Content uploaded by Carlos Becker Westphall
Author content
All content in this area was uploaded by Carlos Becker Westphall on Jun 20, 2019
Content may be subject to copyright.
6/20/19, 9)45 AMMutual Authentication for IoT in the Context of Fog Computing - IEEE Conference Publication
Page 1 of 6https://ieeexplore.ieee.org/document/8711402/references#references
Institutional Sign In
IEEE.org IEEE Xplore Digital Library
|IEEE-SA
|IEEE Spectrum
|More Sites
| Cart (0) Create Account
| Personal Sign In
|
Advertisement
Conferences > 2019 11th International Confe...
4Author(s)
Leandro Loffi ; Carla Merkle Westphall ; Lukas Detner Grüdtner ; Carlos B…
View All Authors
Mutual Authentication for IoT in the Context of Fog Computing
Publisher: IEEE
9
Full
Text Views
Alerts
Manage
Content Alerts
Add to Citation
Alerts
Export to
Collabratec
Abstract
Document Sections
I. Introduction
II. Related Works
III. Proposed
Solution
IV. Evaluation
V. Conclusion and
Future Work
Authors
Figures
References
Keywords
Metrics
More Like This
Download
PDF
Abstract: The authentication of restricted memory devices has major problems
because memory consumption is high when applied with other protocols that have the
purpose of mutual au... View more
Metadata
Published in: 2019 11th International Conference on Communication Systems &
Networks (COMSNETS)
Abstract:
The authentication of restricted memory devices has major problems because memory
consumption is high when applied with other protocols that have the purpose of mutual
authentication. This article proposes an authentication model that validates mutually the
parties in an Internet of Things environment applied in the context of Fog Computing.
Through the hypothetic-deductive methodology, the deductions and hypotheses are
presented for the formal proof of the new proposed method. The results achieved in the
research show that the approach of the authentication mechanism is optimized, the
prototype was validated in the AVISPA protocol evaluation tool and in a restricted
memory controlled environment in a context of Fog Computing. However, this work is
more appropriate in Fog Computing environments because there are no route changes
as in Cloud Computing.
Advertisement
More Like This
Security in the Internet of Things: A Survey
on Application Layer Protocols
2017 21st International Conference on
Control Systems and Computer Science
(CSCS)
Published: 2017
Access Control on Internet of Things based
on Publish/Subscribe using Authentication
Server and Secure Protocol
2018 10th International Conference on
Information Technology and Electrical
Engineering (ICITEE)
Published: 2018
View More
Advertisement
Click to Expand
See the top organizations
patenting in technologies
mentioned in this article
My Settings Get Help
Browse Subscribe
Link to download the paper:
https://ieeexplore.ieee.org/document/8711402/references#references
6/20/19, 9)45 AMMutual Authentication for IoT in the Context of Fog Computing - IEEE Conference Publication
Page 2 of 6https://ieeexplore.ieee.org/document/8711402/references#references
Citation Map
Date of Conference: 7-11 Jan. 2019
Date Added to IEEE Xplore: 13 May 2019
ISBN Information:
ISSN Information:
INSPEC Accession Number: 18672211
DOI: 10.1109/COMSNETS.2019.8711402
Publisher: IEEE
Conference Location: Bengaluru, India,
India
1. F. Xia, L. T. Yang, L. Wang, A. Vinel, "Internet of things", International Journal of
Communication Systems, vol. 25, no. 9, pp. 1101-1102, 2012.
Show Context CrossRef Google Scholar
2. B. Schneier, Applied cryptography: protocols algorithms and source code in C, john
wiley & sons, 2007.
Show Context Google Scholar
3. P. Hu, H. Ning, T. Qiu, Y. Xu, X. Luo, A. K. Sangaiah, "A unified face identification and
resolution scheme using cloud computing in internet of things", Future Generation
Computer Systems, vol. 81, pp. 582-592, 2018.
Show Context CrossRef Google Scholar
4. P. Gope, R. Amin, S. H. Islam, N. Kumar, V. K. Bhalla, "Lightweight and privacy-
preserving rfid authentication scheme for distributed iot infrastructure with secure
localization services for smart city environment", Future Generation Computer Systems,
2017.
Show Context Google Scholar
5. S. Piramuthu, R. Doss, "On sensor-based solutions for simultaneous presence of
multiple rfid tags", Decision Support Systems, vol. 95, pp. 102-109, 2017.
Show Context CrossRef Google Scholar
6. A. Tewari, B. Gupta, "Cryptanalysis of a novel ultra-lightweight mutual authentication
protocol for iot devices using rfid tags", The Journal of Supercomputing, vol. 73, no. 3,
pp. 1085-1102, 2017.
Show Context CrossRef Google Scholar
7. K.-H. Wang, C.-M. Chen, W. Fang, T.-Y. Wu, "On the security of a new ultra-
lightweight authentication protocol in iot environment for rfid tags", The Journal of
Supercomputing, vol. 74, no. 1, pp. 65-70, 2018.
Show Context CrossRef Google Scholar
8. N. Li, D. Liu, S. Nepal, "Lightweight mutual authentication for iot and its applications",
IEEE Transactions on Sustainable Computing, vol. 2, no. 4, pp. 359-370, 2017.
Show Context View Article Full Text: PDF (604KB) Google Scholar
9. M. H. Ibrahim, "Octopus: An edge-fog mutual authentication scheme", IJ Network
Security, vol. 18, no. 6, pp. 1089-1101, 2016.
Show Context Google Scholar
6/20/19, 9)45 AMMutual Authentication for IoT in the Context of Fog Computing - IEEE Conference Publication
Page 3 of 6https://ieeexplore.ieee.org/document/8711402/references#references
Advertisement
Authors !
10. M. A. Jan, F. Khan, M. Alam, M. Usman, "A payload-based mutual authentication
scheme for internet of things", Future Generation Computer Systems, 2017.
Show Context Google Scholar
11. F. Wu, X. Li, L. Xu, S. Kumari, A. K. Sangaiah, "A novel mutual authentication
scheme with formal proof for smart healthcare systems under global mobility networks
notion", Computers & Electrical Engineering, vol. 68, pp. 107-118, 2018.
Show Context CrossRef Google Scholar
12. P. M. Kumar, U. D. Gandhi, "Enhanced dtls with coap-based authentication scheme
for the internet of things in healthcare application", The Journal of Supercomputing, pp.
1-21, 2017.
Show Context CrossRef Google Scholar
13. R. Amin, N. Kumar, G. Biswas, R. Iqbal, V. Chang, "A light weight authentication
protocol for iot-enabled devices in distributed cloud computing environment", Future
Generation Computer Systems, vol. 78, pp. 1005-1019, 2018.
Show Context CrossRef Google Scholar
14. M. Wazid, A. K. Das, M. K. Khan, A. A.-D. Al-Ghaiheb, N. Kumar, A. V. Vasilakos,
"Secure authentication scheme for medicine anti-counterfeiting system in iot
environment", IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1634-1646, 2017.
Show Context View Article Full Text: PDF (1638KB) Google Scholar
15. A. Armando, D. Basin, J. Cuellar, M. Rusinowitch, L. Viganò, "Avispa: automated
validation of internet security protocols and applications", ERCIM News, vol. 64, 2006.
Show Context Google Scholar
16. V. Odelu, A. K. Das, A. Goswami, "A secure biometrics-based multi-server
authentication protocol using smart cards", IEEE Transactions on Information Forensics
and Security, vol. 10, no. 9, pp. 1953-1966, 2015.
Show Context View Article Full Text: PDF (2796KB) Google Scholar
I. Introduction
The evolution of Internet connected devices allowed the creation of a network of
intelligent objects. Each object has send and receive data functions between the
real world and the Internet, thus forming a network of things, or Internet of Things
(IoT). The main characteristic of an IoT network are devices that characterize a
network of sensors and actuators [1]. These devices must have adequate security
measures to provide trust in the use of the collected data.
Sign in to Continue Reading
Contents
6/20/19, 9)45 AMMutual Authentication for IoT in the Context of Fog Computing - IEEE Conference Publication
Page 4 of 6https://ieeexplore.ieee.org/document/8711402/references#references
Figures !
References "
Citation Map
1. F. Xia, L. T. Yang, L. Wang, A. Vinel, "Internet of things", International Journal of
Communication Systems, vol. 25, no. 9, pp. 1101-1102, 2012.
Show Context CrossRef Google Scholar
2. B. Schneier, Applied cryptography: protocols algorithms and source code in C,
john wiley & sons, 2007.
Show Context Google Scholar
3. P. Hu, H. Ning, T. Qiu, Y. Xu, X. Luo, A. K. Sangaiah, "A unified face identification
and resolution scheme using cloud computing in internet of things", Future
Generation Computer Systems, vol. 81, pp. 582-592, 2018.
Show Context CrossRef Google Scholar
4. P. Gope, R. Amin, S. H. Islam, N. Kumar, V. K. Bhalla, "Lightweight and privacy-
preserving rfid authentication scheme for distributed iot infrastructure with secure
localization services for smart city environment", Future Generation Computer
Systems, 2017.
Show Context Google Scholar
5. S. Piramuthu, R. Doss, "On sensor-based solutions for simultaneous presence of
multiple rfid tags", Decision Support Systems, vol. 95, pp. 102-109, 2017.
Show Context CrossRef Google Scholar
6. A. Tewari, B. Gupta, "Cryptanalysis of a novel ultra-lightweight mutual
authentication protocol for iot devices using rfid tags", The Journal of
Supercomputing, vol. 73, no. 3, pp. 1085-1102, 2017.
Show Context CrossRef Google Scholar
7. K.-H. Wang, C.-M. Chen, W. Fang, T.-Y. Wu, "On the security of a new ultra-
lightweight authentication protocol in iot environment for rfid tags", The Journal of
Supercomputing, vol. 74, no. 1, pp. 65-70, 2018.
Show Context CrossRef Google Scholar
8. N. Li, D. Liu, S. Nepal, "Lightweight mutual authentication for iot and its
applications", IEEE Transactions on Sustainable Computing, vol. 2, no. 4, pp. 359-
370, 2017.
Show Context View Article Full Text: PDF (604KB) Google Scholar
9. M. H. Ibrahim, "Octopus: An edge-fog mutual authentication scheme", IJ Network
Security, vol. 18, no. 6, pp. 1089-1101, 2016.
Show Context Google Scholar
10. M. A. Jan, F. Khan, M. Alam, M. Usman, "A payload-based mutual authentication
scheme for internet of things", Future Generation Computer Systems, 2017.
Show Context Google Scholar
6/20/19, 9)45 AMMutual Authentication for IoT in the Context of Fog Computing - IEEE Conference Publication
Page 5 of 6https://ieeexplore.ieee.org/document/8711402/references#references
Keywords !
Metrics !
11. F. Wu, X. Li, L. Xu, S. Kumari, A. K. Sangaiah, "A novel mutual authentication
scheme with formal proof for smart healthcare systems under global mobility
networks notion", Computers & Electrical Engineering, vol. 68, pp. 107-118, 2018.
Show Context CrossRef Google Scholar
12. P. M. Kumar, U. D. Gandhi, "Enhanced dtls with coap-based authentication
scheme for the internet of things in healthcare application", The Journal of
Supercomputing, pp. 1-21, 2017.
Show Context CrossRef Google Scholar
13. R. Amin, N. Kumar, G. Biswas, R. Iqbal, V. Chang, "A light weight authentication
protocol for iot-enabled devices in distributed cloud computing environment", Future
Generation Computer Systems, vol. 78, pp. 1005-1019, 2018.
Show Context CrossRef Google Scholar
14. M. Wazid, A. K. Das, M. K. Khan, A. A.-D. Al-Ghaiheb, N. Kumar, A. V.
Vasilakos, "Secure authentication scheme for medicine anti-counterfeiting system in
iot environment", IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1634-1646,
2017.
Show Context View Article Full Text: PDF (1638KB) Google Scholar
15. A. Armando, D. Basin, J. Cuellar, M. Rusinowitch, L. Viganò, "Avispa: automated
validation of internet security protocols and applications", ERCIM News, vol. 64,
2006.
Show Context Google Scholar
16. V. Odelu, A. K. Das, A. Goswami, "A secure biometrics-based multi-server
authentication protocol using smart cards", IEEE Transactions on Information
Forensics and Security, vol. 10, no. 9, pp. 1953-1966, 2015.
Show Context View Article Full Text: PDF (2796KB) Google Scholar
IEEE Account !
Profile Information !
Purchase Details !
Need Help? !
Other !
6/20/19, 9)45 AMMutual Authentication for IoT in the Context of Fog Computing - IEEE Conference Publication
Page 6 of 6https://ieeexplore.ieee.org/document/8711402/references#references
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
© Copyright 2019 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
US & Canada: +1 800 678 4333
Worldwide: +1 732 981 0060
IEEE Account
»Change Username/Password
»Update Address
Purchase Details
»Payment Options
»Order History
»View Purchased Documents
Profile Information
»Communications Preferences
»Profession and Education
»Technical Interests
Need Help?
»US & Canada: +1 800 678 4333
»Worldwide: +1 732 981 0060
»Contact & Support
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
© Copyright 2019 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
About IEEE Xplore Contact Us
|Help
|Accessibility
|Terms of Use
|Nondiscrimination Policy
|Sitemap
|Privacy & Opting Out of Cookies
|
IEEE websites place cookies on your device to give you the best user experience. By using our
websites, you agree to the placement of these cookies. To learn more, read our Accept & Close
Privacy Policy.