Abstract

Fog computing as an extension to the cloud computing infrastructure has been invaluable in enhancing the applicability of the Internet of Things (IoT) paradigm. IoT based Fog systems magnify the range and minimize the latency of IoT applications. However, as fog nodes are considered transient and they offer authenticated services, when an IoT end device loses connectivity with a fog node, it must authenticate freshly with a secondary fog node. In this work, we present a new security mechanism to leverage the initial authentication to perform fast lightweight secondary authentication to ensure smooth failover among fog nodes. The proposed scheme is secure in the presence of a current de-facto Canetti and Krawczyk (CK)-adversary. We demonstrate the security of the proposed scheme with a detailed security analysis using formal security under the broadly recognized Real-Or-Random (ROR) model, informal security analysis as well as through formal security verification using the broadly-used Automated Validation of Internet Security Protocols and Applications (AVISPA) software tool. A testbed experiment for measuring computational time for different cryptographic primitives using the Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) has been done. Finally, through comparative analysis with other related schemes, we show how the presented approach is uniquely advantageous over other schemes.

Highlights

  • The adoption of Internet of Things (IoT) has been unprecedented

  • We present a detailed security analysis with both formal and informal security analysis, and a formal security verification using the AVISPA software validation tool to prove the robustness of the proposed scheme against various known attacks

  • We have highlighted the need for a fast authentication mechanism in case of fog nodes failure

Read more

Summary

Introduction

The adoption of Internet of Things (IoT) has been unprecedented. The concept has materialized into one of the most popular driver technology into the generation of ubiquitous connectivity. The IoT paradigm predicts an explosion of connected devices [3,4]. This, in spite of the distributed nature of IoT, put an unprecedented load on the existing centralized infrastructure. This issue is addressed with the fog computing paradigm and extension to cloud computing. Transient fog nodes can extend the connectivity of cloud computing infrastructure as well as reduce latency and pre-process data to reduce computational load [5]. By design, form an intermediate layer between the cloud infrastructure and the IoT end devices. By virtue of their deployment near the smart devices, offer location awareness, lower latency, capability for real-time interaction, and so forth

Objectives
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.