
3Tier – AKA: A novel authentication using 5G communication for edge users in Cloud-Fog-Edge computing
Abstract
The concept of fog computing architecture represents an extension of cloud computing, and it has gained significant traction across various domains like self-driving vehicle networks, smart cities, and smart homes. One of the key challenges of traditional cloud computing lies in the considerable distance between cloud data centers and the devices at the network's edge. This geographical gap results in substantial delays when processing data. To counteract this issue, fog computing deploys intermediate servers closer to the edge devices. This approach offers enhanced service efficiency and cost-effectiveness compared to conventional cloud computing.
However, despite its conceptual roots in cloud computing, fog computing introduces its own security challenges that cannot be fully addressed using solutions designed solely for the cloud environment. The primary concern revolves around ensuring security and privacy within fog computing networks, particularly in aspects related to authentication and key agreement. These challenges emerge from the distributed and dynamic nature of fog computing, which demands tailored security solutions.
This work proposes a novel mutual authentication and key agreement protocol specifically designed to address the security requirements of fog computing within the context of the edge-fog-cloud three-tier architecture, augmented by the integration of the 5G network.
The essence of the proposed protocol lies in leveraging the unique capabilities of the 5G network. By doing so, the protocol establishes secure communication channels across the different tiers of the architecture (edge, fog, and cloud). This secure channel establishment ensures dependable data transmission and offers protection against potential security threats, given the dynamic and diverse nature of the fog-based environment. The main objective of this protocol is to tackle the security concerns inherent in fog computing. It achieves this by incorporating robust and efficient mutual authentication and key management mechanisms. These mechanisms enhance the security within fog-based environments, where conventional security approaches might fall short.
This study enhances security in the cloud-fog-edge environment. The mutual authentication mechanism introduced in this thesis lays a foundation for seamless and secure communication among various entities in the distributed architecture. Capitalizing on 5G benefits, it advances secure communication for emerging cloud-fog-edge applications. A comparative analysis was undertaken, aligning the proposed protocol with established alternatives like TLS 1.3, 5G-AKA, and diverse handover protocols. Notably, our protocol boasts a mere 1280 bits for the complete communication costs in the authentication phase, accounting for nearly 30% less than other protocols. Furthermore, our handover protocol incurs only 2 signaling costs. The handover authentication computational cost for the edge user is notably low at 0.243 ms, amounting to just 10% of the computation costs of other protocols.