Capítulo de livro

Credential-Based Authentication Mechanism for IoT Devices in Fog-Cloud Computing

2022; Springer International Publishing; Linguagem: Inglês

10.1007/978-981-16-5655-2_30

ISSN

2367-3370

Autores

Hala S. Ali, R. Sridevi,

Tópico(s)

Cloud Data Security Solutions

Resumo

Ali, Hala S. Sridevi, R.While the number of devices is potentially increased in IoT system, cloud computing will face several challenges such as mobility support, distribution and location awareness, transmission delay, as well as the security threats. Substantially, fog computing is recently introduced as an extension of the cloud to address these tremendous challenges. Fog nodes are located geographically closer to IoT devices in order to shift the cloud services partially at the edge of network. However, IoT devices are resource-constrained and unable to secure themselves, and hence, they can be effortlessly hacked. Therefore, this paper proposes a credential-based authentication mechanism at the fog layer to provide the security requirements of IoT applications (e.g., confidentiality, privacy preserving, integrity and access control). Furthermore, simulations are conducted to evaluate the performance of the proposed approach using iFogSim simulator and Java Cryptography Architecture (JCA) library. The results show that the proposed mechanism ensures confidentiality of the secret key, privacy-preserving of the device attributes, in addition to detect the compromised IoT device.

Referência(s)