{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T16:39:21Z","timestamp":1770568761090,"version":"3.49.0"},"reference-count":20,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"vor","delay-in-days":297,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The fog computing architecture allows data exchange with the vehicle network, sensor networks, etc. However, before exchanging data, the nodes need to know each other and key exchange. Yashar et al. recently proposed a secure key exchange scheme for the fog federation. However, their proposed scheme has a high computational overhead and is not suitable for fog federation. Therefore, we have proposed a lightweight, secure key exchange scheme for the fog federation to reduce computational overhead. To prove the lightweight, we have compared the proposed scheme with the Yashar design in terms of computing, and communication cost AVISPA Tool was used for the formal analysis of the proposed scheme. Then, we simulated the proposed scheme with the NS3 tool and compared it with Throughput, packet loss, Packet Delivery, and end\u2010to\u2010end delay with Yashar et al. scheme. The results show that the proposed design reduced 3.2457\u2009ms of computational overhead and 1,024 transmitted data bits.<\/jats:p>","DOI":"10.1155\/2021\/4667586","type":"journal-article","created":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T21:35:09Z","timestamp":1635197709000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4845-870X","authenticated-orcid":false,"given":"Yashar","family":"Salami","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8173-3526","authenticated-orcid":false,"given":"Vahid","family":"Khajehvand","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,10,25]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9929663"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9980375"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/070414"},{"key":"e_1_2_10_4_2","first-page":"2719","article-title":"Towards smart card based mutual authentication schemes in cloud computing","volume":"9","author":"Li H.","year":"2015","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2659783"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1759-3"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.017"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2020.1712746"},{"key":"e_1_2_10_9_2","doi-asserted-by":"crossref","unstructured":"ZhengY.andChangC.-H. Secure mutual authentication and key-exchange protocol between PUF-embedded IoT endpoints Proceedings of the 2021 IEEE International Symposium On Circuits And Systems (ISCAS) May 2021 Daegu South Korea 1\u20135 https:\/\/doi.org\/10.1109\/iscas51556.2021.9401135.","DOI":"10.1109\/ISCAS51556.2021.9401135"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100286"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s42044-021-00086-2"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.08.001"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.11.052"},{"key":"e_1_2_10_14_2","unstructured":"Von OheimbD. The high-level protocol specification language HLPSL developed in the EU project AVISPA Proceedings of the APPSEM 2005 Workshop September 2005 Frauenchiemsee Germany 1\u201317."},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_15"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/11805618_21"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30227-8_68"},{"key":"e_1_2_10_19_2","first-page":"467","article-title":"Validation of Prouv\u00e9 protocols using the automatic tool TA4SP","volume":"6","author":"Boichut Y.","year":"2006","journal-title":"TFIT"},{"key":"e_1_2_10_20_2","unstructured":"\u201cNS3.\u201dhttps:\/\/www.nsnam.org."}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/4667586.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/4667586.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/4667586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T22:35:49Z","timestamp":1723242949000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/4667586"}},"subtitle":[],"editor":[{"given":"Bo","family":"Xiao","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/4667586"],"URL":"https:\/\/doi.org\/10.1155\/2021\/4667586","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-07-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"4667586"}}