Enhancing Secure Mutual Authentication in Mobile Fog Computing Environment

D. D, J. R
{"title":"Enhancing Secure Mutual Authentication in Mobile Fog Computing Environment","authors":"D. D, J. R","doi":"10.1109/ICACTA54488.2022.9753559","DOIUrl":null,"url":null,"abstract":"Fog computing that extends the cloud nearby to the IoT devices. The advent of IoT technology generates a huge amount of data and is processed in the cloud, this increases the latency. Many time-sensitive applications are affected by delayed response. Fog computing solves the latency problem by processing near the data generating device. Because of the nature of fog computing mobility support, dynamic environment, geographic distribution, location awareness existing schemes do not provide better security. To address these issues, this paper provides mutual secure authentication between each entity in the fog like between the cloud and fog node, between fog node and gateway, between gateway and IoT device. This security mechanism improves the authentication in the fog network. Mobility-based authentication providing mechanism can be implemented with the MobFogSim mobility dataset that is collected from the Luxembourg traffic. Migration of the node is considered in mobility secure authentication.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACTA54488.2022.9753559","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Fog computing that extends the cloud nearby to the IoT devices. The advent of IoT technology generates a huge amount of data and is processed in the cloud, this increases the latency. Many time-sensitive applications are affected by delayed response. Fog computing solves the latency problem by processing near the data generating device. Because of the nature of fog computing mobility support, dynamic environment, geographic distribution, location awareness existing schemes do not provide better security. To address these issues, this paper provides mutual secure authentication between each entity in the fog like between the cloud and fog node, between fog node and gateway, between gateway and IoT device. This security mechanism improves the authentication in the fog network. Mobility-based authentication providing mechanism can be implemented with the MobFogSim mobility dataset that is collected from the Luxembourg traffic. Migration of the node is considered in mobility secure authentication.
增强移动雾计算环境下的安全互认证
雾计算将附近的云扩展到物联网设备。物联网技术的出现产生了大量的数据,并在云中处理,这增加了延迟。许多对时间敏感的应用程序都会受到延迟响应的影响。雾计算通过在数据生成设备附近进行处理来解决延迟问题。由于雾计算的性质支持移动性、动态环境、地理分布、位置感知,现有的方案不能提供更好的安全性。为了解决这些问题,本文提供了云与雾节点之间、雾节点与网关之间、网关与物联网设备之间等雾中各个实体之间的相互安全认证。这种安全机制提高了雾网络中的身份验证。基于移动性的身份验证提供机制可以通过从卢森堡流量收集的MobFogSim移动性数据集来实现。在移动性安全认证中考虑了节点的迁移。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信