Abstract
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed of smart ubiquitous objects that are seamlessly connected to the Internet. These objects are deployed as Low power and Lossy Networks (LLN) to provide innovative services in various application domains such as smart cities, smart health, and smart communities. The LLN is a form of a network where the interconnected devices are highly resource-constrained (i.e., power, memory, and processing) and characterized by high loss rates, low data rates, and instability in the communication links. Additionally, IoT devices produce a massive amount of confidential and security-sensitive data. Various cryptographic-based techniques exist that can effectively cope with security attacks but are not suitable for IoT as they incur high consumption of resources (i.e., memory, storage and processing). One way to address this problem is by offloading the additional security-related operations to a more resourceful entity such as a fog-based node. Generally, fog computing enables security and analysis of latency-sensitive data directly at the network’s edge. This paper proposes a novel Fog Security Service (FSS) to provide end-to-end security at the fog layer for IoT devices using two well-established cryptographic schemes, identity-based encryption, and identity-based signature. The FSS provides security services such as authentication, confidentiality, and non-repudiation. The proposed architecture would be implemented and evaluated in an OPNET simulator using a single network topology with different traffic loads. The FSS performed better when compared with the APaaS and the legacy method.
Subject
Control and Optimization,Computer Networks and Communications,Instrumentation
Reference44 articles.
1. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions
2. An energy-aware service composition algorithm for multiple cloud-based IoT applications
3. Former Cisco CEO John Chambers Predicts 500 Billion Connected Devices by 2025https://www.businessinsider.com/former-cisco-ceo-500-billion-connected-devices-by-2025-2015-11?r=US&IR=T&IR=T
Cited by
94 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Simulators for Fog Computing and Information Processing;Proceedings of the National Academy of Sciences, India Section A: Physical Sciences;2024-08-30
2. BEFF-SIGS: blockchain-enhanced fog framework- securing IoT data integrity and green sustainability through scalable authentication-authorization;International Journal of Computers and Applications;2024-07-20
3. IoT Smart Healthcare Security Challenges and Solutions;Advances in Medical Technologies and Clinical Practice;2024-06-07
4. Recent Developments in Designing Internet of Things Architectures;2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC);2024-06-05
5. A Comprehensive Analysis of Security Dimensions within the Growing Sphere of the Internet of Drones (IoD);2024 Seventh International Women in Data Science Conference at Prince Sultan University (WiDS PSU);2024-03-03