Mutual authentication scheme of IoT devices in fog computing environment

  • PDF / 937,879 Bytes
  • 15 Pages / 595.276 x 790.866 pts Page_size
  • 54 Downloads / 257 Views

DOWNLOAD

REPORT


(0123456789().,-volV)(0123456789(). ,- volV)

Mutual authentication scheme of IoT devices in fog computing environment Sunakshi Singh1



Vijay Kumar Chaurasiya1

Received: 3 March 2020 / Revised: 6 November 2020 / Accepted: 7 November 2020 Ó Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract The radical shift in the technology with the advent of connected things has led to the significant proliferation in demand for IoT devices, commonly called ‘smart devices’. These devices are capable of data collection, which can help in umpteen applications, particularly in healthcare. With the tremendous growth in these resource-constrained end devices, there has been a substantial increase in the number of attack varieties. Since these end devices deal with the sensitive data that might cause severe damage if not handled properly. Hence, defending its integrity, preserving its privacy, and maintaining its confidentiality as well as availability is of utmost importance. However, there are many protocols, models, architecture tools, etc. proposed to provide security. Nevertheless, almost every solution propound so far is not fully resilient and lacks in giving full protection to the system in some way or the other. So here, we have proposed a lightweight anonymous mutual authentication scheme for end devices and fog nodes. Keywords Authentication  Security  Anonymous  Fog computing  Identity based encryption

1 Introduction The evolution of the internet has introduced a new trend of connecting every object (with the internet) so that they can operate without human intervention. These devices can sense the surrounding environment and adjust accordingly, and thus called ‘smart devices’ examples include smart mobiles, smart refrigerators, smartwatches, smart fire alarm, medical sensors, fitness trackers, smart security systems, air quality sensors, etc. The reasons behind the development of these devices were to enhance the quality of day to day life and living standard at minimal operational cost [1]. These devices generate immense amounts of data, which is processed by cloud as it facilitates on-demand access to shared full of resources [2]. Later on, when more devices started getting connected, network congestion happened. This affects the normal functioning of latency-sensitive devices such as connected vehicles. These applications required instant processing while the cloud & Sunakshi Singh [email protected] 1

Indian Institute of Information Technology Allahabad, Road Devghat, Jhalwa, Prayagraj, Uttar Pradesh 211015, India

was centralized; it could not handle the data processing in real-time. It was in 2012 that Cisco introduced the concept of fog computing to tackle the above-aforemen- tioned limitations of cloud [3]. The idea proposed was to keep the data with the local devices rather than routing everything to the central control center. Unlike mobile edge computing and cloudlets (which are similar concepts), fog cannot function independently. Thus it is said that it is not the