Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions

Prosanta Gope, Jemin Lee, Ruei Hau Hsu, Tony Q.S. Quek

Research output: Contribution to specialist publicationArticle

9 Citations (Scopus)

Abstract

In this article, we introduce the concept of device-to-device (D2D) communication-aided fog computing, which enables devices proximate to one other help each other obtain faster authentication without involving any centralized server. We also propose a novel security architecture for D2D-aided fog computing. Finally, we introduce three anonymous authentication protocols for dealing with three communication scenarios. These protocols use the lightweight cryptographic primitives (e.g., one-way hash function and exclusive-or operations) to support even resource-limited Internet of Things (IoT) devices.

Original languageEnglish
Pages10-16
Number of pages7
Volume8
No.3
Specialist publicationIEEE Consumer Electronics Magazine
DOIs
Publication statusPublished - 2019 May

All Science Journal Classification (ASJC) codes

  • Human-Computer Interaction
  • Hardware and Architecture
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions'. Together they form a unique fingerprint.

Cite this