Please use this identifier to cite or link to this item: https://hdl.handle.net/10321/4103
DC FieldValueLanguage
dc.contributor.authorNleya, Bakheen_US
dc.date.accessioned2022-06-27T12:51:35Z-
dc.date.available2022-06-27T12:51:35Z-
dc.date.issued2021-12-30-
dc.identifier.citationNleya, B. 2021. A mutual lightweight authentication scheme for fog-cloud-based e-health services. Turkish Online Journal of Qualitative Inquiry. 12: 6569-6586 (18).en_US
dc.identifier.issn1309-6591-
dc.identifier.urihttps://hdl.handle.net/10321/4103-
dc.descriptionJournal listed in 2021 DHET listen_US
dc.description.abstractThe new version Internet network, now referred to as the Internet of Things (IoT) facilitates interconnectivity among various objects and devices. The introduction of both Cloud and Fog computing paradigms, device device-to-device (D2D) communication standards, as well as enabling privacy and security approaches, have all contributed to the practical realization of E-health services in IoT-enabled networks. Gen-erally, Fog layer nodes are often located in public places, where they are easily accessible and thus vulnerable to various securi-ty threats. Should this occur, the current and previously gener-ated security keys, as well as device identities, must be kept secret thus ensuring anonymity, unlinkability, forward secrecy, e.t.c. Thus in this paper, we introduce an E-Health authenti-cation and security architecture for the D2D-Aided fog compu-ting model, that facilitates verification of key components such as patients and peripheral devices without involving a central-ized cloud server. This is followed by a proposal for a light-weight anonymous authentication protocol (LAAP) to carry out authentication of the various parties in an E-health system. The proposed protocol is evaluated for various scenarios in D2D-Aided fog computing. Lightweight crypto- graphic primi-tives such as exclusive-or operations and one-way hash func-tion are relied upon to facilitate the inclusion of resource-constrained end-user devices mostly incorporated in body area networks (BANs). Ultimately we carry out an evaluation of the proposed proposal in terms of its efficacy, and security. The proposed protocol is generally found to be practically feasible for implementation in E-health service infrastructures.en_US
dc.format.extent18 p.en_US
dc.language.isoenen_US
dc.publisherTurkish Online Journal of Qualitative Inquiry (TOJQI)en_US
dc.relation.ispartofTurkish Online Journal of Qualitative Inquiry; Vol. 12en_US
dc.subjectE-healthen_US
dc.subjectMutual authenticationen_US
dc.subjectD2D communicationen_US
dc.subjectPrivacyen_US
dc.subjectSecurityen_US
dc.titleA mutual lightweight authentication scheme for fog-cloud-based e-health servicesen_US
dc.typeArticleen_US
dc.date.updated2022-06-15T14:12:57Z-
dc.publisher.urihttps://tojqi.net/index.php/journal/article/view/2768en_US
dcterms.dateAccepted2022-11-1-
local.sdgSDG03-
item.fulltextWith Fulltext-
item.cerifentitytypePublications-
item.languageiso639-1en-
item.openairetypeArticle-
item.grantfulltextopen-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
Appears in Collections:Research Publications (Engineering and Built Environment)
Files in This Item:
File Description SizeFormat
Nleya_B_2021.pdfArticle615.31 kBAdobe PDFView/Open
TOJQI Copyright clearance.docxCopyright clearance211.23 kBMicrosoft Word XMLView/Open
Show simple item record

Page view(s)

241
checked on Sep 15, 2024

Download(s)

77
checked on Sep 15, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.