A secure authenticated and key exchange scheme for fog computing

Chien Ming Chen, Yanyu Huang, Kevin K H WANG, Saru Kumari, Mu En Wu*

*Corresponding author for this work

Research output: Contribution to journalJournal articlepeer-review

83 Citations (Scopus)


Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security challenges of cloud computing is inevitable. Recently, Jia et al. proposed an authenticated key exchange scheme for fog-driven IoT health care systems. Unfortunately, we discovered their scheme is vulnerable to an ephemeral secret leakage attack. In this paper, we propose an authenticated key exchange scheme for fog computing. Compared with previous schemes, our proposed scheme performs better in terms of performance and security.

Original languageEnglish
Pages (from-to)1200-1215
Number of pages16
JournalEnterprise Information Systems
Issue number9
Early online date10 Jan 2020
Publication statusPublished - 21 Oct 2021

Scopus Subject Areas

  • Computer Science Applications
  • Information Systems and Management

User-Defined Keywords

  • authenticated key exchange scheme
  • ephemeral secret leakage attack
  • Fog computing


Dive into the research topics of 'A secure authenticated and key exchange scheme for fog computing'. Together they form a unique fingerprint.

Cite this