Secure and privacy-preserving D2D communication in fog computing services

被引:11
|
作者
Ogundoyin, Sunday Oyinlola [1 ]
Kamil, Ismaila Adeniyi [1 ]
机构
[1] Univ Ibadan, Dept Elect & Elect Engn, Secur Privacy Commun SPCOM Res Grp, Ibadan, Nigeria
关键词
Fog-to-fog; Fog colony; Authentication; Fog computing; Multi-colony; Fog collaboration; CERTIFICATELESS SIGNCRYPTION SCHEME; USER AUTHENTICATION SCHEME; SMART HEALTH; EFFICIENT; PROTOCOL; INTERNET; ENERGY; SYSTEM;
D O I
10.1016/j.comnet.2022.108942
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D)-aided fog network has proven to be a viable means to improve the performance of fog computing technology. To exploit the full potentials of the D2D-supported fog computing architecture, it is imperative to protect the information transmitted among collaborating fog nodes against unauthorized access as failure to do so may have catastrophic consequences. However, this critical issue has not been investigated in most of the existing works. Therefore, this paper proposes a secure and privacy-aware trust based communication strategy for fog-to-fog collaborative services. An elliptic curve cryptography (ECC)-based two-party authentication and key agreement protocol is designed to allow two collaborating fog nodes generate a unique shared secret session key. A multi-colony head selection strategy is proposed using a multi-criteria decision-making method (MCDM), where multiple fog nodes are selected as colony head. A new efficient group key distribution and updating mechanism is designed for ensuring secured group communication. Consequently, ECC-based message dissemination approaches are designed for intra-and inter-colony trustworthy communications, where the generated secret session and group keys are used for data encryption. Moreover, we demonstrate that the proposed scheme guarantees data confidentiality and unforgeability against both Type I and Type II adversaries in the random oracle model (ROM) based on the intractability of the Computational Diffie-Hellman Problem (CDHP) and Discrete Logarithm Problem (DLP), respectively. An extensive performance analysis shows that the proposed scheme is very efficient and suitable for practical deployment. Comparative analysis reveals that the proposed scheme reports an improvement of about 33.15%-93.88%, 18.87%-67.91% , and 38.5%-93.8% in computation cost, communication overhead, and energy consumption, respectively, over the state-of-the-art related schemes.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] An Efficient and Fault-Tolerant Privacy-Preserving D2D Group Communication
    Chien, Hung-Yu
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (07): : 1517 - 1530
  • [2] Privacy-preserving D2D Cooperative Location Verification
    Liu, Shushu
    Yan, Zheng
    Kantola, Raimo
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [3] Privacy-Preserving Fog Computing Paradigm
    Abubaker, Nabil
    Dervishi, Leonard
    Ayday, Erman
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 502 - 509
  • [4] Secure and privacy-preserving orchestration and delivery of fog-enabled IoT services
    Viejo, Alexandre
    Sanchez, David
    AD HOC NETWORKS, 2019, 82 : 113 - 125
  • [5] Reliable Customized Privacy-Preserving in Fog Computing
    Wang, Xiaodong
    Gu, Bruce
    Qu, Youyang
    Ren, Yongli
    Xiang, Yong
    Gao, Longxiang
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [6] Privacy-Preserving and Trustworthy Device-to-Device (D2D) Offloading Scheme
    Baek, Hosung
    Ko, Haneul
    Pack, Sangheon
    IEEE ACCESS, 2020, 8 (08): : 191551 - 191560
  • [7] Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications
    Wang, Mingjun
    Yan, Zheng
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3637 - 3647
  • [8] Privacy-Preserving Federated Learning in Fog Computing
    Zhou, Chunyi
    Fu, Anmin
    Yu, Shui
    Yang, Wei
    Wang, Huaqun
    Zhang, Yuqing
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11): : 10782 - 10793
  • [9] Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
    Tian, Hui
    Nan, Fulin
    Chang, Chin-Chen
    Huang, Yongfeng
    Lu, Jing
    Du, Yongqian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 127 : 59 - 69
  • [10] A Secure Privacy-Preserving Mutual Authentication Scheme for Publish-Subscribe Fog Computing
    Salem, Fatty M.
    2018 14TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2018, : 213 - 218