Abstract
Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a strong need to bring connectivity to a very accessible level. To enable the execution of real-time applications at the device end or network edge for connected devices, fog computing was introduced. Due to the resource constraint nature and geographical distribution of fog devices, security and privacy concerns may arise. With an increased number of smart devices, authentication is turning to be more and more vital to enable secure communication for fog-based applications. Hence, it is mandatory to use a strong authentication mechanism for each device or application installed in the fog network system. Our survey paper focuses on a complete understanding of fog computing in terms of its architecture, features, and security. We have done a rigorous study on existing authentication mechanisms with their working principles, performance, and limitations. Also, we provided a taxonomy of security issues in fog computing for a better understanding of all security concerns that would help the researchers to work in the right direction in this domain. To design an effective authentication system for fog security, we provided future research directions and open challenges.
Similar content being viewed by others
Availability of data and materials
Not applicable
References
Aazam M, Huh EN (2015) Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT. In: 2015 IEEE 29th international conference on advanced information networking and applications (pp 687-694). IEEE
Abbas N, Asim M, Tariq N, Baker T, Abbas S (2019) A mechanism for securing IoT-enabled applications at the fog layer. J Sens Actuator Netw 8(1):16
Abraham WK, Saravanan S, Smith K (2019) Security and privacy challenges in fog computing. In: International conference on fog computing
Adel A (2020) Utilizing technologies of fog computing in educational IoT systems: privacy, security, and agility perspective. J Big Data 7(1):1–29
Akello P, Beebe NL, Choo KKR (2022) A literature survey of security issues in cloud, fog, and edge IT infrastructure. Electron Comm Res 1-35
Albakri A, Maddumala M, Harn L (2018) Hierarchical polynomial-based key management scheme in fog computing. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE) (pp 1593-1597). IEEE
Alharbi S, Rodriguez P, Maharaja R, Iyer P, Subaschandrabose N, Ye Z (2017) Secure the internet of things with challenge response authentication in fog computing. In: 2017 IEEE 36th international performance computing and communications conference (IPCCC) (pp 1-2). IEEE
Ali Z, Chaudhry SA, Mahmood K, Garg S, Lv Z, Zikria YB (2021) A clogging resistant secure authentication scheme for fog computing services. Comput Netw 185:107731
Almadhoun R, Kadadha M, Alhemeiri M, Alshehhi M, Salah K (2018) A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In: 2018 IEEE/ACS 15th international conference on computer systems and applications (AICCSA) (pp 1-8). IEEE
Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42
Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42
Alzoubi YI, Osmanaj VH, Jaradat A, Al-Ahmad A (2021) Fog computing security and privacy for the Internet of Thing applications: state-of-the-art. Secur Priv 4(2):e145
Amanlou S, Hasan MK, Bakar KAA (2021) Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model. Comput Netw 199:108465
Arivazhagan C, Natarajan V (2020) A survey on fog computing paradigms, challenges and opportunities in IoT. In: 2020 international conference on communication and signal processing (ICCSP) (pp 0385-0389). IEEE
Arun M, Balamurali S, Rawal BS, Duan Q, Kumar RL, Balamurugan B (2020) Mutual authentication and authorized data access between fog and user based on blockchain technology. In: IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp 37-42). IEEE
Atlam HF, Walters RJ, Wills GB (2018) Fog computing and the internet of things: a review. Big Data Cognit Comput 2(2):10
Baccarelli E, Naranjo PGV, Scarpiniti M, Shojafar M, Abawajy JH (2017) Fog of everything: energy-efficient networked computing architectures, research challenges, and a case study. IEEE Access 5:9882–9910
Bavishi J, Shaikh MS, Patel R (2020) Scalable and efficient mutual authentication strategy in fog computing. In: 2020 8th IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud) (pp 77-83). IEEE
Bellavista P, Berrocal J, Corradi A, Das SK, Foschini L, Zanni A (2019) A survey on fog computing for the Internet of Things. Pervasive Mob Comput 52:71–99
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing (pp 13-16)
Brogi A, Forti S (2017) QoS-aware deployment of IoT applications through the fog. IEEE Internet Things J 4(5):1185–1192
Chakraborty A, Kumar M, Chaurasia N, Gill SS (2023) Journey from cloud of things to fog of things: survey, new trends, and research directions. Softw Pract Exp 53(2):496–551
Chatterjee U, Ray S, Khan MK, Dasgupta M, Chen CM (2022) An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing. Computing 104(6):1359–1395
Chaudhry SA, Albeshri A, Xiong N, Lee C, Shon T (2017) A privacy preserving authentication scheme for roaming in ubiquitous networks. Clust Comput 20(2):1223–1236
Chen CM, Huang Y, Wang KH, Kumari S, Wu ME (2020) A secure authenticated and key exchange scheme for fog computing. Enterprise Inf Syst 1-16
Choo KKR, Gai K, Chiaraviglio L, Yang Q (2020) A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management
Din IU, Ahmad B, Almogren A, Almajed H, Mohiuddin I, Rodrigues JJ (2020) Left-right-front caching strategy for vehicular networks in ICN-based Internet of Things. IEEE Access 9:595–605
Dolui K, Datta SK (2017) Comparison of edge computing implementations: fog computing, cloudlet and mobile edge computing. In: 2017 global Internet of Things summit (GIoTS) (pp 1-6). IEEE
Dong MT, Xu H (2020) Group key management scheme for multicast communication fog computing networks. Processes 8(10):1300
Ekanayake BN, Halgamuge MN, Syed A (2018) Security and privacy issues of fog computing for the internet of things (IoT). In: Cognitive computing for big data systems over IoT, 139-174
Elkhodr M, Shahrestani S, Cheung H (2016) The internet of things: new interoperability, management and security challenges. arXiv preprint arXiv:1604.04824
Forti S, Ibrahim A, Brogi A (2019) Mimicking FogDirector application management. SICS Softw Intens Cyber Phys Syst 34:151–161
Forti S, Pagiaro A, Brogi A (2020) Simulating fogdirector application management. Simul Model Pract Theory 101:102021
Garg T, Kagalwalla N, Churi P, Pawar A, Deshmukh S (2020) A survey on security and privacy issues in IoV. Int J Electr Comput Eng 10(5):2088–8708
Giang NK, Blackstock M, Lea R, Leung VC (2015) Developing IoT applications in the fog: a distributed dataflow approach. In: 2015 5th international conference on the Internet of Things (IOT) (pp 155-162). IEEE
Gope P (2019) LAAP: lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. Comput Secur 86:223–237
Gowda NC, Manvi SS, Malakreddy B, Lorenz P (2023) BSKM-FC: blockchain-based secured key management in a fog computing environment. Future Gener Comput Syst
Gowda NC, Manvi SS (2021) An efficient authentication scheme for fog computing environment using symmetric cryptographic methods. In: 2021 IEEE 9th region 10 humanitarian technology conference (R10-HTC), 2021, pp 01-06, https://doi.org/10.1109/R10-HTC53172.2021.9641591
Group OCAW, et al. (2016) OpenFog architecture overview. White Paper, pp. 1-35
Guan Y, Shao J, Wei G, Xie M (2018) Data security and privacy in fog computing. IEEE Network 32(5):106–111
Guo Y, Guo Y (2021) FogHA: an efficient handover authentication for mobile devices in fog computing. Comput Secur 102358
Guo Y, Zhang Z, Guo Y (2020) Fog-centric authenticated key agreement scheme without trusted parties. IEEE Syst J
Gupta H, Vahid Dastjerdi A, Ghosh SK, Buyya R (2017) iFogSim: a toolkit for modeling and simulation of resource management techniques in the Internet of Things, edge and fog computing environments. Softw Pract Exp 47(9):1275–1296
Hafeez M, Sumra IA (2019) Fog computing security and privacy issues: a survey. Eng Sci Technol Int Res J 3(4):80–86
Han M, Liu S, Ma S, Wan A (2020) Anonymous-authentication scheme based on fog computing for VANET. PLoS ONE 15(2):e0228319
Hassen HB, Ayari N, Hamdi B (2020) A home hospitalization system based on the Internet of things, fog computing and cloud computing. Inf Med Unlock 20:100368
Hassen HB, Ayari N, Hamdi B (2020) A home hospitalization system based on the Internet of things, fog computing and cloud computing. Inf Med Unlock 20:100368
Heydari M, Mylonas A, Katos V, Balaguer-Ballester E, Tafreshi VHF, Benkhelifa E (2019) Uncertainty-aware authentication model for fog computing in IoT. In: 2019 fourth international conference on fog and mobile edge computing (FMEC) (pp 52-59). IEEE
Hosseinpour F, Plosila J, Tenhunen H (2016) An approach for smart management of big data in the fog computing context. In: 2016 IEEE international conference on cloud computing technology and science (CloudCom) (pp 468-471). IEEE
Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42
Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42
Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42
Huang B, Cheng X, Cao Y, Zhang L (2018) Lightweight hardware based secure authentication scheme for fog computing. In: 2018 IEEE/ACM symposium on edge computing (SEC) (pp 433-439). IEEE
Ibrahim MH (2016) Octopus: an edge-fog mutual authentication scheme. Int J Netw Secur 18(6):1089–1101
Ijaz M, Li G, Lin L, Cheikhrouhou O, Hamam H, Noor A (2021) Integration and applications of fog computing and cloud computing based on the Internet of Things for provision of healthcare services at home. Electronics 10(9):1077
Imine Y, Kouicem DE, Bouabdallah A, Ahmed L (2018) MASFOG: an efficient mutual authentication scheme for fog computing architecture. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE) (pp 608-613). IEEE
Intharawijitr K, Iida K, Koga H (2016) Analysis of fog model considering computing and communication latency in 5G cellular networks. In: 2016 IEEE international conference on pervasive computing and communication workshops (PerCom workshops) (pp 1-4). IEEE
Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Netw 25(8):4737–4750
Kalaria R, Kayes ASM, Rahayu W, Pardede E (2021) A secure mutual authentication approach to fog computing environment. Comput Secur 111:102483
Katal A, Sethi V (2023) Communication protocols in fog computing: a survey and challenges. In: Fog computing (pp 153-170). Chapman and Hall/CRC
Kaur J, Agrawal A, Khan RA (2020) Security issues in fog environment: a systematic literature review. Int J Wirel Inf Netw 27:467–483
Kaur K, Garg S, Kaddoum G, Gagnon F, Ahmed SH (2019) Blockchain-based lightweight authentication mechanism for vehicular fog infrastructure. In: 2019 IEEE international conference on communications workshops (ICC workshops) (pp 1-6). IEEE
Khalid T, Abbasi MAK, Zuraiz M, Khan AN, Ali M, Ahmad RW, Aslam M (2021) A survey on privacy and access control schemes in fog computing. Int J Commun Syst 34(2):e4181
Khalid M, Mujahid U, Muhammad NUI (2019) Ultralightweight RFID authentication protocols for low-cost passive RFID tags. Secur Commun Netw
Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 6(1):1–22
Kumar P, Zaidi N, Choudhury T (2016, November) Fog computing: common security issues and proposed countermeasures. In: 2016 international conference system modeling & advancement in research trends (SMART) (pp 311-315). IEEE
Lee TF, Chen WY (2021) Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things. J Inf Secur Appl 59:102817
Lee K, Kim D, Ha D, Rajput U, Oh H (2015) On security and privacy issues of fog computing supported Internet of Things environment. In: 2015 6th international conference on the network of the future (NOF) (pp 1-3). IEEE
Lera I, Guerrero C, Juiz C (2019) YAFS: a simulator for IoT scenarios in fog computing. IEEE Access 7:91745–91758
Li Z, Liu Y, Liu D, Li C, Cui W, Hu G (2018) A key management scheme based on hypergraph for fog computing. China Commun 15(11):158–170
Linthicum DS (2017) Connecting fog and cloud computing. IEEE Cloud Comput 4(2):18–20
Liu X, Fan L, Xu J, Li X, Gong L, Grundy J, Yang Y (2019) FogWorkflowSim: an automated simulation toolkit for workflow performance evaluation in fog computing. In: 2019 34th IEEE/ACM international conference on automated software engineering (ASE) (pp 1114-1117). IEEE
Lopes MM, Higashino WA, Capretz MA, Bittencourt LF (2017) Myifogsim: a simulator for virtual machine migration in fog computing. In: Companion proceedings of the 10th international conference on utility and cloud computing (pp 47-52)
Machado JDS, Moreno ED, Ribeiro ADRL (2020) A survey on fog computing and its research challenges. Int J Grid Util Comput 11(4):486–495
Manzoor A, Shah MA, Khattak HA, Din IU, Khan MK (2019) Multi-tier authentication schemes for fog computing: architecture, security perspective, and challenges. Int J Commun Syst e4033
Margariti SV, Dimakopoulos VV, Tsoumanis G (2020) Modeling and simulation tools for fog computing-a comprehensive survey from a cost perspective. Future Internet 12(5):89
Mohan N, Kangasharju J (2016) Edge-Fog cloud: a distributed cloud for Internet of Things computations. In: 2016 cloudification of the Internet of Things (CIoT) (pp 1-6). IEEE
Mookherji S, Odelu V, Prasath R, Das AK, Park Y (2023) Fog-based single sign-on authentication protocol for electronic healthcare applications. IEEE Internet Things J
Mostafavi S, Shafik W (2019) Fog computing architectures, privacy and security solutions. J Commun Technol Electron Comput Sci 24:1–14
Mounnan O, El Mouatasim A, Manad O, Hidar T, Abou El Kalam A, Idboufker N (2020) Privacy-aware and authentication based on blockchain with fault tolerance for IoT enabled fog computing. In: 2020 fifth international conference on fog and mobile edge computing (FMEC) (pp 347-352). IEEE
Mouradian C, Naboulsi D, Yangui S, Glitho RH, Morrow MJ, Polakos PA (2017) A comprehensive survey on fog computing: state-of-the-art and research challenges. IEEE Commun Surv Tutor 20(1):416–464
Moura J, Hutchison D (2020) Fog computing systems: state of the art, research issues and future trends, with a focus on resilience. J Netw Comput Appl 102784
Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, Kumar V (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293–19304
Mukherjee M, Shu L, Wang D (2018) Survey of fog computing: fundamental, network applications, and research challenges. IEEE Commun Surv Tutor 20(3):1826–1857
Munir A, Kansakar P, Khan SU (2017) IFCIoT: integrated fog cloud IoT: a novel architectural paradigm for the future Internet of Things. IEEE Consum Electron Mag 6(3):74–82
Mutlag AA, Khanapi Abd Ghani M, Mohammed MA, Maashi MS, Mohd O, Mostafa SA, de la Torre Díez I (2020) MAFC: multi-agent fog computing model for healthcare critical tasks management. Sensors 20(7):1853
Naha RK, Garg S, Chan A (2018) Fog computing architecture: survey and challenges. arXiv preprint arXiv:1811.09047
Nath SB, Gupta H, Chakraborty S, Ghosh SK (2018) A survey of fog computing and communication: current researches and future directions. arXiv preprint arXiv:1804.04365
Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surv Tutor 20(1):601–628
Pallavi KN, Kumar VR (2021) Authentication-based access control and data exchanging mechanism of IoT devices in fog computing environment. Wirel Pers Commun 116(4):3039–3060
Patwary AAN, Fu A, Naha RK, Battula SK, Garg S, Patwary MAK, Aghasian E (2020) Authentication, access control, privacy, threats and trust management towards securing fog computing environments: a review. arXiv preprint arXiv:2003.00395
Patwary AAN, Fu A, Battula SK, Naha RK, Garg S, Mahanti A (2020) FogAuthChain: a secure location-based authentication scheme in fog computing environments using Blockchain. Comput Commun 162:212–224
Patwary AAN, Naha RK, Garg S, Battula SK, Patwary MAK, Aghasian E, Gong M (2021) Towards secure fog computing: a survey on trust management, privacy, authentication, threats and access control. Electronics 10(10):1171
Petac E, Petac AO (2016) About security solutions in fog computing. Ovidius Univ Ann Econ Sci Ser 16(1):380–385
Pokorni SJ (2019) Reliability and availability of the Internet of Things. Vojnotehnički glasnik 67(3):588–600
Puliafito C, Mingozzi E, Longo F, Puliafito A, Rana O (2019) Fog computing for the internet of things: a survey. ACM Trans Internet Technol (TOIT) 19(2):1–41
Puliafito C, Gonçalves DM, Lopes MM, Martins LL, Madeira E, Mingozzi E, Bittencourt LF (2020) MobFogSim: simulation of mobility and migration for fog computing. Simul Model Pract Theory 101:102062
Puthal D, Mohanty SP, Bhavake SA, Morgan G, Ranjan R (2019) Fog computing security challenges and future directions bibenergy and security. IEEE Consum Electron Mag 8(3):92–96
Qayyum T, Malik AW, Khattak MAK, Khalid O, Khan SU (2018) FogNetSim++: a toolkit for modeling and simulation of distributed fog environment. IEEE Access 6:63570–63583
Rahman G, Wen CC (2018) Fog computing, applications, security and challenges, review. Int J Eng Technol 7(3):1615–1621
Rahman G, Wen CC (2018) Fog computing, applications, security and challenges, review. Int J Eng Technol 7(3):1615–1621
Rahman G, Wen CC (2018) Fog computing, applications, security and challenges, review. Int J Eng Technol 7(3):1615–1621
Rahmani AM, Mohammadi M, Rashidi S, Lansky J, Mildeova S, Safkhani M, Hosseinzadeh M (2021) Questioning the security of three recent authentication and key agreement protocols. IEEE Access 9:98204–98217
Rana M, Mahmood K, Saleem MA, Al-Turjman F, Kolhar MS, Altrjman C (2023) Towards a provably secure authentication protocol for fog-driven IoT-based systems. Appl Sci 13(3):1424
Rayani PK, Bhushan B, Thakare VR (2018) Multi-layer token based authentication through honey password in fog computing. Int J Fog Comput (IJFC) 1(1):50–62
Rezapour R, Asghari P, Javadi HHS, Ghanbari S (2021) Security in fog computing: a systematic review on issues, challenges and solutions. Comput Sci Rev 41:100421
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698
Saad M (2018) Fog computing and its role in the internet of things: concept, security and privacy issues. Int J Comput Appl 180(32):7–9
Saad ZM, Mhmood MR (2023) Fog computing system for internet of things: survey. Texas J Eng Technol 16:1–10
Sabireen H, Neelanarayanan VJIE (2021) A review on fog computing: architecture, fog with IoT, algorithms and research challenges. Ict Express 7(2):162–176
Saharan KP, Kumar A (2015) Fog in comparison to cloud: a survey. Int J Comput Appl 122(3)
Saleem MA, Mahmood K, Kumari S (2020) Comments on AKM-IoV: authenticated key management protocol in fog computing-based Internet of Vehicles deployment’. IEEE Internet Things J 7(5):4671–4675
Sarhan QI (2018) Internet of things: a survey of challenges and issues. Int J Internet Things Cyber-Assur 1(1):40–75
Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646
Sicari S, Rizzardi A, Coen-Porisini A (2022) Insights into security and privacy towards fog computing evolution. Comput Secur 102822
Singh S, Chaurasiya VK (2021) Mutual authentication scheme of IoT devices in fog computing environment. Clust Comput 24(3):1643–1657
Singh J, Singh P, Gill SS (2021) Fog computing: a taxonomy, systematic review, current trends and research challenges. J Parallel Distribut Comput 157:56–85
Son S, Lee J, Kim M, Yu S, Das AK, Park Y (2020) Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain. IEEE Access 8:192177–192191
Stojmenovic I (2014, November) Fog computing: a cloud to the ground support for smart things and machine-to-machine networks. In: 2014 Australasian telecommunication networks and applications conference (ATNAC) (pp 117-122). IEEE
Stolfo SJ, Salem MB, Keromytis AD (2012) Fog computing: Mitigating insider data theft attacks in the cloud. In: 2012 IEEE symposium on security and privacy workshops (pp 125-128). IEEE
Sun Y, Zhang N (2017) A resource-sharing model based on a repeated game in fog computing. Saudi J Biol Sci 24(3):687–694
Tange K, De Donno M, Fafoutis X, Dragoni N (2020) A systematic survey of industrial Internet of Things security: requirements and fog computing opportunities. IEEE Commun Surv Tutor 22(4):2489–2520
Tawalbeh LA, Muheidat F, Tawalbeh M, Quwaider M (2020) IoT privacy and security: challenges and solutions. Appl Sci 10(12):4102
Tuli S, Mahmud R, Tuli S, Buyya R (2019) Fogbus: a blockchain-based lightweight framework for edge and fog computing. J Syst Softw 154:22–36
Vasudev H, Das D, Vasilakos AV (2020) Secure message propagation protocols for IoVs communication components. Comput Electr Eng 82:106555
Veerraju T, Kumar KK (2018) A survey on fog computing: research challenges in security and privacy issues. Int J Eng Technol 7(2.7):335–340
Verma U, Bhardwaj D (2020) Design of lightweight authentication protocol for fog enabled Internet of Things-a centralized authentication framework. Int J Commun Netw Inf Secur 12(2):162–167
Vigano L (2006) Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science 155:61–86
Wang L, An H, Chang Z (2020) Security enhancement on a lightweight authentication scheme with anonymity fog computing architecture. IEEE Access 8:97267–97278
Wang F, Wang J, Yang W (2021) Efficient incremental authentication for the updated data in fog computing. Futur Gener Comput Syst 114:130–137
Wazid M, Bagga P, Das AK, Shetty S, Rodrigues JJ, Park Y (2019) AKM-IoV: authenticated key management protocol in fog computing-based Internet of vehicles deployment. IEEE Internet Things J 6(5):8804–8817
Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Futur Gener Comput Syst 91:475–492
Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Futur Gener Comput Syst 91:475–492
Wazid M, Das AK, Shetty S, Gope P, Rodrigues JJ (2020) Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access 9:4466–4489
Wheelus C, Zhu X (2020) Iot network security: threats, risks, and a data-driven defense framework. IoT 1(2):259–285
Wu TY, Guo X, Chen YC, Kumari S, Chen CM (2022) Sgxap: Sgx-based authentication protocol in iov-enabled fog computing. Symmetry 14(7):1393
Xia Z, Fang Z, Gu K, Wang J, Tan J, Wang G (2021) Effective charging identity authentication scheme based on fog computing in V2G networks. J Inf Secur Appl 58:102649
Xiong H, Mei Q, Zhao Y (2019) Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Syst J 14(1):310–320
Xiong H, Wu Y, Jin C, Kumari S (2020) Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT. IEEE Internet Things J 7(12):11713–11724
Yakubu J, Christopher HA, Chiroma H, Abdullahi M (2019) Security challenges in fog-computing environment: a systematic appraisal of current developments. J Reliab Intell Environ 5(4):209–233
Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data (pp 37-42)
Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data (pp 37-42)
Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: International conference on wireless algorithms, systems, and applications (pp 685-695). Springer, Cham
Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: International conference on wireless algorithms, systems, and applications (pp 685-695). Springer, Cham
Yousefpour A, Fung C, Nguyen T, Kadiyala K, Jalali F, Niakanlahiji A, Jue JP (2018) All one needs to know about fog computing and related edge computing paradigms. J Syst Archit
Yu S, Lee J, Park K, Das AK, Park Y (2020) IoV-SMAP: secure and efficient message authentication protocol for IoV in smart city environment. IEEE Access 8:167875–167886
Zamfiroiu A, Iancu B, Boja C, Georgescu TM, Cartas C, Popa M, Toma CV (2020) IoT communication security issues for companies: challenges, protocols and the web of data. In: Proceedings of the international conference on business excellence (Vol 14, No 1, pp 1109-1120). Sciendo
Zhang L (2019) Key management scheme for secure channel establishment in fog computing. IEEE Trans Cloud Comput
Zhang P, Liu JK, Yu FR, Sookhak M, Au MH, Luo X (2018) A survey on access control in fog computing. IEEE Commun Mag 56(2):144–149
Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and privacy in cloud computing: a survey. In 2010 sixth international conference on semantics, knowledge and grids (pp 105-112). IEEE
Funding
The authors did not receive support from any organization for the submitted work.
Author information
Authors and Affiliations
Contributions
NK did a survey of fog computing and compiled all available literature related to fog computing. DP helped in searching, scruting good papers, and guided to do a good survey step by step in an appropriate manner. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Ethics approval
Not applicable
Consent to participate
Not applicable
Consent for publication
Not applicable
Code availability
Not applicable
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kaliya, N., Pawar, D. Unboxing fog security: a review of fog security and authentication mechanisms. Computing 105, 2793–2819 (2023). https://doi.org/10.1007/s00607-023-01208-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-023-01208-3