| Nowadays,fog computing has become an emerging hot-topic for possessing the same advantages as cloud computing and the lower latency.Nonetheless,there are still many problems worthy of research in fog computing,and the research on user authentication and key agreement scheme is one of the most basic and important issues.In order to realize secure communication between different entities,it is imperative to design a secure and efficient user authentication and key agreement scheme.Although there are many cloud computing-based user authentication and key agreement schemes,it is impractical to apply these schemes directly to fog computing environments due to efficiency and cost reasons.Therefore,it is of great theoretical significance and application value to study a secure and efficient user authentication and key agreement scheme based on fog computing environment.This paper studies the user authentication and key agreement scheme in the fog computing environment.The main work is as follows:A secure and efficient user authentication and key agreement scheme with forward security and complete anonymity based on fog computing is proposed.The proposed scheme achieves complete anonymity of users and guarantees the forward security of authentication keys and session keys.The proposed scheme is proved to be secure under the security model,and the security verification analysis of the proposed scheme is carried out using the AVISPA tool,which proves that the proposed scheme can resist various known attacks.Finally,compared with other similar schemes,the proposed scheme is more efficient in terms of performance overhead and authentication latency.An efficient roaming cross-domain authentication and key agreement scheme based on user credentials is proposed.The proposed scheme aims to achieve user cross-domain access securely and efficiently.By adding user credentials and fog server broadcast credentials,the authentication delay of users’ cross-domain access and the performance overhead of interaction between fog servers are greatly reduced on the premise of ensuring security.The proposed scheme is proved to be secure under the security model,and the security verification analysis of the proposed scheme is carried out using the AVISPA tool,which proves that the proposed scheme can resist various known attacks.Finally,the proposed scheme is more efficient in terms of performance overhead compared to other similar schemes.According to the proposed efficiency roaming cross-domain authentication and key agreement scheme based on user credentials,through JAVA programming language and Socket technology,the corresponding simulation experiments are designed and implemented,which verifies the correctness and feasibility of the scheme. |