A Cooperation of Fog Computing and Smart Gateways in a Secure and Efficient Architecture for IoT-Based Smart Homes | ||
Engineering and Technology Journal | ||
Article 10, Volume 37, 7A, July 2019, Pages 290-301 PDF (420.42 K) | ||
Document Type: Research Paper | ||
DOI: 10.30684/etj.37.7A.10 | ||
Authors | ||
Amin H. Seno1; Sahar A. Alshammari2 | ||
1Ferdowsi University of Mashhad | ||
2Computer Engineering Department, Ferdowsi University of Mashhad, Iran | ||
Abstract | ||
Nowadays Internet of Things (IoT) is growing to be a serious factor in numerous areas of our daily life style. Internet of Things brings different opportunities of intelligence to important aspects such as health, payments, energy management, industrial sectors, transportation and also many other specialties. It is important to notice that the interaction between these two part the embedded equipment and Cloud based web services is such a common or prevalent scenario of Internet of Things deployment. When it comes to the security point of view, jointly users (consumer) and smart devices need to reassure and establish a secure and confident communication channel and should have a perfect form of digital identity. In many situations, IoT devices needs an already or earlier established infrastructure for their usage and that cannot be managed by the device owner, such as the case in smart homes. Furthermore, the scenario presupposes a security stack that it is appropriate for heterogeneous devices which can be integrated in Internet of Things frameworks or in already presented operating systems. We proposed a Foggy Smart Home Architecture (FSHA). We identify end users by writing an authentication and authorization protocol, and we will reduce the time required for this security operation, so that the proposed method can prevent Non-manipulation, online/offline password guessing attack and user impersonation attack and man-in-the-middle attack. Our method improves performance of smart home and using fog layer can minimize traffic between cloud and gateways. | ||
Keywords | ||
Fog Computing; security; Internet of Things; Smart home; IoT; authentication | ||
References | ||
[1] I. Stojmenovic and S. Wen, “The fog computing paradigm: Scenarios and security issues,” Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on, IEEE, (2014). [2] Q. Jing, A.V. Vasilakos, J. Wan, J. Lu and D. Qiu, “Security of the internet of things: Perspectives and challenges,” Wireless Networks 20, 8, 2481-2501, 2014. [3] S. Li, T. Tryfonas and H. Li, “The internet of things: a security point of view,” Internet Research 26, 2, 337-359, 2016. [4] S. Yi, Z. Qin and Q. Li, “Security and privacy issues of fog computing: A survey International Conference on Wireless Algorithms, Systems, and Applications, Springer,” 2015. [5] S.R. Moosavi, T.N. Gia, A.-M. Rahmani, E. Nigussie, S. Virtanen, J. Isoaho and H. Tenhunen, “SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways,” Procedia Computer Science 52, 452-459, 2015. [6] L. Barreto, A. Celesti, M. Villari, M. Fazio and A. Puliafito, “An authentication model for IoT clouds,” Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, ACM, 2015. [7] C.-T Li, T.-Y. Wu, C.-L. Chen, C.-C. Lee and C.-M. Chen, “An efficient user authentication and user anonymity scheme with provably security for iot-based medical care system,” Sensors 17, 7, 1482, 2017. [8] P. Kumar, A. Braeken, A. Gurtov, J. Iinatti and P. H. Ha, “Anonymous Secure Framework in Connected Smart Home Environments,” IEEE Transactions on Information Forensics and Security 12, 4, 968-979, 2017. [9] M. Amadeo, A. Molinaro, S. Y. Paratore, A. Altomare, A. Giordano and C. Mastroianni, “A Cloud of Things framework for smart home services based on Information Centric Networking,” Networking, Sensing and Control (ICNSC), 2017 IEEE 14th International Conference on, IEEE., 2017. [10] J. Dutta, and S. Roy, “IoT-fog-cloud based architecture for smart city: Prototype of a smart building,” Cloud Computing, Data Science & EngineeringConfluence, 2017 7th International Conference on, IEEE, 2017. [11] J. Li, J. Jin, D. Yuan, M. Palaniswami and K. Moessner, “EHOPES: Data-centered Fog platform for smart living,” Telecommunication Networks and Applications Conference (ITNAC), 2015 International, IEEE, 2015. [12] Y. Sahni, J. Cao, S. Zhang and L. Yang, “Edge Mesh: A new paradigm to enable distributed intelligence in Internet of Things,” IEEE Access 5, 16441-16458, 2017. [13] W. Lee, K. Nam, H.-G. Roh and S.-H. Kim, “A gateway based fog computing architecture for wireless sensors and actuator networks,” Advanced Communication Technology (ICACT), 2016 18th International Conference on, IEEE, 2016. [14] A. M. Rahmani, T. N. Gia, B. Negash, A. Anzanpour, I. Azimi, M. Jiang and P. Liljeberg, “Exploiting smart ehealth gateways at the edge of healthcare internet-ofthings: a fog computing approach,” Future Generation Computer Systems, 2017. [15] H. Gupta, A. Vahid Dastjerdi, S. K. Ghosh and R. Buyya, “iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments,” Software: Practice and Experience 47, 9, 275-1296, 2017. [16] http://math.nist.gov/javanumerics/jama/ [17] Y. Park, and Y. Park, “A Selective Group Authentication Scheme for IoT-Based Medical Information System,” Journal of medical systems 41, 4, 48, 2017. [18] Kabirzadeh, Sabihe, Dadmehr Rahbari, and Mohsen Nickray. “A Hyper Heuristic Algorithm for Scheduling of Fog Networks.” In Proceedings of the 21st Conference of Open Innovations Association FRUCT, p. 20. FRUCT Oy, 2017. | ||
Statistics Article View: 260 PDF Download: 412 |