Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
- PDF / 2,534,946 Bytes
- 22 Pages / 439.37 x 666.142 pts Page_size
- 47 Downloads / 216 Views
Authentication‑based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment K. N. Pallavi1 · V. Ravi Kumar2
© Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract The emergence of fog computing has witnessed a big role in initiating secure communication amongst users. Fog computing poses the ability to perform analysis, processing, and storage for a set of Internet of Things (IoT) devices. Several IoT solutions are devised by utilizing the fog nodes to alleviate IoT devices from complex computation and heavy processing. This paper proposes an authentication scheme using fog nodes to manage IoT devices by providing security without considering a trusted third party. The proposed authentication scheme employed the benefits of fog node deployment. The authentication scheme using fog node offers reliable verification between the data owners and the requester without depending on the third party users. The proposed authentication scheme using fog nodes effectively solved the problems of a single point of failure in the storage system and offers many benefits by increasing the throughput and reducing the cost. The proposed scheme considers several entities, like end-users, IoT devices, fog nodes, and smart contracts, which help to administrate the authentication using access policies. The proposed authentication scheme using fog node provided superior results than other methods with minimal memory value of 4009.083 KB, minimal time of 76.915 s, and maximal Packet delivery ratio (PDR) of 76. Keywords Authentication · Smart contracts · Internet of Things (IoT) · Fog computing · Access Control
1 Introduction Fog computing came into existence as a new computing model that is able to accomplish a local form of processing, storage, and analysis for a batch of IoT devices. There are several IoT solutions devised by experts in using the fog nodes for getting relieved from the hard process of computational assignments [1]. Fog computing can be visualized as a medium * K. N. Pallavi [email protected] V. Ravi Kumar [email protected] 1
NMAM Institute of Technology, Nitte, Udupi District, Karnataka State 574110, India
2
Vidyavardhaka College of Engineering, Mysuru, Karnataka 570002, India
13
Vol.:(0123456789)
K. N. Pallavi, V. Ravi Kumar
to lower the latency by increasing cloud datacenters in order to combine with the edge of networks. [2–4]. Fog computation is a larger version of cloud computing and services of network edge [5]. Just like cloud computing, Fog computing provides information, storage, calculation, and application services to the end-users. Fog computing provides an interface between IoT devices and remote data centers [6]. Fog nodes can be brought into effective action in the appropriate sites. Fog nodes are capable and they are used for processing, transmitting, and storing received data. In Fog nodes, data and commands are received from both cloud and user. Moreover, they are used for filtering raw data and transmitting the consolidated d
Data Loading...