Session Handover Among Fog Devices Using Polynomials

  • Priyank . Nayak Vedica Institute of Technology RKDF University, Bhopal, India
  • Ravi K.S. Pippal Vedica Institute of Technology RKDF University, Bhopal, India
Keywords: Attacks, Authentication,Fog devices,Interpolation,Password,PFS,Security, Smart Card.

Abstract

In the past, authentication and authorization issues were not considered especially in the context of Fog computing. They were discussed in the context of machine-to-machine and smart grids communications. The employable authentication and authorization techniques in Fog computing have been discussed earlier. However, they may not be appropriatefor Fog computing as none of them have discussed the facility of session handover among registered fog devices. If due to some problem/unavailability/down of fog devices, any user desires to switch the present fog device then they were not allowed to migrate among all registered fog devices.This study proposes a session handover scheme among fog devices using Lagrange Interpolating Polynomial. Use of Lagrange Interpolating Polynomial instead of costly, time-consuming exponential computation makes it feasible for practical implementation. If due tosome problem, any user desires to switch the present fog device then our scheme allows him/her to migrate among all registered fog devices.

Downloads

Download data is not yet available.
Published
2022-03-25