Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog
Jan Lansky,
Mahyar Sadrishojaei,
Amir Masoud Rahmani (),
Mazhar Hussain Malik,
Faeze Kazemian and
Mehdi Hosseinzadeh ()
Additional contact information
Jan Lansky: Department of Computer Science and Mathematics, Faculty of Economic Studies, University of Finance and Administration, 10100 Prague, Czech Republic
Mahyar Sadrishojaei: Faculty of Industry, University of Applied Science and Technology (UAST), Tehran 11369, Iran
Amir Masoud Rahmani: Future Technology Research Center, National Yunlin University of Science and Technology, Douliou 64002, Taiwan
Mazhar Hussain Malik: Department of Computer Science and Creative Technologies, University of the West of England—UWE Bristol, Bristol BS16 1QY, UK
Faeze Kazemian: Department of Computer Science, University of Applied Science and Technology (UAST), Tehran 11369, Iran
Mehdi Hosseinzadeh: Pattern Recognition and Machine Learning Lab, Gachon University, 1342 Seongnamdaero, Seongnam 13120, Korea
Mathematics, 2022, vol. 10, issue 22, 1-17
Abstract:
The rapid development of technology has made the Internet of Things an integral element of modern society. Modern Internet of Things’ implementations often use Fog computing, an offshoot of the Cloud computing that offers localized processing power at the network’s periphery. The Internet of Things serves as the inspiration for the decentralized solution known as Fog computing. Features such as distributed computing, low latency, location awareness, on-premise installation, and support for heterogeneous hardware are all facilitated by Fog computing. End-to-end security in the Internet of Things is challenging due to the wide variety of use cases and the disparate resource availability of participating entities. Due to their limited resources, it is out of the question to use complex cryptographic algorithms for this class of devices. All Internet of Things devices, even those connected to servers online, have constrained resources such as power and processing speed, so they would rather not deal with strict security measures. This paper initially examines distributed Fog computing and creates a new authentication framework to support the Internet of Things environment. The following authentication architecture is recommended for various Internet of Things applications, such as healthcare systems, transportation systems, smart buildings, smart energy, etc. The total effectiveness of the method is measured by considering factors such as the cost of communication and the storage overhead incurred by the offered integrated authentication protocol. It has been proven that the proposed technique will reduce communication costs by at least 11%.
Keywords: Internet of things; mutual authentication; fog; cloud computing; key agreement; asymmetric key (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)
Downloads: (external link)
https://www.mdpi.com/2227-7390/10/22/4166/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/22/4166/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2022:i:22:p:4166-:d:966031
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().