eCite Digital Repository

FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain

Citation

Patwary, AA-N and Fu, A and Battula, SK and Naha, RK and Garg, S and Mahanti, A, FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain, Computer Communications, 162 pp. 212-224. ISSN 0140-3664 (2020) [Refereed Article]

Copyright Statement

Copyright 2020 Elsevier B.V.

DOI: doi:10.1016/j.comcom.2020.08.021

Abstract

Fog computing is an emerging computing paradigm which expands cloud-based computing services near the network edge. With this new computing paradigm, new challenges arise in terms of security and privacy. These concerns are due to the distributed ownership of Fog devices. Because of the large scale distributed nature of devices at the Fog layer, secure authentication for communication among these devices is a major challenge. The traditional authentication methods (password-based, certificate-based and biometric-based) are not directly applicable due to the unique architecture and characteristics of the Fog. Moreover, the traditional authentication methods consume significantly more computation power and incur high latency, and this does not meet the key requirements of the Fog. To fill this gap, this article proposes a secure decentralised location-based device to device (D2D) authentication model in which Fog devices can mutually authenticate each other at the Fog layer by using Blockchain. We considered an Ethereum Blockchain platform for the Fog device registration, authentication, attestation and data storage. We presented the overall system architecture, various participants and their transactions and message interaction between the participants. We validated the proposed model by comparing it with the existing method; results showed that the proposed authentication mechanism was efficient and secure. From the performance evaluation, it was found that the proposed method is computationally efficient and secure in a highly distributed Fog network.

Item Details

Item Type:Refereed Article
Keywords:fog computing, security and privacy, authentication, device-to-device communication, blockchain, digital identity, location management
Research Division:Information and Computing Sciences
Research Group:Distributed computing and systems software
Research Field:Distributed systems and algorithms
Objective Division:Information and Communication Services
Objective Group:Information systems, technologies and services
Objective Field:Computer systems
UTAS Author:Battula, SK (Mr Sudheer Kumar Battula)
UTAS Author:Naha, RK (Mr Ranesh Kumar Naha)
UTAS Author:Garg, S (Dr Saurabh Garg)
ID Code:142776
Year Published:2020
Web of Science® Times Cited:23
Deposited By:Information and Communication Technology
Deposited On:2021-02-11
Last Modified:2021-05-31
Downloads:0

Repository Staff Only: item control page