{"id":"https://openalex.org/W4399749827","doi":"https://doi.org/10.3390/fi16060209","title":"Authentication and Key Agreement Protocol in Hybrid Edge\u2013Fog\u2013Cloud Computing Enhanced by 5G Networks","display_name":"Authentication and Key Agreement Protocol in Hybrid Edge\u2013Fog\u2013Cloud Computing Enhanced by 5G Networks","publication_year":2024,"publication_date":"2024-06-14","ids":{"openalex":"https://openalex.org/W4399749827","doi":"https://doi.org/10.3390/fi16060209"},"language":"en","primary_location":{"id":"doi:10.3390/fi16060209","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16060209","pdf_url":"https://www.mdpi.com/1999-5903/16/6/209/pdf?version=1718376319","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/16/6/209/pdf?version=1718376319","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102919461","display_name":"Jiayi Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jiayi Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Western University, London, ON N6A 5B9, Canada"],"raw_orcid":"https://orcid.org/0009-0004-7628-529X","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Western University, London, ON N6A 5B9, Canada","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037757429","display_name":"Abdelkader Ouda","orcid":"https://orcid.org/0000-0003-3882-1763"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Abdelkader Ouda","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Western University, London, ON N6A 5B9, Canada"],"raw_orcid":"https://orcid.org/0000-0003-3882-1763","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Western University, London, ON N6A 5B9, Canada","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030226761","display_name":"Raafat Aburukba","orcid":"https://orcid.org/0000-0003-2695-5836"},"institutions":[{"id":"https://openalex.org/I199440890","display_name":"American University of Sharjah","ror":"https://ror.org/001g2fj96","country_code":"AE","type":"education","lineage":["https://openalex.org/I199440890"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Raafat Abu-Rukba","raw_affiliation_strings":["Department of Computer Science and Engineering, American University of Sharjah, Sharjah P.O. Box 26666, United Arab Emirates"],"raw_orcid":"https://orcid.org/0000-0003-2695-5836","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, American University of Sharjah, Sharjah P.O. Box 26666, United Arab Emirates","institution_ids":["https://openalex.org/I199440890"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037757429"],"corresponding_institution_ids":["https://openalex.org/I125749732"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":4.4913,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.95029101,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"16","issue":"6","first_page":"209","last_page":"209"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.8518999814987183,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.8518999814987183,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.8442000150680542,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.8392999768257141,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9020353555679321},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7639355659484863},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6364910006523132},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.6019265651702881},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5798033475875854},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5666385293006897},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5226730704307556},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48501822352409363},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4359470009803772},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.4249987304210663},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.42060887813568115},{"id":"https://openalex.org/keywords/fog-computing","display_name":"Fog computing","score":0.41503220796585083},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32546067237854004},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18475931882858276},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16709157824516296},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1487935483455658},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11214888095855713},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.0914386510848999}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9020353555679321},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7639355659484863},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6364910006523132},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.6019265651702881},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5798033475875854},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5666385293006897},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5226730704307556},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48501822352409363},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4359470009803772},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4249987304210663},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.42060887813568115},{"id":"https://openalex.org/C2986652147","wikidata":"https://www.wikidata.org/wiki/Q21809931","display_name":"Fog computing","level":3,"score":0.41503220796585083},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32546067237854004},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18475931882858276},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16709157824516296},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1487935483455658},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11214888095855713},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.0914386510848999},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/fi16060209","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16060209","pdf_url":"https://www.mdpi.com/1999-5903/16/6/209/pdf?version=1718376319","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:gam:jftint:v:16:y:2024:i:6:p:209-:d:1415297","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/16/6/209/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:3c1f2f4dff864ddc9ae7b07615486a79","is_oa":true,"landing_page_url":"https://doaj.org/article/3c1f2f4dff864ddc9ae7b07615486a79","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 16, Iss 6, p 209 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi16060209","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi16060209","pdf_url":"https://www.mdpi.com/1999-5903/16/6/209/pdf?version=1718376319","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4399749827.pdf"},"referenced_works_count":52,"referenced_works":["https://openalex.org/W1550018288","https://openalex.org/W1554153316","https://openalex.org/W1654253310","https://openalex.org/W2070164835","https://openalex.org/W2109397768","https://openalex.org/W2114623221","https://openalex.org/W2122053504","https://openalex.org/W2154126105","https://openalex.org/W2243712200","https://openalex.org/W2262390119","https://openalex.org/W2293247967","https://openalex.org/W2345301719","https://openalex.org/W2397275348","https://openalex.org/W2609824095","https://openalex.org/W2747548784","https://openalex.org/W2753968620","https://openalex.org/W2769686021","https://openalex.org/W2800426337","https://openalex.org/W2805161995","https://openalex.org/W2891179396","https://openalex.org/W2900597325","https://openalex.org/W2906253005","https://openalex.org/W2906578628","https://openalex.org/W2909485178","https://openalex.org/W2911056119","https://openalex.org/W2953287140","https://openalex.org/W2965525761","https://openalex.org/W2972298765","https://openalex.org/W2990046387","https://openalex.org/W2997799626","https://openalex.org/W2999414741","https://openalex.org/W3005953448","https://openalex.org/W3006152094","https://openalex.org/W3011919777","https://openalex.org/W3046128493","https://openalex.org/W3088323682","https://openalex.org/W3153946584","https://openalex.org/W3166389398","https://openalex.org/W3169425761","https://openalex.org/W3200894591","https://openalex.org/W3203334519","https://openalex.org/W3213188002","https://openalex.org/W4200162071","https://openalex.org/W4200261490","https://openalex.org/W4210713267","https://openalex.org/W4226450846","https://openalex.org/W4292975427","https://openalex.org/W4322487615","https://openalex.org/W4362585626","https://openalex.org/W4376138301","https://openalex.org/W6676868599","https://openalex.org/W6712371521"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W2885657717","https://openalex.org/W2892869641","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W4328007012","https://openalex.org/W2132505069","https://openalex.org/W1965515427","https://openalex.org/W2116285675","https://openalex.org/W2054202867"],"abstract_inverted_index":{"The":[0,140,175],"Internet":[1],"of":[2,63,86,92,101,124,148,195,199],"Things":[3],"(IoT)":[4],"has":[5,143],"revolutionized":[6],"connected":[7],"devices,":[8],"with":[9,128],"applications":[10],"in":[11,50,89,109,152],"healthcare,":[12],"data":[13],"analytics,":[14],"and":[15,29,37,52,60,73,119,136],"smart":[16],"cities.":[17],"For":[18],"time-sensitive":[19],"applications,":[20],"5G":[21,36,103],"wireless":[22],"networks":[23],"provide":[24],"ultra-reliable":[25],"low-latency":[26],"communication":[27],"(URLLC)":[28],"fog":[30,38,64,87],"computing":[31,39,88,197],"offloads":[32],"IoT":[33],"processing.":[34],"Integrating":[35],"can":[40],"address":[41],"cloud":[42],"computing\u2019s":[43],"deficiencies,":[44],"but":[45],"security":[46,84,108],"challenges":[47],"remain,":[48],"especially":[49],"Authentication":[51,72],"Key":[53,74],"Agreement":[54,75],"aspects":[55],"due":[56],"to":[57,81],"the":[58,83,90,93,99,102,110,125,153,166,182,196],"distributed":[59],"dynamic":[61],"nature":[62],"computing.":[65],"This":[66,105],"study":[67,106],"presents":[68],"an":[69],"innovative":[70],"mutual":[71],"protocol":[76,127,169],"that":[77],"is":[78,157,185,192],"specifically":[79],"tailored":[80],"meet":[82],"needs":[85],"context":[91,112],"edge\u2013fog\u2013cloud":[94,111],"three-tier":[95],"architecture,":[96],"enhanced":[97],"by":[98,113],"incorporation":[100],"network.":[104],"improves":[107],"introducing":[114],"a":[115,121,144],"stateless":[116],"authentication":[117,154,180,201],"mechanism":[118],"conducting":[120],"comparative":[122],"analysis":[123],"proposed":[126],"well-known":[129],"alternatives,":[130],"such":[131],"as":[132],"TLS":[133],"1.3,":[134],"5G-AKA,":[135],"various":[137],"handover":[138,168,179],"protocols.":[139,163,202],"suggested":[141,167],"approach":[142],"total":[145],"transmission":[146],"cost":[147,177],"only":[149,170],"1280":[150],"bits":[151],"phase,":[155],"which":[156,191],"approximately":[158],"30%":[159],"lower":[160],"than":[161],"other":[162,200],"In":[164],"addition,":[165],"involves":[171],"two":[172],"signaling":[173],"expenses.":[174],"computational":[176],"for":[178,181],"edge":[183],"user":[184],"significantly":[186],"low,":[187],"measuring":[188],"0.243":[189],"ms,":[190],"under":[193],"10%":[194],"costs":[198]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":4}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
