In this article, we introduce the concept of device-to-device (D2D) communication-aided fog computing, which enables devices proximate to one other help each other obtain faster authentication without involving any centralized server. We also propose a novel security architecture for D2D-aided fog computing. Finally, we introduce three anonymous authentication protocols for dealing with three communication scenarios. These protocols use the lightweight cryptographic primitives (e.g., one-way hash function and exclusive-or operations) to support even resource-limited Internet of Things (IoT) devices.
All Science Journal Classification (ASJC) codes
- Human-Computer Interaction
- Hardware and Architecture
- Computer Science Applications
- Electrical and Electronic Engineering