Fog computing is an emerging paradigm that provides confluence facilities between Internet of Things (IoT) devices and cloud. The fog nodes process the information collected by the IoT devices, thereby providing services to the cloud. With the addition of an extra layer, the environment achieves better latency, mobility support, location-awareness, and real-time data handling. Further research in
... [Show full abstract] this area also draws attention to the existing quality of fog computing, and emerging security and privacy challenges. The increasing number of IoT devices and the introduction of middle-layer over public network introduces performance, correctness, accountability and security challenges. To ensure accountability along with privacy, a key agreement scheme is proposed for fog supported IoT environment. The proposed scheme is competent in term of security and efficiency. The security proof is proclaimed using the widely recognized random oracle model, which indicates that the proposed scheme is provably secure under any probabilistic polynomial time adversary. Moreover, the comparative analysis of performances is also satisfactory.