Towards a Provably Secure Authentication Protocol for Fog-Driven IoT-Based Systems
Round 1
Reviewer 1 Report
In this paper authors introduced privacy preserving hash based authenticated key agreement protocol using XOR and concatenation operations for fog based IoT systems. Authors investigated the computation overhead of proposed scheme. Some observations are as follows:
1. Authors have suddenly used abbreviation ECG. May consider its explanation.
2. Nonce r1 and r2 are taken into consideration.
3. Dring the running text reference are not organized in sequential fashion.
4. Some of the basic notations such as Yknew etc. are not explained properly.
5. Nonce N1 and N2 are defined properly.
Author Response
Thanks very much for reviewing our manuscript and suggesting your kind comments to improve our manuscript. The response to your kind comments are as follows:
1. Authors have suddenly used abbreviation ECG. May consider its explanation.
Response: Thanks once again we have fixed the raised issue.
2. Nonce r1 and r2 are taken into consideration.
Response: Thanks for your important suggestion. Actually we have used general nonce in place of r1 and r2 in the user registration phase.
3. Dring the running text reference are not organized in sequential fashion.
Response: Now we have organized them as per your kind suggestion
4. Some of the basic notations such as Yknew etc. are not explained properly.
Response: This is just used to indicated the updated value of of variable Yk
5. Nonce N1 and N2 are defined properly.
Response: They are nonces as we used r3, r4 .... so on.
Reviewer 2 Report
In the authors list 'and' is written before the last name, please update accordingly.
Place table and figures where they are cited in the text.
existing studies is not discussed.
remove "1.1. Contributions" heading.
Conclusion requires numerical results and other finding statements.
In complete paper kindly avoid using “I” and “We” in the manuscript and provide passive voice sentences in the manuscript.
Author Response
Thanks very much for investing your precious time and suggesting useful comments for the improvements of our manuscript.
In the authors list 'and' is written before the last name, please update accordingly.
Response: We have revised the list accordingly
Place table and figures where they are cited in the text.
Response: we have adjusted the tables and figures at their specified position.
existing studies is not discussed.
Response: Now we have discussed the exisiting studies
remove "1.1. Contributions" heading.
Response: We have removed the subheading "1.1. Contributions"
Conclusion requires numerical results and other finding statements.
Response: Thankyou for your precious comment. Now we have added the numerical results and other finding statements.
In complete paper kindly avoid using “I” and “We” in the manuscript and provide passive voice sentences in the manuscript.
Response: We have tried our best to observe the suggestion
Round 2
Reviewer 2 Report
Minahil Rana 1,‡, Khalid Mahmood 2,‡* and Muhammad Asad Saleem 3,‡, Fadi Al-Turjman 4,‡ , Manjur Sayyadbadasha kolhar 5,‡, and Chadi ALTRJMAN 6,‡ ,
Remove and between "Khalid Mahmood 2,‡* and Muhammad Asad Saleem".
we introduce a privacy-preserving hash-based 8 authenticated key agreement protocol using XOR and concatenation operations for fog-driven IoT 9 systems >>This paper propose privacy-preserving hash-based authenticated key agreement protocol using XOR and concatenation operations for fog-driven IoT systems.
Using healthcare as a case study, we evaluate the security of our protocol using informal and 10 formal security analysis. >> Using healthcare as a case study, the security of the novel protocol is evaluated by using informal and 10 formal security analysis.
Findings from the performance evaluation results show that our protocol 13 has the least computation cost compared to several related competing protocol >> Findings from the performance evaluation results show that the proposed protocol has the least computation cost compared to several related competing protocol
Please, accordingly update the rest of the article writeup, as
lines 30, 58, 69, 81, 87, 184, 262, 266, 324 (We get the following:), 328 ( birthday paradox we get), page 11 beginning (So, we get:), 346, eq. 9, eq. 11, 360, and in conclusion on lines 403 and 408.
Rest all addressed appropriately.
Author Response
Thanks for your kind suggestions we have tried our best to fix the highlighted issues
Remove and between "Khalid Mahmood 2,‡* and Muhammad Asad Saleem".
Response: It has been removed
we introduce a privacy-preserving hash-based 8 authenticated key agreement protocol using XOR and concatenation operations for fog-driven IoT 9 systems >>This paper propose privacy-preserving hash-based authenticated key agreement protocol using XOR and concatenation operations for fog-driven IoT systems.
Response: Replaced
Using healthcare as a case study, we evaluate the security of our protocol using informal and 10 formal security analysis. >> Using healthcare as a case study, the security of the novel protocol is evaluated by using informal and 10 formal security analysis.
Response: Replaced
Findings from the performance evaluation results show that our protocol 13 has the least computation cost compared to several related competing protocol >> Findings from the performance evaluation results show that the proposed protocol has the least computation cost compared to several related competing protocol
Response: Replaced
Please, accordingly update the rest of the article writeup, as
lines 30, 58, 69, 81, 87, 184, 262, 266, 324 (We get the following:), 328 ( birthday paradox we get), page 11 beginning (So, we get:), 346, eq. 9, eq. 11, 360, and in conclusion on lines 403 and 408. Rest all addressed appropriately.
Response: Thanks for pointing out important issues we have fixed them all.