Credential-Based Authentication Mechanism for IoT Devices in Fog-Cloud Computing
2022; Springer International Publishing; Linguagem: Inglês
10.1007/978-981-16-5655-2_30
ISSN2367-3370
Autores Tópico(s)Cloud Data Security Solutions
ResumoAli, Hala S. Sridevi, R.While the number of devices is potentially increased in IoT system, cloud computing will face several challenges such as mobility support, distribution and location awareness, transmission delay, as well as the security threats. Substantially, fog computing is recently introduced as an extension of the cloud to address these tremendous challenges. Fog nodes are located geographically closer to IoT devices in order to shift the cloud services partially at the edge of network. However, IoT devices are resource-constrained and unable to secure themselves, and hence, they can be effortlessly hacked. Therefore, this paper proposes a credential-based authentication mechanism at the fog layer to provide the security requirements of IoT applications (e.g., confidentiality, privacy preserving, integrity and access control). Furthermore, simulations are conducted to evaluate the performance of the proposed approach using iFogSim simulator and Java Cryptography Architecture (JCA) library. The results show that the proposed mechanism ensures confidentiality of the secret key, privacy-preserving of the device attributes, in addition to detect the compromised IoT device.
Referência(s)