Abstract: In the Cloud-Fog architecture, a secure communication scheme will be necessary between fog clients and dynamic fog servers.
We propose a fog client-fog server secure communication in which fog client and fog server establish a session key without exchanging extra-parameters. Our ...
A fog client-fog server secure communication in which fog client and fog server establish a session key without exchanging extra-parameters is proposed.
People also ask
What is fog communication?
How does security fog work?
In [20] , authors describe a Secure Fog-based Communication Scheme (SFCS) to ensure trust between edge devices and fog devices via a novel session key agreement ...
A solution that guarantees confidentiality of messages exchanged through semi-honest fog nodes thanks to a lightweight proxy re-encryption scheme.
We design and implement an original symmetric proxy re-encryption scheme that is applicable to low-power microcontrollers characterizing many connected devices.
The main objective of this article is to introduce hierarchical fog computing-based architecture for smart energy-supplying systems as a part of Industry 5.0.
A secure fog-based IIoT architecture is proposed by suitably plugging a number of security features into it and by offloading some of the tasks judiciously ...
We put forward a security-enhanced three-party pairwise shared key agreement protocol for fog-based vehicular communications with 23.65% improvement in ...
Fog computing improves the resiliency of IoT, but its security model assumes that fog nodes are fully trusted. We relax this latter constraint by proposing a ...