Abstract

The Internet of Things (IoT) allows billions of physical objects to be connected to gather and exchange information to offer numerous applications. It has unsupported features such as low latency, location awareness, and geographic distribution that are important for a few IoT applications. Fog computing is integrated into IoT to aid these features to increase computing, storage, and networking resources to the network edge. Unfortunately, it is faced with numerous security and privacy risks, raising severe concerns among users. Therefore, this research proposes a contextual risk-based access control model for Fog-IoT technology that considers real-time data information requests for IoT devices and gives dynamic feedback. The proposed model uses Fog-IoT environment features to estimate the security risk associated with each access request using device context, resource sensitivity, action severity, and risk history as inputs for the fuzzy risk model to compute the risk factor. Then, the proposed model uses a security agent in a fog node to provide adaptive features in which the device’s behaviour is monitored to detect any abnormal actions from authorised devices. The proposed model is then evaluated against the existing model to benchmark the results. The fuzzy-based risk assessment model with enhanced MQTT authentication protocol and adaptive security agent showed an accurate risk score for seven random scenarios tested compared to the simple risk score calculations.

Highlights

  • A growing number of physical objects are being connected at an unprecedented rate, realising the idea of the Internet of Things (IoT) [1]

  • We proposed a contextual risk-based access control model that uses the security risk factor as one of the inputs for access decision making

  • Each objective of this study is evaluated by running the simulation and series of experiments and enhanced the MQTT authentication method simulated by using NodeMCU with dht22 sensors and localhost EMQX MQTT server

Read more

Summary

Introduction

A growing number of physical objects are being connected at an unprecedented rate, realising the idea of the Internet of Things (IoT) [1] It is the internetworking of various objects and network connectivity that allows these objects to communicate and exchange data, including sensors, smart meters, smartphones, smart vehicles, radio-frequency identification (RFID) tags, personal digital assistants (PDAs), and other items such as embedded devices, software, and actuators. With the advance of IoT, fog computing [2,3], has been introduced to bring services closer to the end-users by pooling the available computing, storage, and networking resources at the edge of the network. Fog computing is a virtualized platform that offers computational, networking, and storage services between cloud computing and end devices. The latency is lowered compared to when accessing to the cloud directly [4]

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call