Man in the Middle Attack Prevention for Edge-Fog, Mutual Authentication Scheme
Gohar Rahman1, Chuah Chai Wen2

1Gohar Rahman, Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Parit Raja, Batu Pahat, Johor.
2Chuah Chai Wen, Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Parit Raja, Batu Pahat, Johor.
Manuscript received on 25 June 2019 | Revised Manuscript received on 13 July 2019 | Manuscript Published on 26 July 2019 | PP: 47-53 | Volume-8 Issue-2S2 July 2019 | Retrieval Number: B10090782S219/2019©BEIESP | DOI: 10.35940/ijrte.B1009.0782S219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Fog computing is considered emerging technology nowadays. Due to proximity to the end user, fog computing provides a reliable transmission with low latency. In this paper, we have proposed an improved mutual authentication security scheme based on advanced encryption standard AES and hashed message authentication code HMAC in fog computing. Our scheme provides mutual authentication between edge devices and fog server in edge fog cloud computing environment. Further, the scheme has the resistance to man in the middle attack in the fog computing environment. Detailed security analyses are summarized.
Keywords: Fog Computing, Internet of Things, Mutual Authentication, Man in the Middle Attack.
Scope of the Article: Authentication, Authorization, Accounting