. 1-11
    • Liu, J.1    Li, Q.2    Yan, R.3    Sun, R.4
  • 23
    • 79953785474 scopus 로고    scopus 로고
    • Grs: The green, reliability, and security of emerging machine to machine communications
    • R. Lu, X. Li, X. Liang, X. S. Shen and X. Lin, "Grs: The green, reliability, and security of emerging machine to machine communications," IEEE Communications Magazine, vol. 49, no. 4, pp. 28-35, 2011
    • (2011) IEEE Communications Magazine , vol.49 , Issue.4 , pp. 28-35
    • Lu, R.1    Li, X.2    Liang, X.3    Shen, X.S.4    Lin, X.5
  • 25
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, vol. 21, no. 12, pp. 993-999, 1978
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 27
    • 84991794644 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publication
    • National Institute of Standards and Technology (NIST), "Fips 180-4, secure hash standard," Federal Information Processing Standards Publication
    • 'Fips 180-4, secure hash standard,'
  • 29
    • 77951758784 scopus 로고    scopus 로고
    • Authentication and key establishment in dynamic wireless sensor networks
    • Y. Qiu, J. Zhou, J. Baek and J. Lopez, "Authentication and key establishment in dynamic wireless sensor networks," Sensors, vol. 10, no. 4, pp. 3718-3731, 2010
    • (2010) Sensors , vol.10 , Issue.4 , pp. 3718-3731
    • Qiu, Y.1    Zhou, J.2    Baek, J.3    Lopez, J.4
  • 32
    • 84871395060 scopus 로고    scopus 로고
    • 'Efficient noninteractive secure protocol enforcing privacy in vehicle-to-roadside communication networks,'
    • F. M. Salem, M. H. Ibrahim and I. I. Ibrahim, "Efficient noninteractive secure protocol enforcing privacy in vehicle-to-roadside communication networks," International Journal of Vehicular Technology, vol. 2012, 2012
    • (2012) International Journal of Vehicular Technology , vol.2012
    • Salem, F.M.1    Ibrahim, M.H.2    Ibrahim, I.I.3
  • 34
    • 78651063942 scopus 로고    scopus 로고
    • Efficient nonce-based authentication scheme for session initiation protocol
    • J. L. Tsai, "Efficient nonce-based authentication scheme for session initiation protocol," International Journal of Network Security, vol. 9, no. 1, pp. 12-16, 2009
    • (2009) International Journal of Network Security , vol.9 , Issue.1 , pp. 12-16
    • Tsai, J.L.1
  • 35
    • 84886436167 scopus 로고    scopus 로고
    • Real-time intrusion detection in power system operations
    • J. Valenzuela, J. Wang and N. Bissinger, "Real-time intrusion detection in power system operations," IEEE Transactions on Power Systems, vol. 28, no. 2, pp. 1052-1062, 2013
    • (2013) IEEE Transactions on Power Systems , vol.28 , Issue.2 , pp. 1052-1062
    • Valenzuela, J.1    Wang, J.2    Bissinger, N.3
  • 36
    • 56749160373 scopus 로고    scopus 로고
    • A secure privacypreserving roaming protocol based on hierarchical identity-based encryption for mobile networks
    • Z. Wan, K. Ren and B. Preneel, "A secure privacypreserving roaming protocol based on hierarchical identity-based encryption for mobile networks," in Proceedings of the First ACM conference on Wireless Network Security, pp. 62-67, 2008
    • (2008) Proceedings of the First ACM conference on Wireless Network Security , pp. 62-67
    • Wan, Z.1    Ren, K.2    Preneel, B.3
  • 37
    • 84903885385 scopus 로고    scopus 로고
    • A regular expression matching approach to distributed wireless network security system
    • J. Wang, Y. Yanshuo and K. Zhou, "A regular expression matching approach to distributed wireless network security system," International Journal of Network Security, vol. 16, no. 5, pp. 382-388, 2014
    • (2014) International Journal of Network Security , vol.16 , Issue.5 , pp. 382-388
    • Wang, J.1    Yanshuo, Y.2    Zhou, K.3
  • 38
    • 84875747087 scopus 로고    scopus 로고
    • 'Survey cyber security in the smart grid: Survey and challenges,'
    • April
    • W. Wang and Z. Lu, "Survey cyber security in the smart grid: Survey and challenges," Computer Networks, vol. 57, pp. 1344-1371, April 2013
    • (2013) Computer Networks , vol.57 , pp. 1344-1371
    • Wang, W.1    Lu, Z.2
  • 40
    • 84991821286 scopus 로고    scopus 로고
    • Composable secure roaming authentication protocol for cloud-assisted body sensor networks
    • Q. Q. Xie, S. R. Jiang, L. M. Wang and C. C. Chang, "Composable secure roaming authentication protocol for cloud-assisted body sensor networks," International Journal of Network Security, vol. 18, no. 5, pp. 816-831, 2016
    • (2016) International Journal of Network Security , vol.18 , Issue.5 , pp. 816-831
    • Xie, Q.Q.1    Jiang, S.R.2    Wang, L.M.3    Chang, C.C.4
  • 41
    • 74549210063 scopus 로고    scopus 로고
    • Universal authentication protocols for anonymous wireless communications
    • G. Yang, Q. Huang, D. S. Wong and X. Deng, "Universal authentication protocols for anonymous wireless communications," IEEE Transactions on Wireless Communications, vol. 9, no. 1, pp. 168-174, 2010
    • (2010) IEEE Transactions on Wireless Communications , vol.9 , Issue.1 , pp. 168-174
    • Yang, G.1    Huang, Q.2    Wong, D.S.3    Deng, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.