{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T02:45:14Z","timestamp":1775529914612,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s10586-020-03211-1","type":"journal-article","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T05:05:28Z","timestamp":1606280728000},"page":"1643-1657","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Mutual authentication scheme of IoT devices in fog computing environment"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4424-2592","authenticated-orcid":false,"given":"Sunakshi","family":"Singh","sequence":"first","affiliation":[]},{"given":"Vijay Kumar","family":"Chaurasiya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"3211_CR1","doi-asserted-by":"crossref","unstructured":"Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/NSITNSW.2015.7176384"},{"key":"3211_CR2","doi-asserted-by":"crossref","unstructured":"Stojmenovic, I., Wen, S.: The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, pp. 1\u20138. IEEE (2014)","DOI":"10.15439\/2014F503"},{"key":"3211_CR3","unstructured":"Arij, B. E. N., Mohamed, A. B. I. D., and MEDDEB, A.: SAMAFog: service-aware mutual authentication fog-based protocol. In: 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1049\u20131054. IEEE (2019)"},{"key":"3211_CR4","doi-asserted-by":"crossref","unstructured":"Alharbi, S., Rodriguez, P., Maharaja, R., Iyer, P., Subaschandrabose, N., Ye, Z.: Secure the internet of things with challenge response authentication in fog computing. In: 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), pp. 1\u20132 (2017)","DOI":"10.1109\/PCCC.2017.8280489"},{"key":"3211_CR5","doi-asserted-by":"crossref","unstructured":"Dastjerdi, A.V., Gupta, H., Calheiros, R.N., Ghosh, S.K., Buyya, R.: Fog computing: principles, architectures, and applications. In: Internet of Things, pp. 61\u201375 (2016)","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"3211_CR6","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2017.09.002","volume":"98","author":"P Hu","year":"2017","unstructured":"Hu, P., Dhelim, S., Ning, H., Qiu, T.: Survey on fog computing: architecture, key technologies, applications and open issues. J. Netw. Comput. Appl. 98, 27\u201342 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"3211_CR7","doi-asserted-by":"crossref","unstructured":"Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. In: International Conference on Wireless Algorithms, Systems, and Applications, pp. 685\u2013695. Springer (2015)","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"3211_CR8","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.future.2018.05.008","volume":"88","author":"P Zhang","year":"2018","unstructured":"Zhang, P., Zhou, M., Fortino, G.: Security and trust issues in Fog computing: a survey. Future Gener. Comput. Syst. 88, 16\u201327 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"3211_CR9","doi-asserted-by":"crossref","unstructured":"Lee, K., Kim, D., Ha, D., Rajput, U., Oh, H.: On security and privacy issues of fog computing supported Internet of Things environment. In: 2015 6th International Conference on the Network of the Future (NOF), pp. 1\u20133. IEEE (2015)","DOI":"10.1109\/NOF.2015.7333287"},{"issue":"2","key":"3211_CR10","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MIC.2017.37","volume":"21","author":"A Alrawais","year":"2017","unstructured":"Alrawais, A., Alhothaily, A., Hu, C., Cheng, X.: Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 21(2), 34\u201342 (2017)","journal-title":"IEEE Internet Comput."},{"key":"3211_CR11","unstructured":"Borgohain, T., Borgohain, A., Kumar, U., Sanyal, S.: Authentication systems in internet of things. arXiv preprint arXiv:1502.00870. (2015)"},{"issue":"4","key":"3211_CR12","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1109\/JSAC.2015.2393436","volume":"33","author":"JL Hernandez-Ramos","year":"2015","unstructured":"Hernandez-Ramos, J.L., Pawlowski, M.P., Jara, A.J., Skarmeta, A.F., Ladid, L.: Toward a lightweight authentication and authorization framework for smart objects. IEEE J. Sel. Areas Commun. 33(4), 690\u2013702 (2015)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"3211_CR13","doi-asserted-by":"crossref","unstructured":"Liu, J., Xiao, Y., Chen, C.P.: Authentication and access control in the internet of things. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. 588\u2013592. IEEE (2012)","DOI":"10.1109\/ICDCSW.2012.23"},{"key":"3211_CR14","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., Shu, L.: Authentication protocols for Internet of Things: a comprehensive survey. Secur. Commun. Netw. (2017)","DOI":"10.1155\/2017\/6562953"},{"key":"3211_CR15","doi-asserted-by":"crossref","unstructured":"Podsevalov, I., Iakushkin, O., Kurbangaliev, R., Korkhov, V.: Blockchain as a platform for Fog computing, pp. 596\u2013605 (2019)","DOI":"10.1007\/978-3-030-24296-1_48"},{"issue":"1","key":"3211_CR16","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1186\/s13677-017-0090-3","volume":"6","author":"S Khan","year":"2017","unstructured":"Khan, S., Parkinson, S., Qin, Y.: Fog computing security: a review of current applications and security solutions. J. Cloud Comput. 6(1), 19 (2017)","journal-title":"J. Cloud Comput."},{"issue":"1","key":"3211_CR17","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","volume":"20","author":"J Ni","year":"2017","unstructured":"Ni, J., Zhang, K., Lin, X., Shen, X.S.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601\u2013628 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"10","key":"3211_CR18","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1002\/cpe.3485","volume":"28","author":"I Stojmenovic","year":"2016","unstructured":"Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurr. Comput. 28(10), 2991\u20133005 (2016)","journal-title":"Concurr. Comput."},{"issue":"6","key":"3211_CR19","first-page":"1089","volume":"18","author":"MH Ibrahim","year":"2016","unstructured":"Ibrahim, M.H.: Octopus: an edge-fog mutual authentication scheme. IJ Netw. Secur. 18(6), 1089\u20131101 (2016)","journal-title":"IJ Netw. Secur."},{"key":"3211_CR20","doi-asserted-by":"crossref","unstructured":"Bamasag, O.O., Youcef-Toumi, K.: Towards continuous authentication in internet of things based on secret sharing scheme. In: Proceedings of the WESS\u201915: Workshop on Embedded Systems Security ACM, p. 1 (2015)","DOI":"10.1145\/2818362.2818363"},{"key":"3211_CR21","doi-asserted-by":"crossref","unstructured":"Salman, O., Abdallah, S., Elhajj, I.H., Chehab, A., Kayssi, A.: Identity-based authentication scheme for the internet of things. In: 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 1109\u20131111. IEEE (2016)","DOI":"10.1109\/ISCC.2016.7543884"},{"key":"3211_CR22","unstructured":"Amor, A.B., Abid, M., Meddeb, A.: A privacy-preserving authentication scheme in an edge-fog environment. In: 2017 IEEE\/ACS 14th International Conference on Computer Systems and Applications (AICCSA), pp. 1225\u20131231. IEEE (2017)"},{"key":"3211_CR23","unstructured":"Arij, B. E. N., Mohamed, A. B. I. D., and MEDDEB, A.: CASK: conditional authentication and session key establishment in fog-assisted social IoT network. In: 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 114\u2013119. IEEE (2019)"},{"key":"3211_CR24","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","volume":"5","author":"R Lu","year":"2017","unstructured":"Lu, R., Heung, K., Lashkari, A.H., Ghorbani, A.A.: A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5, 3302\u20133312 (2017)","journal-title":"IEEE Access"},{"key":"3211_CR25","doi-asserted-by":"crossref","unstructured":"Imine, Y., Kouicem, D.E., Bouabdallah, A., Ahmed, L.: MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 608\u2013613. IEEE (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00091"},{"key":"3211_CR26","doi-asserted-by":"crossref","unstructured":"Almadhoun, R., Kadadha, M., Alhemeiri, M., Alshehhi, M., Salah, K.: A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In: 2018 IEEE\/ACS 15th International Conference on Computer Systems and Applications (AICCSA), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/AICCSA.2018.8612856"},{"key":"3211_CR27","doi-asserted-by":"crossref","unstructured":"Kaur, K., Garg, S., Kaddoum, G., Gagnon, F., Ahmed, S.H.: Blockchain based lightweight authentication mechanism for vehicular fog infrastructure. arXiv preprint arXiv:1904.01168 (2019)","DOI":"10.1109\/ICCW.2019.8757184"},{"key":"3211_CR28","doi-asserted-by":"publisher","first-page":"101327","DOI":"10.1109\/ACCESS.2019.2930814","volume":"7","author":"MS Pardeshi","year":"2019","unstructured":"Pardeshi, M.S., Yuan, S.M.: SMAP fog\/edge: a secure mutual authentication protocol for fog\/edge. IEEE Access 7, 101327\u2013101335 (2019)","journal-title":"IEEE Access"},{"key":"3211_CR29","unstructured":"Lo, L., Westphall, C.M., Gr, udtner, L.D., Westphall, C.B.: Mutual authentication for IoT in the context of fog computing. In: 2019 11th International Conference on Communication Systems and Networks (COMSNETS), pp. 367\u2013374. IEEE (2019)"},{"issue":"2","key":"3211_CR30","doi-asserted-by":"publisher","first-page":"3883","DOI":"10.1007\/s10586-018-2478-3","volume":"22","author":"S Usha","year":"2019","unstructured":"Usha, S., Tamilarasi, A.: A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloud. Clust. Comput. 22(2), 3883\u20133892 (2019)","journal-title":"Clust. Comput."},{"key":"3211_CR31","doi-asserted-by":"crossref","unstructured":"Maharaja, R., Iyer, P., Ye, Z.: A hybrid fog-cloud approach for securing the Internet of Things. Clust. Comput. 1\u20139 (2019)","DOI":"10.1007\/s10586-019-02935-z"},{"issue":"6","key":"3211_CR32","doi-asserted-by":"publisher","first-page":"13559","DOI":"10.1007\/s10586-018-2000-y","volume":"22","author":"A Pugazhenthi","year":"2019","unstructured":"Pugazhenthi, A., Chitra, D.: Secured and memory overhead controlled data authentication mechanism in cloud computing. Clust. Comput. 22(6), 13559\u201313567 (2019)","journal-title":"Clust. Comput."},{"issue":"4","key":"3211_CR33","doi-asserted-by":"publisher","first-page":"8605","DOI":"10.1007\/s10586-018-1929-1","volume":"22","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Sun, Q., Wang, Y., Zhu, L., Ji, W.: Efficient group authentication in RFID using secret sharing scheme. Clust. Comput. 22(4), 8605\u20138611 (2019)","journal-title":"Clust. Comput."},{"issue":"2","key":"3211_CR34","doi-asserted-by":"publisher","first-page":"3775","DOI":"10.1109\/JIOT.2019.2892009","volume":"6","author":"Y Yao","year":"2019","unstructured":"Yao, Y., Chang, X., Misic, J., Misic, V.B., Li, L.: BLA: blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services. IEEE Internet Things J. 6(2), 3775\u20133784 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"3211_CR35","first-page":"620","volume":"67","author":"S Talwani","year":"2019","unstructured":"Talwani, S.: Fog computing: introduction, challenges and future aspects. Heritage 67(7), 620\u2013626 (2019)","journal-title":"Heritage"},{"key":"3211_CR36","doi-asserted-by":"crossref","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 417\u2013426. Springer, Berlin (1985)","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"177","key":"3211_CR37","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"3211_CR38","doi-asserted-by":"crossref","unstructured":"Sattam, S., Riyami, A.I., Kenneth, G.P.: Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 452\u2013473. Springer (2003)","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"3211_CR39","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 223\u2013238 (2004)","DOI":"10.1007\/978-3-540-24676-3_14"},{"issue":"5","key":"3211_CR40","doi-asserted-by":"publisher","first-page":"10637","DOI":"10.1007\/s10586-017-1151-6","volume":"22","author":"A Sogani","year":"2019","unstructured":"Sogani, A., Jain, A.: Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks. Clust. Comput. 22(5), 10637\u201310648 (2019)","journal-title":"Clust. Comput."},{"key":"3211_CR41","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.future.2018.08.038","volume":"91","author":"L Zhou","year":"2019","unstructured":"Zhou, L., Li, X., Yeh, K.H., Su, C., Chiu, W.: Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gener. Comput. Syst. 91, 244\u2013251 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"5","key":"3211_CR42","doi-asserted-by":"publisher","first-page":"4767","DOI":"10.3390\/s110504767","volume":"11","author":"HL Yeh","year":"2011","unstructured":"Yeh, H.L., Chen, T.H., Liu, P.C., Kim, T.H., Wei, H.W.: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5), 4767\u20134779 (2011)","journal-title":"Sensors"},{"issue":"4","key":"3211_CR43","doi-asserted-by":"publisher","first-page":"730831","DOI":"10.1155\/2013\/730831","volume":"9","author":"W Shi","year":"2013","unstructured":"Shi, W., Gong, P.: A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw. 9(4), 730831 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"1","key":"3211_CR44","doi-asserted-by":"publisher","first-page":"9994","DOI":"10.1007\/s10916-013-9994-8","volume":"38","author":"X Xu","year":"2014","unstructured":"Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L.: A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems. J. Med. Syst. 38(1), 9994 (2014)","journal-title":"J. Med. Syst."},{"key":"3211_CR45","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2018.09.017","volume":"91","author":"M Wazid","year":"2019","unstructured":"Wazid, M., Das, A.K., Kumar, N., Vasilakos, A.V.: Design of secure key management and user authentication scheme for fog computing services. Future Gener. Comput. Syst. 91, 475\u2013492 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"3211_CR46","doi-asserted-by":"publisher","first-page":"149","DOI":"10.3233\/AIS-190516","volume":"11","author":"PK Dhillon","year":"2019","unstructured":"Dhillon, P.K., Kalra, S.: A secure multi-factor ECC based authentication scheme for Cloud-IoT based healthcare services. J. Ambient Intell. Smart Environ. 11(2), 149\u2013164 (2019)","journal-title":"J. Ambient Intell. Smart Environ."},{"issue":"7","key":"3211_CR47","first-page":"2719","volume":"9","author":"H Li","year":"2015","unstructured":"Li, H., Li, F., Song, C., Yan, Y.: Towards smart card based mutual authentication schemes in cloud computing. KSII Trans. Internet Inform. Syst. 9(7), 2719\u20132735 (2015)","journal-title":"KSII Trans. Internet Inform. Syst."},{"key":"3211_CR48","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8, 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03211-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-020-03211-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03211-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T18:08:19Z","timestamp":1669745299000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-020-03211-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,25]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["3211"],"URL":"https:\/\/doi.org\/10.1007\/s10586-020-03211-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,25]]},"assertion":[{"value":"3 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}