Abstract:  Fog is a layer between the cloud and end users and it extends the services provided by the cloud computing to the network edge. Fog computing follows the distributed network architecture and closely associated with IOT (Internet of Things). Security is the main challenge in the fog due to the password compromise. To overcome the password compromise additional authentication credentials are needed to login.  Round Trip Latency (RTL) based scheme increases the protection of traditional password authentication between clients and authenticators and extra profiling features are needed to defense against password compromise. In this paper, extended latency based authentication is proposed that includes the keystroke dynamics along with the latency to effectively protect from the same location attacks

Keywords: Fog, Cloud, Keystroke, authentication, RTL.

Cite:
E.P. Priyadharshini, S. Jothipriya,"A Survey of FOG Computing", IJARCCE International Journal of Advanced Research in Computer and Communication Engineering, vol. 13, no. 3, 2024, Crossref https://doi.org/10.17148/IJARCCE.2024.13305.


PDF | DOI: 10.17148/IJARCCE.2024.13305

Open chat
Chat with IJARCCE