z-logo
open-access-imgOpen Access
Man in the Middle Attack Prevention for Edge-Fog, Mutual Authentication Scheme
Author(s) -
G. M. Shafiqur Rahman,
Chuah Chai
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.b1009.0782s219
Subject(s) - mutual authentication , computer science , scheme (mathematics) , fog computing , message authentication code , cloud computing , computer security , man in the middle attack , authentication (law) , enhanced data rates for gsm evolution , edge computing , low latency (capital markets) , computer network , cryptography , operating system , telecommunications , mathematical analysis , mathematics
Fog computing is considered emerging technology nowadays. Due to proximity to the end user, fog computing provides a reliable transmission with low latency. In this paper, we have proposed an improved mutual authentication security scheme based on advanced encryption standard AES and hashed message authentication code HMAC in fog computing. Our scheme provides mutual authentication between edge devices and fog server in edge fog cloud computing environment. Further, the scheme has the resistance to man in the middle attack in the fog computing environment. Detailed security analyses are summarized.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here