EconPapers    
Economics at your fingertips  
 

RETRACTED ARTICLE: Lightweight multi-level authentication scheme for secured data transmission in IoT-Fog context

Pratik Kanani (), Pooja Vartak (), Kanchan Dabre (), Vipul Gohil (), Archana Nanade (), Niti Desai () and Mamta Padole ()
Additional contact information
Pratik Kanani: Dwarkadas J. Sanghvi College of Engineering
Pooja Vartak: Dwarkadas J. Sanghvi College of Engineering
Kanchan Dabre: Dwarkadas J. Sanghvi College of Engineering
Vipul Gohil: NMIMS University
Archana Nanade: NMIMS University
Niti Desai: NMIMS University
Mamta Padole: The Maharaja Sayajirao University of Baroda

Journal of Combinatorial Optimization, 2023, vol. 45, issue 2, No 5, 27 pages

Abstract: Abstract The IoT-sensed data is normally processed by Cloud Servers (CSs), but to reduce the cloud load and to avert network bandwidth wastage, Fog Computing (FC) is used. FC storages are LAN-based and they are not permanent. To store the data permanently, FNs (Fog Node) and IoT devices are making use of CSs. In the current scenario, we have IoT devices, FNs, and CSs. To process IoT data more efficiently, Multi-level FC architecture is suggested where normally, different security schemes are used at different information levels. Sometimes, the middle layer device has two varying security schemes, one to process lower-level data, and another to communicate the results with higher-level devices. Having multiple security algorithms make it more difficult to deploy any application, while the high complexity because of the multiple security schemes makes the system more vulnerable. Here, one unique lightweight security scheme is suggested that can single-handedly satisfy all the levels of security with different security levels. The scheme is based on Logical operations and it is multi-keyed logic. The proposed scheme makes sure that it has a lower time and space complexity to support IoT devices. In addition to that, the scheme has varied key-length features, which makes it capable to secure higher-level data at higher-level devices like servers. In designing, different HMACs, Op_codes, and chaining logic are used. The proposed mechanism is also analogized with other existing techniques and it is discovered to be superior to the others. Furthermore, it is tested against various attacks to prevent any vulnerabilities from exploitations. The given security scheme is lightweight and it provides security assurance in data transmission in the IoT-Fog, Fog to multi-Fog, and Fog to Cloud end.

Keywords: Lightweight encryption; Security; IoT; Fog; Multilevel Fog; Logical functions; Data communication; Mobile networks (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s10878-023-00987-x Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:jcomop:v:45:y:2023:i:2:d:10.1007_s10878-023-00987-x

Ordering information: This journal article can be ordered from
https://www.springer.com/journal/10878

DOI: 10.1007/s10878-023-00987-x

Access Statistics for this article

Journal of Combinatorial Optimization is currently edited by Thai, My T.

More articles in Journal of Combinatorial Optimization from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:jcomop:v:45:y:2023:i:2:d:10.1007_s10878-023-00987-x