Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks
Abstract
:1. Introduction
- Analyzing the security requirements and constraints of the edge–fog–cloud environment, considering factors such as resource limitations, network latency, and potential attacks during first authentication and handover scenarios. A detailed analysis is given in Section 2.2.
- Based on this analysis, lightweight cryptographic techniques and protocols are designed and developed to enable secure and efficient authentication. The protocol design is explained in Section 3.
- The designed protocol is further integrated to support handover authentication, enabling the mobility characteristic of fog computing and minimizing authentication delays. The handover protocol design is presented in Section 4.
- The designed protocols are evaluated through simulations to assess their security, performance, and scalability in edge–fog–cloud scenarios. The detailed evaluation is presented in Section 5.
2. Background and Related Work
2.1. Background
- Fog computing involves processing and storing data at the edge devices, which increases the risk of unauthorized access and data breaches. Since these devices may not have robust security mechanisms, sensitive data could be exposed to potential attackers [20].
- Fog computing has limited physical resources, including processing power and memory. This limitation makes it challenging to implement strong security measures, leaving resources more vulnerable to attacks [10].
- The heterogeneous nature of fog computing resources and the interoperability of resources can lead to cyber-attackers exploiting the resources, gaining unauthorized access, and disrupting services [14].
- Fog computing involves data processing and storage at the edge, which opens up opportunities for data tampering and integrity breaches.
- Data integrity in a decentralized environment becomes a significant concern [21].
- User equipment (UE): The mobile devices used by end-users, such as smartphones, tablets, and IoT devices.
- Radio access network (RAN): The RAN connects UEs to the core network. It includes the base stations, antennas, and other radio equipment.
- Core network (CN): The core network handles data processing, authentication, and service delivery. It is a virtualized network that can be optimized for different use cases.
- Network slicing: 5G supports network slicing, allowing the creation of multiple virtual networks with specific performance characteristics to cater to different types of services.
- Authentication and Key Agreement (AKA) [31]: AKA is a challenge–response-based protocol used during the initial connection setup between the UE and the 5G core network. It ensures that only legitimate UEs are granted access to the network.
- Extensible Authentication Protocol (EAP) [32]: EAP is an authentication framework that supports multiple authentication methods. It uses various authentication mechanisms based on the user’s and network’s specific needs.
- Transport Layer Security (TLS) [33]: TLS is a cryptographic protocol that secures data transmission between the UE and network elements. It ensures privacy and integrity during communication.
- Secure Authentication Vector (AV) [31]: This protocol generates authentication vectors used by the AKA protocol for mutual authentication between the UE and the network.
- Subscription Concealed Identifier (SUCI) [31]: The SUCI protects the user’s permanent identity by concealing it behind temporary identifiers during authentication procedures.
2.2. Related Work
3. The Proposed 3-Tier-AKA Model
3.1. Environment Characteristics
- Set of D mobile edge devices represented as , where .
- Mobility: Edge devices can move from one place to another [48].
- Interoperability: Edge devices may depend on their operation with other heterogeneous devices and service architectures. The edge tier exhibits heterogeneity due to variations in device architectures, communication, and network configurations [48].
- Set of Z fog nodes, represented as , where .
- Low latency and real-time interactions: Fog nodes close to the network edge collect, process, and store sensor and device data. This enables low latency and meets the needs of real-time interactions, particularly for latency-sensitive applications [14].
- Heterogeneity [14]: Fog nodes are available in various forms and can be deployed as physical or virtual nodes in diverse environments. They encompass high-performance servers, edge routers, gateways, access points, base stations, and more. These hardware platforms exhibit distinct computation and storage capabilities, run various operating systems (OSs), and support different software applications [14].
- Interoperability: Fog nodes are geographically distributed and interoperate in executing tasks to achieve the required quality of service. This includes interoperation among multiple fog nodes and devices with cloud computing [14].
- Set of C cloud data centers, represented as , where .
- Service-oriented: Cloud computing services are categorized into infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Users can utilize these services without owning hardware or knowing data locations. Examples include cloud storage, Google App Engine, and online gaming [49].
- On-demand self-service: Consumers can provision computing resources (such as virtual machines, storage, and applications) as needed without requiring human intervention from the service provider [50].
- Broad network access: Cloud resources are accessible over the network and can be accessed by various devices with Internet connectivity, such as laptops, smartphones, and tablets [50].
- Resource pooling: Cloud providers use multi-tenant models to pool and share resources among multiple users, with resources dynamically allocated based on demand. Users typically do not have control over the physical location of the resources [50].
- Rapid elasticity: Cloud resources can be scaled up or down quickly to accommodate changes in demand. This elasticity allows users to access additional resources during peak periods and release them when no longer needed [50].
- Measured service: Cloud systems automatically monitor and track resource usage, enabling users to be billed based on their consumption.
- The 5G network backhaul establishes a connection between fog nodes and the cloud data center. To ensure communication, a temporary secret key is assigned for the cloud’s initial entry into the environment.
- Each edge device and fog node has an Electronic Subscriber Identity Module (eSIM) and a temporary secret key S stored in the eSIM.
- After the registration phase, the entity (i.e., edge device, fog node, or cloud server) receives a secret key K and a token O, which are generated by the 5G service provider .
3.2. Authentication within the Edge–Fog–Cloud Environment
- Data security: Data are processed and stored across various tiers, from edge devices to fog nodes and cloud servers. Authentication ensures that only authorized entities can access and manipulate sensitive data, reducing the risk of unauthorized data breaches or leaks [51].
- Resource access control: Different architecture tiers have varying levels of resources and capabilities. Authentication helps control access to these resources based on user roles, permissions, and the specific needs of applications, ensuring optimal resource utilization [51].
- Seamless handovers: Devices moving between different tiers, such as from edge to fog or fog to cloud, require smooth handovers without interrupting services. Authentication enables seamless handovers by ensuring the device is authenticated in the environment before communication [52].
- Dynamic mobility: Devices in this environment can be mobile, moving across different fog nodes. Authentication mechanisms are needed to handle dynamic mobility patterns without disrupting services [53].
- Latency and real-time requirements: Applications in fog–edge environments have stringent latency requirements. Authentication mechanisms must be fast and efficient to avoid introducing unacceptable delays [54].
- Adversarial threats: Distributed systems are susceptible to various threats, including man-in-the-middle attacks and impersonation. Authentication mechanisms need to counteract these threats effectively [51].
- Authentication overhead: Introducing authentication processes can lead to communication overhead. Balancing the need for security with the performance impact of authentication is a challenge [43].
4. The Proposed 3-Tier AKA Mutual Authentication and Key Agreement (AKA) Protocol
- Initialization: Responsible for generating the temporary secret key and master key.
- Registration: Identifies edge devices, fog nodes, and cloud data centers within the 3-tier architecture.
- Authentication and Key Agreement: Ensures the verification process between edge devices, fog nodes, and cloud data centers, and facilitates the creation and distribution of session keys for secure communication.
- Handover verification: Focuses on validating the edge user and the new fog node during the handover process. This phase ensures seamless and secure transitions during handovers.
4.1. Initialization Phase
4.2. Registration Phase
- Step 1:
- The edge device starts the session by sending a hello message, including the device’s ID, i.e., ID, to register with the 5G service provider , as shown in line 1 of Figure 4.
- Step 2:
- The 5G service provider receives the hello message, generates a secret key and computes a security token . This token is the encryption (using AES) of the device ID along with the generated secret key using the master key of the service provider , denoted by , as shown in line 2 in Figure 4. In line 3, computes a response message , to send the generated secret key and the token to the edge device, where is the temporary secret key of the edge device.
- Step 3:
- The edge device receives the response message from the 5G service provider . decrypts the to retrieve and store the secret key and the token , using its temporary secret key as follows: . Then, in line 4 in Figure 4, the edge device forgets the temporary secret key to prevent future replay attacks, and the 5G service provider forgets the temporary and generated device secret keys to keep the protocol stateless as much as possible and to prevent denial-of-service attacks.
4.3. Authentication and Key Agreement Phase (Edge Device and Fog Node Authentication Protocol)
- Step 1:
- The edge device computes a self-authentication message , which is the encryption of the current timestamp T along with a string literal “” using the edge secret key , ”, . The timestamp ensures the refresh of the message and prevents the replay attacks, whereas the string literal requests from the 5G service provider that the edge device would like to communicate with the fog node . Then, transmits and the security token to 5G service provider . See lines 1 and 2 in Figure 6.
- Step 2:
- The 5G service provider receives the self-authentication message and the token from edge device . Then, decrypts the received token to recognize the identity of the edge device, i.e., the , and to retrieve the secret key of , i.e., . decrypts the received using , and verifies that T is within the current time skew. If the timestamp is verified, then is authenticated to and generates a session key to be used between edge device and fog node . However, if the timestamp verification fails, closes the session as presented in lines 2 and 3 in Figure 6. In lines 4 and 5, from Figure 6, encrypts the string “” along with the generated session key using their master secret key , which is called . Note that is a sealed value of the generated session key that is not saved in the 5G service provider to make it a stateless entity. As shown in line 5 in Figure 6, the retrieved timestamp, the string “”, the session key , and the are encrypted by the secret key to form the message response , i.e., . Then, sends to the edge device .
- Step 3:
- Once edge device receives the response message , as shown in line 5 from Figure 6, it decrypts , and first, verifies the value of the timestamp to authenticate the 5G service provider that verified device and created a secret session key to be used between and the fog node . Note that the value is sent to the edge device, not to the fog node, to avoid involving the fog node in the protocol until the edge device decides to. Now, the edge device decrypts to retrieve the session key and . Then, it stores in its memory and computes a message to the fog node , where T is the timestamp at the current time of line 6 in Figure 6. Finally, transmits and to .
- Step 4:
- Fog node receives the message and from edge device to indicate that an edge device wishes to connect with the fog node . At this point, the fog node depends on the 5G service provider to validate the request and obtain a secret key to be used between the edge device and the fog node. Therefore, the fog node authenticates itself to the by sending a self-authentication message along with the value and the token , as shown in lines 7 and 8 in Figure 6.
- Step 5:
- The 5G service provider receives the token by which it recognizes the sender . It uses the secret key to verify the received and authenticate the fog node. Then, decrypts the received , checks the text “”, and retrieves the session key . Finally, computes an “OK” response message and transmits to , as shown in lines 9 and 10 from Figure 6. Note that forgets , , , , , , and after sending .
- Step 6:
- Once the fog node receives the response message from the 5G service provider , it decrypts , verifies the value of the timestamp to authenticate the 5G service provider , retrieves the session key , and stores it in its memory. Then, in line 11 from Figure 6, decrypts the received message (in line 6, in Figure 6) to recognize the string “” and the identity of the requesting edge device, who was . At this point, authenticates . In order for to authenticate itself to , it computes and sends the “OK” message ”, to .
- Step 7:
- The edge device decrypts the received message , using the session key , as shown in line 12 in Figure 6. The edge device authenticates if the string literal is “” and the retrieved timestamp T is within the time skew of the timestamp at line 6 in Figure 6. If successful, the mutual Authentication and Key Agreement process is completed. Note that the real identity of the edge device and the fog node were concealed during this protocol.
4.4. Authentication and Key Agreement Phase (Fog Node and Fog Node Authentication Protocol)
4.5. Authentication and Key Agreement Phase (Fog Node and Cloud Authentication Protocol)
4.6. Edge Device Handover Authentication Phase
- Step 1:
- The fog node performs the fog-to-fog node mutual authentication protocol and generates a secure session key , as specified in line 1 in Figure 9.
- Step 2:
- Fog node generates a secure random key, denoted as , intended for utilization by the target fog node and edge device . It then proceeds to generate two handover messages, namely, and . The content of message consists of the encryption of the present timestamp T along with a string literal “” and using the secret key , ”. That is, the message includes the encrypted timestamp T, the string literal “”, and the secret key . It is written as ” . Subsequently, transmits to and to . Then, forgets . See lines 2, 3, 4, and 5 in Figure 9.
- Step 3:
- Edge device and the target fog node receive the handover message from fog node . Then, both and possess a shared session key to establish a secure channel.
5. Performance Evaluation
5.1. Experimental Setup
5.2. Authentication between Entities
5.2.1. Computational Cost
5.2.2. Signaling Cost
5.2.3. Communication Cost
- 3-Tier AKA: In lines 2, 5, 6, 8, 10, and 12, there are a total of 10 AES encrypted messages, as shown in Figure 6.
- 5G-AKA: In lines 1 and 11, there are a total of six IDs involved during the communication process. During line 3, it includes a sequence number, a random number, two hash functions, and a key. Then, in line 5, there is a random number and two hash functions transferred. In line 7 and line 9 of Figure 10, there are a total of four hash functions transferred.
- 4G EPS-AKA: In the 4G EPS-AKA, it is similar to 5G-AKA, except there is no ID encryption process in the beginning, as shown in Figure 11.
- TLS 1.3: In line 1 of Figure 12, the client sends a ClientHello message to the server. Once the server receives the message, it sends a ServerHello message, certification, certification timestamp, and certification verify back to the client. After the client authenticates the server, in line 3 of Figure 12, it transfers its certification, certification timestamp, and certification verify back to the server.
- 3-Tier AKA only performs 10 AES encryption/decryption operations. Hence, the overall communication cost of 3-Tier AKA amounts to 1280 bits, significantly lower than that of other protocols.
5.2.4. Storage Cost
5.3. Handover Authentication
5.3.1. Computational Cost
5.3.2. Signaling Cost
5.3.3. Communication Cost
- 3-Tier AKA: In lines 3 and 4 of Figure 9, there are a total of two AES encrypted messages transmitted.
- FogHA: The first fog access point initiates handover authentication communication by sending pre-negotiation information to the second fog access point in line 2 of Figure 16. Once this exchange is completed, the first fog access point proceeds to transmit the pre-negotiation temporary key to the mobile device after line 5 of Figure 16. Subsequently, in line 11 and line 15 of Figure 16, authentication messages are transmitted between the second fog access point and the mobile device. The total communication costs consist of five IDs, seven hash functions, one random number, and four timestamps.
- Quantum-resistant handover authentication protocol: The messages exchanged between entities primarily consist of hash function operations and NTRU encrypted messages. In lines 2, 4, 7, and 11 of Figure 17, there are total communication costs of five NTRU encrypted messages, nine hash function operations, and two timestamps.
- In Liu et al.’s scheme, the authentication message is initially sent from the user to a low-Earth-orbit satellite (LEOS). Subsequently, the LEOS appends its ID to the message and forwards it to the network control center (NCC). In lines 8 and 9 of Figure 18, the response message is sent back to the user. Lines 12 and 13 of Figure 18 involve the session key agreement process. The protocol includes two symmetric encryption operations, four elliptic curve point multiplication operations, four timestamps, three IDs, and four hash function operations transmitted in total.
- 3-Tier AKA only performs two AES encryption operations. Hence, the overall communication cost of 3-Tier AKA amounts to 256 bits, significantly lower than that of other protocols. Table 18 and Figure 20 show the total communication cost of our protocol and other related schemes during the handover authentication phase.
5.3.4. Storage Cost
6. Security and Feature Analysis
6.1. Security Analysis
- Data integrity and tampering attack: Data integrity in authentication protocols ensures data remain uncorrupted and untampered, while tampering attacks involve unauthorized modification of message exchanges for malicious purposes, thereby preventing data tampering. The proposed protocol is designed to prevent message leakage. Each message sent between participants is encrypted. Once the attacker modifies the plaintext sent among the protocol participants, the receiver cannot decrypt it with the specified secret key. This modification will be discovered immediately. The following scenarios depict the potential consequences when a message undergoes modifications during Authentication and Key Agreement phase message transmission; see Figure 6. In step1, if the token is modified, the 5G service provider will not be able to retrieve the accurate secret key due to it being encrypted by master secret key . If is modified, cannot obtain the time stamp, compare it to the current one, or obtain the correct user ID. Moreover, it is highly improbable for an adversary to create a legitimate since its creation involves the utilization of , which represents the master key of the 5G service provider. During step 2, it is important to note that the adversary does not know the edge user’s secret key . Hence, any attempts to modify “”, , or would be unfeasible for the adversary. Similar to step 2, the adversary is unable to tamper with “” or the timestamp in step 3. Suppose the adversary modifies the transmission message in the fourth step. In that case, the 5G service provider will be unable to retrieve any valid information due to using the master secret key. Then, the authentication fails. It is crucial to emphasize that safeguarding data integrity is not solely reliant on the authentication protocol but is a vital aspect to be considered across the entire system’s design and implementation.
- Spoofing: A security attack where an attacker pretends to be a specific edge device to deceive the fog node (the victim) into revealing the key information, or vice versa. In this protocol, if a malicious attacker M wants to pretend to be a legitimate user, M must calculate a self-authentication message ”, and a token ” , where is a faked secret key for M and is the master key of the 5G service provider. The attacker can generate a fake message, but not the token, because is known only by the 5G service provider. Therefore, the attacker will send a token that is recorded from previous sessions as a fake token instead. However, the 5G network will drop and close the session because the retrieved secret key in the received token does not match the attacker faked secret key for M. Therefore, the proposed protocol can prevent spoofing attacks.
- Man-in-the-middle attack (MitM): This is a cybersecurity attack where an attacker intercepts and potentially alters communications between two parties, allowing them to capture, manipulate, or eavesdrop on the exchanged information. In the proposed protocol, if a malicious actor labeled as M captures the message sent from an edge device to a 5G network and wants to obtain the data, the acquisition of the master key becomes imperative. This key serves as a mean to decrypt authentication messages and any additional messages intended for M. The absence of the master key renders M incapable of accessing any information. The response message sent from the 5G service provider to edge device is encrypted by the secret key of . If M does not know the secret key, M is unable to access or alter the data. The session key encrypts messages transmitted between the edge device and the fog node . For M to illicitly acquire the data after intercepting the information, it is imperative that M possesses the session key. The above scenarios illustrate that the designed protocol can resist MitM attacks.
- Replay attacks: These involve an attacker maliciously re-transmitting captured data without altering the content, causing security vulnerabilities and compromising system integrity and authenticity, without altering the data themselves. The proposed protocol is designed to guarantee the freshness of messages. For example, in the mutual authentication protocol between the edge device and fog node, the 5G service provider receives the self-authentication message and the token from edge device . Then, decrypts the received using , and verifies that T is within the current time skew. The message includes a text “”. This text ensures that this message’s direction is from the edge device to fog node . The malevolent attacker is unable to dispatch the message to other fog nodes in order to execute a replay attack. Therefore, the proposed protocol can prevent replay attacks.
- Information disclosure: Also known as leakage or exposure, this involves unauthorized access to protocol information, potentially enabling attackers to launch further attacks like phishing emails or identity theft. The proposed protocol is designed to hide the identity of the participants, which includes the edge device, the 5G network, fog node, and the cloud server. Therefore, the attacker is unaware of who is exchanging the protocol messages. Also, all messages sent between entities are encrypted by Advanced Encryption Standard (AES) encryption technology. The adversary cannot guess the edge/fog/cloud secret keys or 5G network master secret key to illegally obtain the user ID or session key.
- Denial of service (DoS): This is a security attack where an attacker overwhelms a system with traffic, requests, or data, disrupting its normal functioning. The most common scenario involves a system requiring high storage capacity, making it vulnerable to a DoS attack. The proposed protocol is designed to eliminate the need for the 5G service provider to remember/store the edge devices’ IDs or keys and remain stateless, eliminating the possibility of a DoS attack.
- Elevation of privilege (EOP): Here, an attacker gains access to a system. This attack aims to escalate their privileges from a low-level user, i.e., edge device’s account, to a higher level, i.e., 5G administrator role, allowing them to gain access to sensitive data such as the 5G network master secret key. This means a legitimate edge device could perform this attack by exploiting vulnerabilities in the 5G security system to gain administrative access to a system and reveal information about the 5G service provider master key. Therefore, the security level of the proposed protocol to protect against the EOP solely depends on the security level of the 5G network.
6.2. Feature Analysis
- Hidden identities anonymous: A security mechanism designed to enable authentication while preserving the privacy and anonymity of the entities involved. It allows users to authenticate themselves without revealing their identities to the public. This protocol is useful in scenarios where privacy and anonymity are crucial, such as online transactions, communication platforms, and anonymous voting systems. The main objective of the hidden identities anonymous authentication protocol is to ensure that the authentication process does not disclose sensitive information about the users’ identities. In the proposed 3-Tier AKA, during the authentication phase, the message sent from the edge device to 5G service provider includes ”, and a token ” . In this message, the identity of and target fog node are encrypted by AES encryption technology. The malicious attacker M cannot acquire any or identity information from the intercepted message. Based on this, the protocol delivers on hiding the identity feature.
- Mutual authentication: This is a bidirectional security mechanism that ensures trust and identity verification between two entities. It prevents unauthorized entities from posing as legitimate and mitigates man-in-the-middle attacks by requiring both to prove their identities. 3-Tier AKA has been designed to provide mutual authentication between the edge node and the 5G service provider, between the fog node and the 5G service provider, and between the edge device and the fog node. In Figure 6, line 3, the 5G service provider extracts the edge device key from the received token and decrypts the received proofME to check the value of T. If T matches, the current time clock is authenticated. In line 5, the edge device receives and decrypts , if the retrieved T matches the sending T in line 1, then the edge device authenticates the 5G service provider. Similarly, in line 9, the 5G server provider authenticates the fog node, and in line 10, when the fog node decrypts and finds the retrieved T matches the sending T in line 7, then the fog node authenticates the 5G service provider. In line 11, the fog node retrieves the session key to be used to decrypt and verify the message received in line 6. Again, the correct value of T and the text “” is enough to authenticate the edge device. The edge device also authenticates the fog node when it decrypts the message , as shown in line 12, and verifies the value of T and the text “”.
- Lightweight authentication protocol: This is a security mechanism designed to verify the identity of IoT devices while minimizing computational overhead, considering resource constraints and device diversity in the environment. The following points outline the reasons why the protocol is considered lightweight. Storage resources in the proposed 3-Tier AKA: After the registration phase and authentication phase, the 5G service provider forgets every temporary key or secret key except its master key. Edge device and fog node also forget the temporary secret key and only store the session key and secret key. In the computational resources and during the registration phase, only computes once when it retrieves the secret key . Service only computes once for generating the secret key and the token. During the Authentication and Key Agreement phase, only needs to operate two AES encoding/decoding algorithms. takes three and takes two encoding/decoding algorithms. Hence, the lightweight feature is achieved in the proposed protocol.
- Session key: This is a temporary cryptographic key used during a single communication session between two entities, ensuring secure and confidential data exchange through a key exchange or key establishment protocol. This protocol involves a series of cryptographic algorithms and techniques to securely generate and exchange the session key between the entities. After the Authentication and Key Agreement phase, edge device , and fog node will have the same session key . In the Authentication and Key Agreement presented in Figure 6, line 5, receives a response message from service provider . Then, retrieves by performing . In line 10, obtains by using its secret key . Then, receives the message from , and computes its own ID and fog node , , by using . If the session keys between and are not the same, the secure communication channel will not be built.
- Scalability and compatibility of the system: The authentication protocol’s scalability requirements include user count, concurrent requests, network traffic volume, and system response time. It leverages 5G networks’ capabilities to handle large user requests efficiently. The protocol’s high degree of scalability ensures optimal processing without delays, and adding more edge users or fog nodes does not compromise system efficiency.
7. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Voorsluys, W.; Broberg, J.; Buyya, R. Introduction to cloud computing. In Cloud Computing: Principles and Paradigms; Wiley: Hoboken, NJ, USA, 2011; pp. 1–41. [Google Scholar]
- Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 17 August 2012; pp. 13–16. [Google Scholar]
- Gonzalez, J.; Hunt, J.; Thomas, M.; Anderson, R.; Mangla, U. Edge Computing Architecture and Use Cases. 2022. Available online: https://developer.ibm.com/articles/edge-computing-architecture-and-use-cases/ (accessed on 23 April 2024).
- Bouras, M.A.; Xia, B.; Abuassba, A.O.; Ning, H.; Lu, Q. IoT-CCAC: A blockchain-based consortium capability access control approach for IoT. PeerJ Comput. Sci. 2021, 7, e455. [Google Scholar] [CrossRef]
- Ouda, A. A framework for next generation user authentication. In Proceedings of the 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), Muscat, Oman, 15–16 March 2016; pp. 1–4. [Google Scholar]
- Shirey, R. RFC 2828-Internet Security Glossary; GTE/BBN Technologies: Cambridge, MA, USA, 2000. [Google Scholar]
- Ometov, A.; Molua, O.L.; Komarov, M.; Nurmi, J. A survey of security in cloud, edge, and fog computing. Sensors 2022, 22, 927. [Google Scholar] [CrossRef] [PubMed]
- Meng, Y.; Naeem, M.A.; Almagrabi, A.O.; Ali, R.; Kim, H.S. Advancing the state of the fog computing to enable 5g network technologies. Sensors 2020, 20, 1754. [Google Scholar] [CrossRef] [PubMed]
- Baktayan, A.; AlGabri, M.; Alhomdy, S. Fog computing for network slicing in 5G networks: An overview. J. Telecommun. Syst. Manag. 2018, 172, 2167-0919. [Google Scholar]
- Das, R.; Inuwa, M.M. A review on fog computing: Issues, characteristics, challenges, and potential applications. Telemat. Inform. Rep. 2023, 10, 100049. [Google Scholar] [CrossRef]
- Yi, S.; Qin, Z.; Li, Q. Security and privacy issues of fog computing: A survey. In Proceedings of the Wireless Algorithms, Systems, and Applications: 10th International Conference, WASA 2015, Qufu, China, 10–12 August 2015; pp. 685–695. [Google Scholar]
- Ali, I.; Sabir, S.; Ullah, Z. Internet of things security, device authentication and access control: A review. arXiv 2019, arXiv:1901.07309. [Google Scholar]
- Wright, M.A. The advanced encryption standard. Netw. Secur. 2001, 2001, 11–13. [Google Scholar] [CrossRef]
- Hu, P.; Dhelim, S.; Ning, H.; Qiu, T. Survey on fog computing: Architecture, key technologies, applications and open issues. J. Netw. Comput. Appl. 2017, 98, 27–42. [Google Scholar] [CrossRef]
- Elwy, F.; Aburukba, R.; Al-Ali, A.R. Role of Fog Computing in Smart Spaces. In Proceedings of the 2022 IEEE International Conference on Edge Computing and Communications (EDGE), Barcelona, Spain, 10–16 July 2022; pp. 69–76. [Google Scholar]
- Vaquero, L.M.; Rodero-Merino, L. Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Comput. Commun. Rev. 2014, 44, 27–32. [Google Scholar] [CrossRef]
- Din, I.U.; Guizani, M.; Hassan, S.; Kim, B.S.; Khan, M.K.; Atiquzzaman, M.; Ahmed, S.H. The Internet of Things: A review of enabled technologies and future challenges. IEEE Access 2018, 7, 7606–7640. [Google Scholar] [CrossRef]
- Darwish, M.; Ouda, A.; Capretz, L.F. A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks. J. Inf. Secur. Appl. 2015, 20, 90–98. [Google Scholar] [CrossRef]
- Parikh, S.; Dave, D.; Patel, R.; Doshi, N. Security and privacy issues in cloud, fog and edge computing. Procedia Comput. Sci. 2019, 160, 734–739. [Google Scholar] [CrossRef]
- Alwakeel, A.M. An overview of fog computing and edge computing security and privacy issues. Sensors 2021, 21, 8226. [Google Scholar] [CrossRef] [PubMed]
- Khan, S.; Parkinson, S.; Qin, Y. Fog computing security: A review of current applications and security solutions. J. Cloud Comput. 2017, 6, 1–22. [Google Scholar]
- Siddiqi, M.A.; Yu, H.; Joung, J. 5G ultra-reliable low-latency communication implementation challenges and operational issues with IoT devices. Electronics 2019, 8, 981. [Google Scholar] [CrossRef]
- Silva, C.; Barraca, J.P.; Aguiar, R. eSIM suitability for 5G and B5G enabled IoT verticals. In Proceedings of the 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud), Rome, Italy, 23–25 August 2021; pp. 210–216. [Google Scholar]
- Geller, M.; Nair, P. 5G Security Innovation with Cisco. Available online: https://www.cisco.com/c/dam/en/us/solutions/collateral/service-provider/service-provider-security-solutions/5g-security-innovation-with-cisco-wp.pdf (accessed on 12 June 2024).
- Dangi, R.; Lalwani, P.; Choudhary, G.; You, I.; Pau, G. Study and investigation on 5G technology: A systematic review. Sensors 2021, 22, 26. [Google Scholar] [CrossRef] [PubMed]
- Papavassiliou, S. Software defined networking (SDN) and network function virtualization (NFV). Future Internet 2020, 12, 7. [Google Scholar] [CrossRef]
- Tang, H.; Yang, N.; Zhang, Z.; Du, Z.; Shen, J. 5G NR and Enhancements: From R15 to R16; Elsevier: Amsterdam, The Netherlands, 2021. [Google Scholar]
- Mishra, A.; Swain, A.; Ray, A.K.; Shubair, R.M. Convergent network architecture of 5G and MEC. In 5G IoT and Edge Computing for Smart Healthcare; Elsevier: Amsterdam, The Netherlands, 2022; pp. 111–138. [Google Scholar]
- Azure, M. What Is Edge Computing? 2022. Available online: https://azure.microsoft.com/en-ca/resources/cloud-computing-dictionary/what-is-edge-computing (accessed on 23 April 2024).
- Hazarika, A.; Rahmati, M. Towards an evolved immersive experience: Exploring 5G-and beyond-enabled ultra-low-latency communications for augmented and virtual reality. Sensors 2023, 23, 3682. [Google Scholar] [CrossRef] [PubMed]
- CableLabs. A comparative introduction to 4G and 5G authentication-CableLabs. 2019. Available online: https://www.cablelabs.com/insights/a-comparative-introduction-to-4g-and-5g-authentication (accessed on 23 April 2024).
- Xelu. Extensible Authentication Protocol (EAP) for Network Access in Windows. 2023. Available online: https://learn.microsoft.com/en-us/windows-server/networking/technologies/extensible-authentication-protocol/network-access (accessed on 23 April 2024).
- Christopher Allen, T.D. The TLS Protocol Version 1.0. 1999. Available online: https://www.ietf.org/rfc/rfc2246.txt (accessed on 23 April 2024).
- Bellavista, P.; Berrocal, J.; Corradi, A.; Das, S.K.; Foschini, L.; Zanni, A. A survey on fog computing for the Internet of Things. Pervasive Mob. Comput. 2019, 52, 71–99. [Google Scholar] [CrossRef]
- Zhong, H.; Chen, L.; Cui, J.; Zhang, J.; Bolodurina, I.; Liu, L. Secure and lightweight conditional privacy-preserving authentication for fog-based vehicular ad hoc networks. IEEE Internet Things J. 2021, 9, 8485–8497. [Google Scholar] [CrossRef]
- Kalaria, R.; Kayes, A.; Rahayu, W.; Pardede, E. A Secure Mutual authentication approach to fog computing environment. Comput. Secur. 2021, 111, 102483. [Google Scholar] [CrossRef]
- Lara, E.; Aguilar, L.; Sanchez, M.A.; García, J.A. Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial Internet of Things. Sensors 2020, 20, 501. [Google Scholar] [CrossRef] [PubMed]
- Han, M.; Liu, S.; Ma, S.; Wan, A. Anonymous-authentication scheme based on fog computing for VANET. PLoS ONE 2018, 15, e0228319. [Google Scholar] [CrossRef] [PubMed]
- Chen, C.M.; Xiang, B.; Liu, Y.; Wang, K.H. A secure authentication protocol for internet of vehicles. IEEE Access 2019, 7, 12047–12057. [Google Scholar] [CrossRef]
- Yao, Y.; Chang, X.; Mišić, J.; Mišić, V.B.; Li, L. BLA: Blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services. IEEE Internet Things J. 2019, 6, 3775–3784. [Google Scholar] [CrossRef]
- Ibrahim, M.H. OCTOPUS: An edge-fog mutual authentication scheme. Int. J. Netw. Secur. 2016, 18, 1089–1101. [Google Scholar]
- Jia, X.; He, D.; Kumar, N.; Choo, K.K.R. Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 2019, 25, 4737–4750. [Google Scholar] [CrossRef]
- Dewanta, F.; Mambo, M. A mutual authentication scheme for secure fog computing service handover in vehicular network environment. IEEE Access 2019, 7, 103095–103114. [Google Scholar] [CrossRef]
- Guo, Y.; Guo, Y. FogHA: An efficient handover authentication for mobile devices in fog computing. Comput. Secur. 2021, 108, 102358. [Google Scholar] [CrossRef]
- Yang, A.; Weng, J.; Yang, K.; Huang, C.; Shen, X. Delegating authentication to edge: A decentralized authentication architecture for vehicular networks. IEEE Trans. Intell. Transp. Syst. 2020, 23, 1284–1298. [Google Scholar] [CrossRef]
- Amor, A.B.; Abid, M.; Meddeb, A. Secure fog-based e-learning scheme. IEEE Access 2020, 8, 31920–31933. [Google Scholar] [CrossRef]
- Wang, F.; Wang, J.; Yang, W. Efficient incremental authentication for the updated data in fog computing. Future Gener. Comput. Syst. 2021, 114, 130–137. [Google Scholar] [CrossRef]
- Ahmed, E.; Ahmed, A.; Yaqoob, I.; Shuja, J.; Gani, A.; Imran, M.; Shoaib, M. Bringing computation closer toward the user network: Is edge computing the solution? IEEE Commun. Mag. 2017, 55, 138–144. [Google Scholar] [CrossRef]
- Gong, C.; Liu, J.; Zhang, Q.; Chen, H.; Gong, Z. The characteristics of cloud computing. In Proceedings of the 2010 39th International Conference on Parallel Processing Workshops, San Diego, CA, USA, 13–16 September 2010; pp. 275–279. [Google Scholar]
- Mell, P.; Grance, T. The NIST Definition of Cloud Computing (Draft). NIST Spec. Publ. 2011, 800, 145. [Google Scholar]
- Roman, R.; Lopez, J.; Mambo, M. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 2018, 78, 680–698. [Google Scholar] [CrossRef]
- Abdullah, F.; Kimovski, D.; Prodan, R.; Munir, K. Handover authentication latency reduction using mobile edge computing and mobility patterns. Computing 2021, 103, 2667–2686. [Google Scholar] [CrossRef]
- Bittencourt, L.F.; Diaz-Montes, J.; Buyya, R.; Rana, O.F.; Parashar, M. Mobility-aware application scheduling in fog computing. IEEE Cloud Comput. 2017, 4, 26–35. [Google Scholar] [CrossRef]
- Qi, Q.; Tao, F. A smart manufacturing service system based on edge computing, fog computing, and cloud computing. IEEE Access 2019, 7, 86769–86777. [Google Scholar] [CrossRef]
- Qi, M.; Chen, J.; Chen, Y. A secure authentication with key agreement scheme using ECC for satellite communication systems. Int. J. Satell. Commun. Netw. 2019, 37, 234–244. [Google Scholar] [CrossRef]
- Google Colaboratory (Colab): Building Responsible AI for Everyone. Available online: https://colab.google/ (accessed on 23 April 2024).
- Project Jupyter-Free Software, Open Standards, and Web Services for Interactive Computing across All Programming Languages. Available online: https://jupyter.org/ (accessed on 23 April 2024).
- IBM. The TLS 1.3 Protocol. 2023. Available online: https://www.ibm.com/docs/en/sdk-java-technology/8?topic=handshake-tls-13-protocol (accessed on 23 April 2024).
- Liu, D.; Ning, P.; Li, R. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 2005, 8, 41–77. [Google Scholar] [CrossRef]
- Srinivas, J.; Das, A.K.; Kumar, N.; Rodrigues, J.J. Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans. Dependable Secur. Comput. 2018, 17, 942–956. [Google Scholar] [CrossRef]
- Hermans, J.; Vercauteren, F.; Preneel, B. Speed records for NTRU. In Proceedings of the Cryptographers’ Track at the RSA Conference; Springer: Berlin/Heidelberg, Germany, 2010; pp. 73–88. [Google Scholar]
- Zhang, S.; Du, X.; Liu, X. A novel and quantum-resistant handover authentication protocol in IoT environment. Wirel. Netw. 2023, 29, 2873–2890. [Google Scholar] [CrossRef]
Study | Focus | Main Contributions | Limitations | Mobility | Domain |
---|---|---|---|---|---|
Zhong et al. [35] | Establishes secure communication while preserving privacy in vehicular ad hoc networks. | Minimizes computational and communication overhead. | Scalability and the impact of dynamic network conditions are not addressed. | Yes | Vehicular ad hoc networks |
Rudri et al. [36] | A mutual authentication based on elliptic curve cryptography and hash functions in fog computing. | Minimizes computation and communication overhead. Lightweight cryptographic. | Requires the edge user to store an extra identity, and no authentication between the fog and the cloud. | No | Generic |
Lara et al. [37] | A lightweight authentication protocol designed for resource constrained devices in the Industrial Internet of Things (IIoT). | Minimizes communication overhead. Performance efficiency for resource constrained IIoT devices. | Enhanced security for IoV for identity compromise and replay attacks. It stores a key pool for each sensor node. The storage cost is significant when the number of nodes increases. | No | Industrial Internet of Things |
Ibrahim et al. [41] | A mutual authentication for the edge–fog–cloud network utilizes a master secret key for new users to authenticate themselves to the fog server. | Computationally efficient, even in the existence of a large number of nodes. | Transmits a user’s identity over a public channel, compromising user anonymity. Reusing the same master password can pose a significant security risk. | No | Generic |
Jia et al. [42] | Authentication key agreement protocol for fog-driven IoT healthcare system. The protocol involving three components: fog node, cloud server, and sensors. | Low latency. Leverages bilinear pairings to establish secure keys among the entities involved, ensuring authentication. | An attacker can perform a password guessing attack. Computationally expensive. | No | Healthcare |
Dewanta, et al. [43] | A mutual handover authentication in a vehicular network environment. It establishes mutual authentication between vehicles and fog nodes. | Ensure the integrity and privacy of vehicular network. Providing faster computation. Reduces the total message size. | It distributes user credentials to specific fog nodes. | Yes | Vehicular network |
Guo et al. [44] | Anonymous handover authentication scheme for fog computing. | Lightweight. Low-latency authentication. | Improved communication and computation cost. | Yes | Generic |
Yang, et al. [45] | Threshold mutual authentication protocol that supports fast handover. | Reductions in authentication delays. | It increases the number of vehicles, leading to an increase in edge node storage. | Yes | Vehicular networks |
Amor, et al. [46] | Developed an access control in fog-assisted e-learning using cryptographic approaches. | High efficiency. Low complexity. Time efficient. | Large data size and hence high network cost. | No | eLearning |
Wang et al. [47] | A lightweight, secure authentication key exchange AKE. | Computational efficiency. Low storage usage. Low communication costs. | Does not consider all the environment characteristics. | Yes | Generic |
Notation | Description |
---|---|
A set of edge devices | |
D | Number of edge devices represented as , where |
A set of fog nodes | |
Z | Number of fog nodes represented as , where |
A set of cloud data centers | |
C | Number of cloud data centers used as , where |
u | A set of 5G service providers |
S | A temporary secret key for each entity |
K | A secret key generated by 5G service provider during the registration phase for each entity |
O | A security token generated by 5G service provider during the registration phase for each entity |
Notation | Description |
---|---|
A temporary secret key S for edge device | |
A temporary secret key S for fog node | |
A temporary secret key S for cloud data center | |
A secret key K generated by 5G service provider during the registration phase for edge device | |
A secret key K generated by 5G service provider during the registration phase for fog node | |
A secret key K generated by 5G service provider during the registration phase for cloud data center | |
A security token O generated by 5G service provider during the registration phase of the edge device | |
A security token O generated by 5G service provider during the registration phase of the fog node | |
A security token O generated by 5G service provider during the registration phase of cloud data center | |
The master secret key of the 5G service provider | |
T | A timestamp T is the current time that both participants record during the session. |
A generated session key to be used by the edge device and the fog node | |
A generated session key to be used by the edge device and the cloud data center | |
A generated session key to be used by the fog node and the cloud data center | |
Response message from 5G service provider to edge device | |
Response message from 5G service provider to fog node | |
Response message from 5G service provider to cloud data center | |
Messages between edge device and the fog node | |
Messages between edge device and the cloud data center | |
Messages between fog node and the cloud data center | |
The encryption of the plaintext p with the encryption key k using the AES-128 encryption technique. | |
The decryption of the ciphertext c with the encryption key k using the AES-128 encryption technique. | |
‖ | Concatenates two or more strings, sequences, or values together in a specific order to create a longer string. |
Library | Description |
---|---|
time | For measuring and managing time-related operations. |
hashlib | For cryptographic hashing functions. |
ecies, ecies.utils | For Elliptic Curve Integrated Encryption Scheme (ECIES) functionalities. |
binascii | For converting between binary and ASCII. |
Crypto.Cipher, Crypto.Random, Crypto.Hash | For various cryptographic operations from the PyCryptodome library. |
cryptography.hazmat.primitives | For low-level cryptographic primitives. |
os | For interacting with the operating system. |
ssl | For creating secure sockets. |
socket | For network communications. |
sympy | For symbolic mathematics, useful in cryptographic algorithm implementations. |
Operation | Time (ms) |
---|---|
Hash function | 0.107 |
ECIES encryption () | 1.166 |
ECIES decryption () | 1.164 |
AES encryption () | 0.217 |
AES decryption () | 0.243 |
ECDHE processing () | 1.535 |
HKDF processing () | 0.578 |
Verify certificate () | 0.138 |
Notation | Description |
---|---|
SUCI | Subscription Concealed Identifier |
GUTI | Globally Unique Temporary Identity |
SUPI | Subscription Permanent Identifier |
SNid | Serving network ID |
AV | Authentication vector |
AUTH | Authentication token |
RES | Response Token |
XRES | Expected response token |
HXRES | Hash of the expected response token |
Key used to derive other keys for authentication and encryption | |
Anchor key (in 5G, for the security anchor function) |
Notation | Description |
---|---|
GUTI | Globally Unique Temporary Identity |
IMSI | International Mobile Subscriber Identity |
XRES | Expected response token |
AUTH | Authentication token |
RRC | Radio resource control |
SNid | Serving network ID |
AV | Authentication vector |
RES | Response token |
NAS | Non-access stratum |
Protocol | Edge User Computational Cost (ms) | Total Computational Cost (ms) |
---|---|---|
3-Tier AKA | ||
5G-AKA [31] | ||
4G EPS-AKA [31] | ||
TLS 1.3 [58] |
Protocol | Storage Cost (Bits) | 5G/4G Network/Server (Bits) |
---|---|---|
3-Tier AKA | ||
5G-AKA [31] | ||
4G EPS-AKA [31] | ||
TLS 1.3 [58] |
Operation | Time (ms) |
---|---|
Hash function | 0.107 |
AES encryption | 0.217 |
AES decryption | 0.243 |
T-degree symmetric polynomial | 1.712 |
NTRU encryption | 4.340 |
NTRU decryption | 4.860 |
Elliptic curve point multiplication operation | 5.227 |
Symmetric encryption operation | 0.217 |
Symmetric decryption operation | 0.243 |
Notation | Description |
---|---|
FAPk | kth fog access point |
MDi | Mobile devices of user i |
PID | Pseudo identities |
APK | Pre-negotiation temporary key |
Maximum transmission delay | |
TC | Credentials of user |
TID | Temporary identity |
SK | Session key |
Notation | Description |
---|---|
Foreign agent | |
Home agent | |
Mobile device | |
, , , p, r | Polynomial |
h, F | Public/private key of entity |
Trusted third system center public key | |
Timestamp | |
Session key | |
, | Hashed ID and password |
Notation | Description |
---|---|
user | |
Low-Earth-orbit satellite | |
Network control center | |
, | Entity’s identity, password |
, , f | Parameters stored in a smart card |
G | A base point over with prime order n |
The public key of | |
x | The private key of |
Session key | |
t, , | Timestamp, current time, user i registration time |
Protocol | Edge User Computational Cost (ms) | Total Computational Cost (ms) |
---|---|---|
3-Tier AKA | ||
FogHA [44] | ||
Quantum-resistant handover authentication protocol [62] | ||
Liu et al.’s scheme [55] |
Protocol | Signaling Cost |
---|---|
3-Tier AKA | 2 |
FogHA [44] | 5 |
Zhang et al.’s Quantum-resistant handover authentication protocol [62] | 4 |
Liu et al.’s scheme [55] | 6 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, J.; Ouda, A.; Abu-Rukba, R. Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks. Future Internet 2024, 16, 209. https://doi.org/10.3390/fi16060209
Zhang J, Ouda A, Abu-Rukba R. Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks. Future Internet. 2024; 16(6):209. https://doi.org/10.3390/fi16060209
Chicago/Turabian StyleZhang, Jiayi, Abdelkader Ouda, and Raafat Abu-Rukba. 2024. "Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks" Future Internet 16, no. 6: 209. https://doi.org/10.3390/fi16060209
APA StyleZhang, J., Ouda, A., & Abu-Rukba, R. (2024). Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks. Future Internet, 16(6), 209. https://doi.org/10.3390/fi16060209