PresentationPDF Available

Abstract and Figures

The authentication of restricted memory devices has major problems because memory consumption is high when applied with other protocols that have the purpose of mutual authentication. This article proposes an authentication model that validates mutually the parties in an Internet of Things environment applied in the context of Fog Computing. Through the hypothetic-deductive methodology, the deductions and hypotheses are presented for the formal proof of the new proposed method. The results achieved in the research show that the approach of the authentication mechanism is optimized, the prototype was validated in the AVISPA protocol evaluation tool and in a restricted memory controlled environment in a context of Fog Computing. However, this work is more appropriate in Fog Computing environments because there are no route changes as in Cloud Computing.
Content may be subject to copyright.
Mutual Authen+ca+on for IoT in the
Context of Fog Compu+ng9
!"#$%&'(!')(
!*+#,(-"&$"&(.&/%0$"&(
1#&2#(3"&+2"(4",056#22(
1#&2',(7"8+"&(4",056#22(
(
9',0:;&#%*#0"(9&';&#<(=$(1'<5*0"&(>8="$8"(
?"%"&#2(@$=A"&,=0B('C(>#$0#(1#0#&=$#(
D(
1E3>FGH>(IJDK(:(DD06(L$0"&$#M'$#2(1'$C"&"$8"('$(1E3<*$=8#M'$(>B,0"<,(N(FGHO'&+>(
7"$;#2*&*P(L$%=#P(Q#$*#&B(R((DDP(IJDK(
Summary9
1'$0"S0*#2=T#M'$(
9&'U2"<(
V"2#0"%(4'&+,(
EUW"8MA",(
>'2*M'$(
>8'5"(
GA#2*#M'$(
V",*20(
X$#2BT"(
1'$82*,='$,(
I(
Contextualiza+on9
!"#$%&!$'()(*+,-$(+-.$(/$/"#$+0/#)1&00#12&0$&3$
'"4.+1(5$(0*$5&,+1(5$&67#1/.8$)#.9520,$+0$+03&)-(2&0$/&$
.&-#$.#):+1#$;<=>>?@8$A=@BCDEACE8$EF<@C!<8$GHHIJK$
$
$
!"#$-(+0$1"()(1/#)+.21$&3$(0$%&!$0#/L&)M$()#$*#:+1#.$
/"(/$1"()(1/#)+N#$($0#/L&)M$&3$.#0.&).$(0*$(1/9(/&).$
;O%=$et#alK8$GHPGJ(
E&9)1#Q$LLLK3)##'+MK1&-R+0*#SK'"'T,&/&UVWX+*3&/&UPGPYIHI$
Y(
Contextualiza+on9
Z&,$F&-'920,$+.$($5(4#)#*$-&*#5$/&$#0(65#$96+[9+/&9.$(11#..$/&$.1(5(65#$1&-'920,$."()#*$
)#.&9)1#.$;%C@\=$et#alK8$GHPIJK$
Z(
E&9)1#Q$0:5'96.K0+./K,&:R0+./'96.RE'#1+(5]965+1(2&0.RB%E!KE]K
YHH^_GYK'*3$
E&9)1#Q$(9/"&)$
Contextualiza+on9
`9/9(5$=9/"#021(2&0$)#3#).$+0$/L&$'()/.$(9/"#021(20,$#(1"$&/"#)$(/$/"#$.(-#$2-#$
;C!a=b8$@??E8$PcIVJK$
[(
E&9)1#Q$(9/"&)$
Problem9
=.$/"#$d)./$5+0#$&3$*#3#0.#$+0$(0$%&!$0#/L&)M8$/"#$(9/"#021(2&0$(**)#..#.$/"#$')&65#-$&3$1"#1M+0,$(0$
+*#02/4$;EF<B?%?@8$PccYJK$ \(
E&9)1#Q$(9/"&)$
Problem9
e#:+1#.$5&1(/#*$(/$/"#$#*,#$&3$%&!$0#/L&)M.$
9.9(554$"(:#$5&L$')&1#..+0,$'&L#)$(0*$()#$
6&90*#*$64$#0#),4$)#./)+12&0.K$$
!"9.8$/"#.#$*#:+1#.$"(:#$5+-+/#*$)#.&9)1#.$
/&$+-'5#-#0/$.#19)+/4$-#(.9)#.K$$
%3$L#$1&0.+*#)$/"#$(9/"#021(2&0$(.$/"#$
./()20,$1&--90+1(2&0$'&+0/$6#/L##0$/L&$
'()/.8$9.+0,$.+-'5#$%e$#S1"(0,#8$(0*R&)$
(9/"#021(2&0$-#/"&*.$L+/"&9/$+0+2(5$
'()/.$:#)+d1(2&08$+/$+.$0&/$1&0.+*#)#*$
.9f1+#0/$/&$,9()(0/##$/"#$.#19)+/4K$
R(
E&9)1#Q$(9/"&)$
Related works9
!"#$')#:+&9.$L&)M$L(.$.96*+:+*#*$+0/&$/"#$3&55&L+0,$(.'#1/.Q$
E+-'5#Q$>=$;2"('&('$":O#B(#*06"$M8#M'$](
`9/9(5Q(3*0*#2('&(0O':O#B(#*06"$M8#M'$](
%&!Q(9&'0'8'2(#552="%(=$("$A=&'$<"$0,(O=06(<"<'&B(8'$,0&#=$0P(8'$,=%"&=$;(06"(?';(
1'<5*M$;(8'$0"S0,](
Z(1/&).Q(9&'0'8'2(06#0(8'$,=%"&,(,"A"&#2(C#80'&,(C'&(#*06"$M8#M'$^(
_(
Related Works9
Bg$ a&)M.$ E+-'5#$ `9/9(5$ %&!$ Z(1/&).$
D`( aX3LF(et#al^P(IJD_b( S( :( S( :(
I`( a.E9G(et#al^P(IJDRb( :( S( S( :(
Y`( aL7VXcL3P(IJD\b( :( S( S( :(
Z`( aQXF(et#al^P(IJDRb( :( S( S( :(
[`( ad@3XVP(.XF-cLP(IJDRb( S( :( S( :(
\`( a!LP(!L@P(FG9X!P(IJDRb( :( S( S( :(
R`( a9LVX3@Hc@P(-E>>P(IJDRb (( S( :( :( S(
_`( aHG4XVLP(.@9HXP(IJDRb( :( S( S( :(
K`( a4@(et#al^P(IJD_b( :( S( S( :(
DJ`( a.Ve-HFGV(et#al^P(IJD_b( :( S( S( S(
DD`( H6=,(O'&+( :( S( S( S(
K(
H#U2"(D(f(V"2#0"%(4'&+,(
c'O"A"&P(=$(;"$"&#2P(06","(<"06'%,(%'($'0(#%%&",,(=$(#(8'<U=$"%(O#B(06"(<*0*#2(
#*06"$M8#M'$(O=06(,=<*20#$"'*,(#$#2B,=,('C(=%"$Mg8#M'$(C#80'&,^(
(
Objec+ves9
!"#$'9)'&.#$&3$/"+.$L&)M$+.$/&$')&'&.#$(0$(9/"#021(2&0$-&*#5$/"(/$L+55$
(9/"#021(/#$/"#$'()2#.$+0$(0$%0/#)0#/$&3$!"+0,.$#0:+)&0-#0/$(''5+#*$+0$/"#$1&0/#S/$
&3$Z&,$F&-'920,K$
$
E'#1+d1$&67#12:#.Q$
PKe#:#5&'$./)(/#,+#.$&3$+*#02d1(2&0$3(1/&).$&3$/"#$'()2#.h$
GK!&$')&'&.#$($-#/"&*$&3$-9/9(5$(9/"#021(2&0$L+/"$/"#$*#:#5&'#*$3(1/&).h$
_K%-'5#-#0/$/"#$')&'&.#*$-#/"&*$+0$(0$%0/#)0#/$&3$!"+0,.$#0:+)&0-#0/$+0$/"#$
1&0/#S/$&3$Z&,$F&-'920,h$(0*$
WK?:(59(/#$/"#$-9/9(5$(9/"#021(2&0$-&*#5$+0$/"#$%&!$#0:+)&0-#0/$/"(/$+.$
-#-&)4$)#./)+1/#*$+0$/"#$+0:&5:#*$'()2#.K(
DJ(
Solu+on9
DD(
E&9)1#Q$(9/"&)$
Solu+on9
@#*Q$%*#02d1(2&0$&3$]()2#.h$
\)##0Q$=.4--#/)+1$A#4$?S1"(0,#h$
b#55&LQ$E4--#/)+1$A#4$=,)##-#0/h$
i59#Q$?01)4'/#*$e(/(K$ DI(
?=;^(D^(3*0*#2(X*06"$M8#M'$(3"06'%(
Solu+on9
%*#02d1(2&0$&3$]()2#.$
$(h(cX>caM<"(i(L-%",0(i(L-'&=;(i(,"jb^(
(
DY(
Solu+on9
=.4--#/)+1$A#4$?S1"(0,#$
DZ(
Solu+on9
E4--#/)+1$A#4$=,)##-#0/$
D[(
Solu+on9
?01)4'/#*$e(/($
D\(
Solu+on9
@#*Q$%*#02d1(2&0$&3$]()2#.h$
\)##0Q$=.4--#/)+1$A#4$?S1"(0,#h$
b#55&LQ$E4--#/)+1$A#4$=,)##-#0/h$
i59#Q$?01)4'/#*$e(/(K$ DR(
?=;^(D^(3*0*#2(X*06"$M8#M'$(3"06'%(
Scope9
D_(
1'A"&,("$8&B5M'$(<"06'%,k((
XG>(aAdvanced#Encryp/on#Standardb]((
V>X(aV^(V=A",0P(X^(>6#<=&(#$%(!^(X%2"<#$b]((
>cXI[\](#$%((
-=)":c"22<#$^((
X&86=0"80*&"(#$%(52#l'&<k(
V#,5U"&&B(9=(Y('C(<'%"2(7](
?E.k($'0"U''+(=R('C(_(8'&"(O=06(@U*$0*(
D_^JZ(!H>(#$%(O=06(_(.7('C(VX3((
-=,0#$8"(C&'<(V#,5U"&&B(9=(DJJ(<"0"&,(
a@?>1b(
1!E@-k(.'';2"(12'*%(1'<5*0"(G$;=$(
O=06(D(8'&"(a>+B2#+"(19@b(O=06(@U*$0*(
D_^JZ(!H>(#$%(O=06(_(.7('C(VX3((
-=,0#$8"(C&'<(V#,5U"&&B(9=(ZR[_(+=2'<"0"&,(
a>'*06(1#&'2=$#P(@>Xb(
?=;^(Y^(GA#2*#M'$(#&86=0"80*&"(
Evalua+on9
DK(
H6"(mF"0O'&+n(0#U(=,(&"2#0"%(0'(06"(
$"0O'&+(M<"(U"0O""$(06"(5""&,^(
(mH'0#2(>"$%n(=,(06"(0'0#2(M<"('C(
,"$%=$;(0'(06"(&"8"=A"&^((
mo"&=g8#M'$n(=,(06"(0'0#2(M<"(C'&(
86"8+=$;(06"(#*06"$M8#M'$(C#80'&,^(
m>=;$#0*&"n(=,(06"(M<"(C'&(,=;$=$;(
06"(5#&#<"0"&,^((
mF'$8"n(=,(06"(M<"(C'&(8&"#M$;(#(
$"O($'$8"^((
mG$8&B5M'$n(=,(06"(M<"(C'&(06"(
"$8&B5M'$('C(06"(%#0#(0'(U"(
0&#)8+"%^(
m3'*$0(9#8+n(=,(06"(0'0#2(M<"(0'(
<'*$0("#86(,6=55=$;(5#8+#;"P(06=,(=,(
&"2#0"%('$2B(0'(06"(g&,0(,0"5(
5&","$0"%(=$(06"(n>0"5n(0#U^(
Evalua+on9
IJ(
?=;^(Z^(9&'8",,=$;(M<"('C("#86(,0"5(
L$(?=;^(ZP(06"(M<"(C'&("#86(,0"5('C(06"(
#*06"$M8#M'$(5&'8",,=$;(=,(%=,52#B"%^(H6"(
2'O"&($*<U"&,(#&"("#86(,0"5(,6'O$(=$(?=;^(D^((
Evalua+on9
ID(
?=;^([^(o="O(%=,+(#$%($"0O'&+(8'$,*<5M'$(
Evalua+on9
II(
?=;^(\^(GA#2*#M'$(O=06(1!:X0>"(#$%(E?31(
4"(,=<*2#0"(06"(5&'5',"%(,86"<"(*,=$;(C'&<#2(,"8*&=0B(A"&=g8#M'$(06&'*;6(06"(U&'#%2B(#88"50"%(XoL>9X(0''2(
aXV3XF-E(et#al.P(IJJ\b(
H6"(XoL>9X(0''2('$2B(%"0"80,(=C(#(,"8*&=0B(5&'0'8'2(=,(,"8*&"(#;#=$,0(06"(&"52#B(#$%(<#$:=$:06":<=%%2"(#p#8+,^(
Result9
IY(
?=;^(I^(GS#<52"('C(?#80'&(X*06"$M8#M'$(
Analyze9
IZ(
9"&C'&<#$8"(GA#2*#M'$k(
L$(H#U2"(LLL(#$%(Lok(
12"#&2BP(=0(8#$(U"(,""$(=$(H#U2"(LLL(#$%(Lo(06#0(06"($"0O'&+(M<"(%"5"$%,(A"&B(<*86('$(
06"(2'8#M'$^(
L$(06"(8'$0"S0('C(12'*%(1'<5*M$;(#(A#&=#M'$('C(<'&"(06#$(D(<=22=,"8'$%('88*&&"%(=$(
,'<"(,0"5,(0'(06"(5&"A='*,('$",^(
Q*,MCB=$;(06#0(%=q"&"$0(&'*0",(<#B('88*&(U"0O""$(06"(82="$0(#$%(06"(,"&A"&^(
L$(?=;^(Zk((
r'*(8#$(,""(06#0(06"(2'$;",0(M<"(U"2'$;,(0'(06"(82="$0(U"8#*,"(=0(6#,(2'O"&(5&'8",,'&(
5'O"&^(
X$'06"&(5'=$0(06#0(8#$(U"(#$#2BT"%P(=,(06#0(06"(12'*%(O#,(6=;6(=$(5&'8",,=$;(06#$(06"(?';(
"$A=&'$<"$0P(U"8#*,"(=0(=,(52#8"(O=06(6=;6(5&'8",,=$;(5'O"&^(
Analyze9
I[(
3"<'&B(#$%(F"0O'&+(1'$,*<5M'$k(
L$(?=;^([(a2"sbk(
r'*(8#$(#2,'(,""(06#0(#U'*0([(+7('C(<"<'&B(=,(*,"%(=$(5&'8",,=$;(aO#,("S"8*0"%(Y(M<",(
06"(,#<"(8'%"b^(
H6"(2=U&#&B(*,"%(DDK^[(+7('$(06"(,"&A"&(#$%(DDZ^\(+7('$(06"(82="$0(%=,+(C'&('5"&#M'$^(
L$(?=;^([(a&=;60bk((
O"(8#$(,""(06#0(DJJ(UB0",(#,(=$5*0(#$%(DR[(UB0",(#&"(8'<=$;('*0('C("#86(#*06"$M8#M'$(
&"j*",0^(
>=<*2#M'$(C'&(?'&<#2(>"8*&=0B(A"&=g8#M'$(*,=$;(XoL>9X(H''2(
L$(?=;^(\k(
H6"(5&'0'8'2(=,(C&""(C&'<(&"52#B(#$%(<#$:=$:06":<=%%2"(#p#8+,P(,=$8"(06"(&",*20,(
'U0#=$"%(C&'<(,"8*&=0B(A"&=g8#M'$,(#86="A"%(#(,"8*&"(a>X?Gb(5&'0'8'2P(#88'&%=$;(0'(06"(
>9XF(0''2(=$(06"(E?31(#$%(1!:X0>"(U#8+"$%,^(
Conclusion9
I\(
E&9)1#Q$(9/"&)$
Conclusion9
%0$/"+.$'('#)8$($0#L$-9/9(5$(9/"#021(2&0$-&*#5$L(.$+0/)&*91#*$+0$%&!$#0:+)&0-#0/.$3&)$/"#$Z&,$
F&-'920,$1&0/#S/.K$
=9/"#021(2&0$+.$'#)3&)-#*$*9)+0,$/"#$"(0*."(M#8$-&)#$.'#1+d1(554$*9)+0,$/"#$:#)+d1(2&0$&3$/"#$
=9/"#021(2&0$Z(1/&).Q$F"(55#0,#^@#.'&0.#$Z9012&08$@#.'&0.#$!+-#$(0*$B&01#K$
!"#$')#.#0/$L&)M$')#.#0/#*$.&-#$5+-+/(2&0.K$%0$/#)-.$&3$.9+/(65#$(5,&)+/"-.8$+/$*&#.$0&/$')#.#0/$"+,"$
'#)3&)-(01#$+0$*(/($#01)4'2&0$L+/"$/"#$=?E$(5,&)+/"-$5+6)()4K$$
!"#$1&-6+0(2&0$&3$-9/9(5$(9/"#021(2&0$(0*$*+j#)#0/$3(1/&).$+0$(0$%&!$#0:+)&0-#0/$+.$($1&0/)+692&0$&3$
/"+.$'('#)K$<&L#:#)8$)#5(/#*$L&)M.$.9--()+N#*$+0$!(65#$%$*&$0&/$1&-6+0#$-9/9(5$(9/"#021(2&0$(0*$
*+j#)#0/$3(1/&).$+0$/"#+)$')&'&.(5.K$`&)#&:#)8$/"#4$*&$0&/$*#.1)+6#$(04$'#)3&)-(01#$)#.95/.K$F&0.#[9#0/548$
+/$+.$0&/$'&..+65#$/&$1&-'()#$'#)3&)-(01#$d0*+0,.$&6/(+0#*$+0$/"+.$'('#)$L+/"$(04$&/"#)$)#5(/#*$L&)MK$
Z&)$39/9)#$L&)M8$+/$+.$')&'&.#*$/&$+-')&:#$/"#$-&*#5$L+/"$/"#$9.#$&3$.#:#)(5$/4'#.$&3$1+'"#).8$9.+0,$
"(0*."(M#$.9+/#.8$.+-+5()$/&$/"(/$9.#*$+0$;!>EJ$!)(0.'&)/$>(4#)$E#19)+/4$R$E#19)#$E&1M#/.$>(4#)$;EE>JK$
IR(
X3LFP(V*6*2("0(#2^(X(2=;60(O"=;60(#*06"$M8#M'$(5&'0'8'2(C'&(L'H:"$#U2"%(%"A=8",(=$(%=,0&=U*0"%(12'*%(1'<5*M$;("$A=&'$<"$0^(?*0*&"(."$"&#M'$(1'<5*0"&(
>B,0"<,P(A^(R_P(5^(DJJ[:DJDKP(IJD_^(
XV3XF-EP(X2",,#$%&'("0(#2^(XoL>9Xk(#*0'<#0"%(A#2=%#M'$('C(=$0"&$"0(,"8*&=0B(5&'0'8'2,(#$%(#552=8#M'$,^(GV1L3(F"O,P(A^(\ZP(IJJ\^(
.E9GP(9&',#$0#("0(#2^(!=;60O"=;60(#$%(5&=A#8B:5&","&A=$;(V?L-(#*06"$M8#M'$(,86"<"(C'&(%=,0&=U*0"%(L'H(=$C&#,0&*80*&"(O=06(,"8*&"(2'8#2=T#M'$(,"&A=8",(C'&(,<#&0(8=0B(
"$A=&'$<"$0^(?*0*&"(."$"&#M'$(1'<5*0"&(>B,0"<,P(IJDR^(
.Ve-HFGVP(!*+#,(-"&$"&("0(#2^(X*0"$M8#tu'(<*0*#(%"($v,(,"$,'&",(8'<($v,(=$0"&<"%=w&=',(5#&#(L'H($'(8'$0"S0'(%"(?';(1'<5*M$;^(a&)M."&'$*#$!)(6(5"&.$*#$
%0+1+(kl&$F+#0md1($#$\)(*9(kl&$*&$Ei@F$;a!\$^$Ei@FJP(x>^2^yP(A^(DP(<#B(IJD_(
cX!!GVP(>0"56#$](dXVFE@>dE>P(>0#<#M,](>1cVEHcP(16&=,0'56^(H6"(=$0"&$"0('C(06=$;,(=$(#$("$0"&5&=,"(8'$0"S0^(L$k(?*0*&"(L$0"&$"0(>B<5',=*<^(>5&=$;"&P(7"&2=$P(
c"=%"2U"&;P(IJJ_^(5^(DZ:I_^(
L7VXcL3P(3#;"%(c#<#%#^(E80'5*,k(X$(G%;":C';(3*0*#2(X*06"$M8#M'$(>86"<"^(LQ(F"0O'&+(>"8*&=0BP(A^(D_P($^(\P(5^(DJ_K:DDJDP(IJD\^(
LEV.XP(3=86#"2#P("0(#2^(Z&,$F&-'920,$F&01#'/9(5$`&*#5^(F'^(>5"8=#2(9*U2=8#M'$(aFL>H(>9b:[JJ:YI[^(aIJD_b^(
QXFP(3^(X^P(et#al^(=$)&69./$(9/"#021(2&0$.1"#-#$3&)$&6.#):+0,$)#.&9)1#.$+0$/"#$+0/#)0#/$&3$/"+0,.$#0:+)&0-#0/^(L$(H&*,0P(>"8*&=0B(#$%(9&=A#8B(=$(1'<5*M$;(#$%(
1'<<*$=8#M'$,(aH&*,01'<bP(IJDZ(LGGG(DY06(L$0"&$#M'$#2(1'$C"&"$8"('$P(5#;",(IJ[fIDD^(LGGG^(aIJDZb^(
d@3XVP(9&=B#$(3#2#&A=T6=](.XF-cLP(@,6#(-"A=^(G$6#$8"%(-H!>(O=06(1'X9:U#,"%(#*06"$M8#M'$(,86"<"(C'&(06"(=$0"&$"0('C(06=$;,(=$(6"#2068#&"(#552=8#M'$^(H6"(
Q'*&$#2('C(>*5"&8'<5*M$;P(5^(D:IDP(IJDR^(
!LP(F#$](!L@P(-'$;S=](FG9X!P(>*&B#^(!=;60O"=;60(<*0*#2(#*06"$M8#M'$(C'&(L'H(#$%(=0,(#552=8#M'$,^(LGGG(H&#$,#8M'$,('$(>*,0#=$#U2"(1'<5*M$;P(A^(IP($^(ZP(5^(Y[K:YRJP(
IJDR^(
EH4XrP(-#A"](VGG>P(EO"$^(G)8="$0(#$%(M<"2B(<*0*#2(#*06"$M8#M'$^(X13(>L.E9>(E5"&#M$;(>B,0"<,(V"A="OP(A^(IDP($^(DP(5^(_:DJP(DK_R^(
9LVX3@Hc@P(>"2OB$](-E>>P(V'U=$^(E$(,"$,'&:U#,"%(,'2*M'$,(C'&(,=<*20#$"'*,(5&","$8"('C(<*2M52"(V?L-(0#;,^(-"8=,='$(>*55'&0(>B,0"<,P(A^(K[P(5^(DJI:DJKP(IJDR^(
>1cFGLGVP(7^(=''5+#*$F)4'/&,)('"4(aIF%(G%^bk(9&'0'8'2,P(X2;'&=06<,P(#$%(>'*&8"(1'%"(=$(1^(Q'6$(4=2"B(N(>'$,P(L$8^P(F"O(r'&+P(FrP(@>X^(aDKK[b^(
HG4XVLP(X#+#$+,6#](.@9HXP(7^(7^(1&B50#$#2B,=,('C(#($'A"2(*20&#:2=;60O"=;60(<*0*#2(#*06"$M8#M'$(5&'0'8'2(C'&(L'H(%"A=8",(*,=$;(V?L-(0#;,^(H6"(Q'*&$#2('C(
>*5"&8'<5*M$;P(A^(RYP($^(YP(5^(DJ_[:DDJIP(IJDR^(
4@P(?#$("0(#2^(X($'A"2(<*0*#2(#*06"$M8#M'$(,86"<"(O=06(C'&<#2(5&''C(C'&(,<#&0(6"#2068#&"(,B,0"<,(*$%"&(;2'U#2(<'U=2=0B($"0O'&+,($'M'$^(1'<5*0"&,(N(G2"80&=8#2(
G$;=$""&=$;P(A^(\_P(5^(DJR:DD_P(IJD_^(
zLXP(?"$;("0(#2^(L$0"&$"0('C(06=$;,^(L$0"&$#M'$#2(Q'*&$#2('C(1'<<*$=8#M'$(>B,0"<,P(A^(I[P($^(KP(5^(DDJD:DDJIP(IJDI^(
References9
I_(
Thank you very much!9
2"#$%&'^2'){5',;&#%^*C,8^U&(
2*+#,^;&*%0$"&{;&#%^*C,8^U&(
8#&2',^O",056#22{*C,8^U&(
8#&2#^<"&+2"^O",056#22{*C,8^U&( IK(
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
As health data are very sensitive, there is a need to prevent and control the health data with end-to-end security solutions. In general, a number of authentication and authorization schemes are available to prevent and protect the sensitive data, which are collected with the help of wearable Internet of Things (IoT) devices. The transport layer security (TLS) protocol is designed to transfer the data from source to destination in more reliable manner. This protocol enables a user to overcome the no lost or reordered messages. The more challenge with TLS is to tolerate unreliability. In order to overcome this issue, Datagram transport layer security (DTLS) protocol has been designed and used in low-power wireless constrained networks. The DTLS protocol consists of a base protocol, record layer, handshake protocol, ChangeCipherSpec and alert protocol. The complex issue with the DTLS protocol is the possibility of an attacker could send a number of ClientHello messages to a server. This scenario would cause a denial-of-service (DOS) attack against the server. This DoS attack enables new connection between the attacker and server, increasing attacker bandwidth, and allocation of resources for every ClientHello message. In order to overcome this issue, we have proposed a smart gateway-based authentication and authorization method to prevent and protect more sensitive physiological data from an attacker and malicious users. The enhanced smart gateway-based DTLS is demonstrated with the help of Contiki Network Simulator. The packet loss ratio is calculated for the CoAP, host identity protocol, CoAP-DTLS and CoAP-enhanced DTLS to evaluate the performance of the proposed work. Data transmission and handshake time are also calculated to evaluate the efficiency of the enhanced DTLS.
Article
Full-text available
Internet of Things (IoT) is an evolving architecture which connects multiple devices to Internet for communication or receiving updates from a cloud or a server. In future, the number of these connected devices will increase immensely making them an indistinguishable part of our daily lives. Although these devices make our lives more comfortable, they also put our personal information at risk. Therefore, security of these devices is also a major concern today. In this paper, we propose an ultra-lightweight mutual authentication protocol which uses only bitwise operation and thus is very efficient in terms of storage and communication cost. In addition, the computation overhead is very low. We have also compared our proposed work with the existing ones which verifies the strength of our protocol, as obtained results are promising. A brief cryptanalysis of our protocol that ensures untraceability is also presented.
Article
Full-text available
Authentication is an important and challenging issue for the security of Fog computing since, services are offered to massive-scale end users (Fog users or Edge) by front Fog servers (or Fog nodes). In this paper, we propose a secure and efficient mutual authentication scheme for the EdgeFog-Cloud network architecture, to mutually authenticate Fog users at the Edge of the network, with the Fog servers at the Fog layer. Our scheme requires a user – roaming randomly in the network – to hold only one long-lived master secret key (with long enough bit-length) allowing him to communicate with any of the Fog servers in the network, in a fully authenticated way. The Fog users are able to mutually authenticate with new Fog servers joining the network, without the need to re-register and without any extra overheads. Moreover, the servers in the Fog are required to store only one secret key for each Fog user. On the other hand, the Fog users are totally unrelated to any public-key infrastructure. The scheme requires the Fog user to perform very few hash invocations and symmetric encryptions/decryptions. Therefore, the scheme is suitable to be efficiently implemented on the Fog user’s smart card/device.
Conference Paper
Full-text available
AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.
Conference Paper
Full-text available
This paper puts the Internet of Things in a wider context: How it relates to the Future Internet overall, and where the business value lies so that it will become interesting for enterprises to invest in it. Real-World Awareness and Business Process Decomposition are the two major paradigms regarding future business value. The major application domains where the Internet of Things will play an important role and where there are concrete business opportunities are highlighted. But there are also many technical challenges that need to be addressed. These are listed and it is shown how they are tackled by existing research projects with industrial participation.
Article
Smart healthcare is an emergent part in modern telemedical technology. To solve the problem of collecting information from roaming patients, global mobility network (GLOMONET) is a good way for data transferring. It is common sense that wireless circumstance is full of attacks, and the case how to protect the wireless network away from danger attracts researchers. We present a new two-factor authentication scheme for GLOMONETs to vanquish the hazard. Then the formal proof demonstrates that the attacker can crack the session key and the privacy of the scheme with a negligibly higher probability than directly guessing the password. Moreover, according to the informal analysis model, our scheme meets all the security properties. Finally, via performance comparison and network communication simulation by NS-3, our scheme is fit for practicality.
Article
With the widespread popularity and usage of Internet-enabled devices, Internet of things has become popular now a days. However, data generated from various smart devices in IoT is one of the biggest concerns. To process such a large database repository generated from all types of devices in IoT, Cloud Computing (CC) has emerged as a key technology. But, the private information from IoT devices is stored in distributed private cloud server so that only legitimate users are allowed to access the sensitive information from the cloud server. Keeping focus on all these points, this article first shows security vulnerabilities of the multi-server cloud environment of the protocols proposed by Xue et al. and Chuang et al. Then, we propose an architecture which is applicable for distributed cloud environment and based on it, an authentication protocol using smartcard has been proposed, where the registered user can access all private information securely from all the private cloud servers. To proof security strength of our protocol, we have used AVISPA tool and BAN logic model in this article. In addition, informal cryptanalysis confirms that the protocol is protected against all possible security threats. The performance analysis and comparison confirm that the proposed protocol is superior than its counterparts.
On sensor-based soluMons for simultaneous presence of mulMple RFID tags. Decision Support Systems, v. 95
  • Robin Doss
DOSS, Robin. On sensor-based soluMons for simultaneous presence of mulMple RFID tags. Decision Support Systems, v. 95, p. 102-109, 2017.