Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog
Abstract
:1. Introduction
- (1)
- Edge layer: This layer is nearest to users and devices and comprises numerous IoT or smart gadgets, including sensors, cell phones, smart cars, smart cards, and readers. Even though gadgets are capable of computation, they are often just used to perform the intelligent sensing of individual events or objects and to transmit the obtained information to the top layer for later storage and processing.
- (2)
- Fog layer: This layer is situated at the network’s edge and contains many Fog nodes. Typically, these Fog nodes comprise routers, gateways, switchers, access points, base stations, and Fog servers. These Fog nodes could be dispersed extensively among terminal devices and the Cloud, including at cafes, malls, subway stations, roads, and playgrounds. Smart services can be provided via Fog nodes located in a fixed location or on a vehicle connected to terminal devices. Furthermore, they may compute, transfer, and collect the sensed information they obtain, enabling fundamental analysis and delay-sensitive apps inside the Fog layer. In conclusion, Fog nodes are linked to IP core networks and Cloud data centers, and, by collaboration with Cloud data centers, they could acquire more robust storage and processing features.
- (3)
- Cloud layer: The Cloud layer consists of several storage features and servers with superior efficiency, to offer a variety of innovative software solutions including connected homes, intelligent transportation, smart manufacturing, and competent healthcare. This layer offers robust storage and computation capabilities to facilitate a wide variety of computational analyses and store a considerable quantity of data. In contrast to the standard Cloud computing paradigm, Fog computing does not perform all computations and storage in the Cloud. Various management tactics may be used to efficiently handle and organize the core Cloud to increase the usage of Cloud resources, per the requirement load principle.
- ▪
- Overcoming certain shortcomings in the relevant literature;
- ▪
- Exploring the infrastructure toward distributed Fog computing;
- ▪
- Developing a lightweight authentication framework for mutual authentication;
- ▪
- Utilizing lightweight, low-cost, and computationally straightforward encryption procedures;
- ▪
- Creating a centralized authentication method by a Trusted Third Party (TTP) for mutual authentication;
- ▪
- Investigating security threats, including eavesdropping, MITM, replay attack, side-channel, and brute force;
- ▪
- Assessing the authentication scheme effectiveness.
2. Literature Review
3. Proposed Mechanism
3.1. System Model
3.2. Authentication Protocol
- (1)
- Link from the Cloud to the Fog and vice versa;
- (2)
- Transmission from the Fog to the gadget and vice versa.
3.3. Safety Objectives
- Confidentiality: This is about to be implemented to control device access.
- Integrity: The original data have not been changed.
- Accessibility: The service ought to be accessible to lawful users.
- Non-repudiation: This guarantees somebody will not be able to refute things.
- Authentication: The process of providing proof of one’s identity.
- Authorization: This grant somebody permission to perform something.
- Access Control: This is who can access or utilize assets in a computing surrounding is controlled.
- Data Storage: This is constantly generating data and endpoints, sending them to the Fog nodes; since the volume of information gathered at the end of a Fog node is enormous, it is crucial to safeguard user data.
- Users Privacy: Restoration of privacy would be facilitated by limiting the study of service usage patterns and enabling authorized users only to access the assets they have.
- Location Privacy: Typically, the terminal device offloads/communicates with a neighboring Fog node. If such a Fog node is infiltrated, the hacker can determine the position of every edge device that has interacted with that node. Therefore, it is essential to protect the user’s location.
- Freshness: This component guarantees that the attacker is not transmitting any earlier messages. It is, thus, guaranteeing that the information is current.
- Forward Secrecy: Just after a session has ended or the user has left or relocated, no additional communications from that user are accepted or considered.
- Backward Secrecy: When a new member joins the group, previously transmitted messages must be hidden from view.
- (1)
- A replay attack: A lawful data transfer is intentionally or illegally repeated or postponed after it has already occurred.
- (2)
- MITM attack: In some cases, the attacker discreetly transmits and modifies the interactions among two parties.
- (3)
- Eavesdropping: Hackers attempt to obtain personal details.
- (4)
- Side-channel: Hacker extracts secrets from a network by analyzing physical parameters.
- (5)
- Brute force: Assuming every possible pair of the desired password until the password is hacked.
4. Procedure of Suggested Authentication Plan
- Stage 1: Preliminary
- Stage 2: Identification between the Cloud Server and Fog Node
- Stage 3: Registration of Devices
- ✓
- IPV6 hash identification;
- ✓
- Objects that have a public key TPK;
- ✓
- The thing’s private key encrypted by the Fog’s public key.
- Stage 4: Mutual Identification between the Fog and Device
- Stage 5: Authentication during the Inter-cluster Movement
4.1. Security Evaluation
- I.
- Protect against Brute Force
- II.
- Protect against Side-Channel
- III.
- Protect against MITM
- IV.
- Protect against Eavesdropping
- V.
- Protect against Node Capture
- VI.
- Protect against Replay Attacks
4.2. Appraisal of the Designed System
- (1)
- Increased Scalability and Response Time
- (2)
- Effectiveness
- (3)
- Safety and Protection
5. Performance Analysis
5.1. Communication Cost
5.2. Storage Overhead
6. Conclusions and Future Works
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Sadrishojaei, M.; Navimipour, N.J.; Reshadi, M.; Hosseinzadeh, M.; Unal, M. An energy-aware clustering method in the IoT using a swarm-based algorithm. Wirel. Netw. 2022, 28, 125–136. [Google Scholar] [CrossRef]
- Pokhrel, S.R.; Verma, S.; Garg, S.; Sharma, A.K.; Choi, J. An efficient clustering framework for massive sensor networking in industrial Internet of Things. IEEE Trans. Ind. Inform. 2020, 17, 4917–4924. [Google Scholar] [CrossRef]
- Sadrishojaei, M.; Navimipour, N.J.; Reshadi, M.; Hosseinzadeh, M. A new clustering-based routing method in the mobile internet of things using a krill herd algorithm. Clust. Comput. 2021, 25, 351–361. [Google Scholar] [CrossRef]
- Yousefi, S.; Derakhshan, F.; Aghdasi, H.S.; Karimipour, H. An energy-efficient artificial bee colony-based clustering in the internet of things. Comput. Electr. Eng. 2020, 86, 106733. [Google Scholar] [CrossRef]
- Rahmani, A.M.; Naqvi, R.A.; Malik, M.H.; Malik, T.S.; Sadrishojaei, M.; Hosseinzadeh, M.; Al-Musawi, A. E-Learning Development Based on Internet of Things and Blockchain Technology during COVID-19 Pandemic. Mathematics 2021, 9, 3151. [Google Scholar] [CrossRef]
- Sadrishojaei, M.; Navimipour, N.J.; Reshadi, M.; Hosseinzadeh, M. An Energy-Aware IoT Routing Approach Based on a Swarm Optimization Algorithm and a Clustering Technique. Wirel. Pers. Commun. 2022, 1–17. [Google Scholar] [CrossRef]
- Khanna, A.; Kaur, S. Internet of things (IoT), applications and challenges: A comprehensive review. Wirel. Pers. Commun. 2020, 114, 1687–1762. [Google Scholar] [CrossRef]
- Ahmad, W.; Ahmad, W.; Rasool, A.; Javed, A.R.; Baker, T.; Jalil, Z. Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey. Electronics 2021, 11, 16. [Google Scholar] [CrossRef]
- Yu, Z.; Song, L.; Jiang, L.; Sharafi, O.K. Systematic literature review on the security challenges of blockchain in IoT-based smart cities. Kybernetes 2021, 51, 323–347. [Google Scholar] [CrossRef]
- Wu, Y. Cloud-edge orchestration for the Internet of Things: Architecture and AI-powered data processing. IEEE Internet Things J. 2020, 8, 12792–12805. [Google Scholar] [CrossRef]
- Sadrishojaei, M.; Navimipour, N.J.; Reshadi, M.; Hosseinzadeh, M. A new preventive routing method based on clustering and location prediction in the mobile internet of things. IEEE Internet Things J. 2021, 8, 10652–10664. [Google Scholar] [CrossRef]
- Hashmi, S.A.; Ali, C.F.; Zafar, S. Internet of things and cloud computing-based energy management system for demand side management in smart grid. Int. J. Energy Res. 2021, 45, 1007–1022. [Google Scholar] [CrossRef]
- Barik, R.K.; Patra, S.S.; Patro, R.; Mohanty, S.N.; Hamad, A. GeoBD2: Geospatial big data deduplication scheme in fog assisted cloud computing environment. In Proceedings of the IEEE 8th International Conference on Computing for Sustainable Global Development, New Delhi, India, 17–19 March 2021. [Google Scholar]
- Sarrab, M.; Alshohoumi, F. Assisted-fog-based framework for IoT-based healthcare data preservation. Int. J. Cloud Appl. Comput. 2021, 11, 1–16. [Google Scholar] [CrossRef]
- Fu, C.; Lv, Q.; Badrnejad, R.G. Fog computing in health management processing systems. Kybernetes 2020, 49, 2893–2917. [Google Scholar] [CrossRef]
- Stergiou, C.L.; Psannis, K.E.; Gupta, B.B. IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet Things J. 2020, 8, 5164–5171. [Google Scholar] [CrossRef]
- Firouzi, F.; Farahani, B.; Marinšek, A. The convergence and interplay of edge, fog, and cloud in the AI-driven Internet of Things (IoT). Inf. Syst. 2022, 107, 101840. [Google Scholar] [CrossRef]
- Firouzi, F.; Chakrabarty, K.; Nassif, S. Intelligent Internet of Things: From Device to Fog and Cloud; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
- Yang, X.; Rahmani, N. Task scheduling mechanisms in fog computing: Review, trends, and perspectives. Kybernetes 2020, 50, 22–38. [Google Scholar] [CrossRef]
- Al-Qerem, A.; Alauthman, M.; Almomani, A.; Gupta, B.B. IoT transaction processing through cooperative concurrency control on fog–cloud computing environment. Soft. Comput. 2020, 24, 5695–5711. [Google Scholar] [CrossRef]
- Sadrishojaei, M.; Navimipour, N.J.; Reshadi, M.; Hosseinzadeh, M. Clustered Routing Method in the Internet of Things Using a Moth-Flame Optimization Algorithm. Int. J. Commun. Syst. 2021, 34, e4964. [Google Scholar] [CrossRef]
- Mabodi, K.; Yusefi, M.; Zandiyan, S.; Irankhah, L.; Fotohi, R. Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J. Supercomput. 2020, 76, 7081–7106. [Google Scholar]
- Kalyani, G.; Chaudhari, S. An efficient approach for enhancing security in Internet of Things using the optimum authentication key. Int. J. Comput. Appl. 2020, 42, 306–314. [Google Scholar] [CrossRef]
- Soni, M.; Singh, D.K. LAKA: Lightweight authentication and key agreement protocol for internet of things based wireless body area network. Wirel. Pers. Commun. 2021, 1–18. [Google Scholar] [CrossRef]
- Alqahtani, F.; Al-Makhadmeh, Z.; Tolba, A.; Said, O. TBM: A trust-based monitoring security scheme to improve the service authentication in the Internet of Things communications. Comput. Commun. 2020, 150, 216–225. [Google Scholar] [CrossRef]
- Hammi, B.; Fayad, A.; Khatoun, R.; Zeadally, S.; Begriche, Y. A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Syst. J. 2020, 14, 3440–3450. [Google Scholar] [CrossRef]
- Saleem, M.A.; Ghaffar, Z.; Mahmood, K.; Das, A.K.; Rodrigues, J.J.P.C.; Khan, M.K. Provably Secure Authentication Protocol for Mobile Clients in IoT Environment using Puncturable Pseudorandom Function. IEEE Internet Things J. 2021, 8, 16613–16622. [Google Scholar] [CrossRef]
- Lee, T.-F.; Chen, W.-Y. Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things. J. Inf. Secur. Appl. 2021, 59, 102817. [Google Scholar] [CrossRef]
- Guo, Y.; Zhang, Z.; Guo, Y. SecFHome: Secure remote authentication in fog-enabled smart home environment. Comput. Netw. 2022, 207, 108818. [Google Scholar] [CrossRef]
- Iqbal, U.; Bhola, J.; Jayasudha, M.; Ahmad, M.W.; Neware, R.; Yadav, A.R.; Gelana, F.W. ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT Networks. Secur. Commun. Netw. 2022, 2022, 7264803. [Google Scholar] [CrossRef]
- Verma, U.; Bhardwaj, D. A secure lightweight anonymous elliptic curve cryptography-based authentication and key agreement scheme for fog assisted-Internet of Things enabled networks. Concurr. Comput Pract. Exp. 2022, 34, e7172. [Google Scholar] [CrossRef]
- Li, Z.; Miao, Q.; Chaudhry, S.A.; Chen, C.-M. A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles. Int. J. Distrib. Sens. Netw. 2022, 18, 15501329221104332. [Google Scholar] [CrossRef]
- Rana, S.; Mishra, D.; Arora, R. Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment. Wirel. Pers. Commun. 2021, 119, 727–747. [Google Scholar] [CrossRef]
- Shukla, S.; Thakur, S.; Hussain, S.; Breslin, J.G.; Jameel, S.M. Identification and Authentication in Healthcare Internet-of-Things Using Integrated Fog Computing Based Blockchain Model. Internet Things 2021, 15, 100422. [Google Scholar] [CrossRef]
- Wu, T.-Y.; Lee, Z.; Yang, L.; Luo, J.-N.; Tso, R. Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks. J. Supercomput. 2021, 77, 6992–7020. [Google Scholar] [CrossRef]
- Shahidinejad, A.; Ghobaei-Arani, M.; Souri, A.; Shojafar, M.; Kumari, S. Light-edge: A lightweight authentication protocol for IoT devices in an edge-cloud environment. IEEE Consum. Electron. Mag. 2021, 11, 57–63. [Google Scholar] [CrossRef]
- Abdussami, M.; Amin, R.; Vollala, S. LASSI: A lightweight authenticated key agreement protocol for fog-enabled IoT deployment. Int. J. Inf. Secur. 2022, 21, 1373–1387. [Google Scholar] [CrossRef]
- Erroutbi, A.; El Hanjri, A.; Sekkaki, A. Secure and Lightweight HMAC Mutual Authentication Protocol for Communication between IoT Devices and Fog Nodes. In Proceedings of the IEEE International Smart Cities Conference (ISC2), Casablanca, Morocco, 14–17 October 2019. [Google Scholar]
- Singh, S.; Bansal, A.; Sandhu, R.; Sidhu, J. Fog computing and IoT based healthcare support service for dengue fever. Int. J. Pervasive Comput. Commun. 2018, 14, 197–207. [Google Scholar] [CrossRef]
- Jiang, R.; Lai, C.; Luo, J.; Wang, X.; Wang, H. EAP-based group authentication and key agreement protocol for machine-type communications. Int. J. Distrib. Sens. Netw. 2013, 9, 304601. [Google Scholar] [CrossRef]
- Liao, Y.-P.; Hsiao, C.-M. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 2014, 18, 133–146. [Google Scholar] [CrossRef]
- Kalra, S.; Sood, S.K. Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 2015, 24, 210–223. [Google Scholar] [CrossRef]
- Bhubaneswari, S.; Ananth, N. Enhanced mutual authentication scheme for cloud of things. Int. J. Pure Appl. Math. 2018, 119, 1571–1583. [Google Scholar]
Mechanism | Method | Advantage | Weakness |
---|---|---|---|
Saleem, Ghaffar [27] | Unique identity-based key agreement mechanism |
|
|
Lee and Chen [28] | Safe authentication mechanism for the Fog computing platform |
|
|
Guo and Zhang [29] | Secured remote user authentication strategy |
|
|
Iqbal and Bhola [30] | ECC-based secure key exchange mechanism for IoT |
|
|
Verma and Bhardwaj [31] | Mutual authentication and key agreement based on ECC |
|
|
Li and Miao [32] | Solution to the problems of being susceptible to internal assaults |
|
|
Rana and Mishra [33] | Key agreement mechanism for the IoT ecosystem |
|
|
Shukla and Thakur [34] | Innovative approach based on Fog computing and the blockchain |
|
|
Wu and Lee [35] | Novel authentication key exchange system |
|
|
Soni and Singh [24] | Lightweight, secure health authentication, and key agreement |
|
|
Hammi and Fayad [26] | OTP creation method to ensure IoT devices’ security |
|
|
Alqahtani and Al-Makhadmeh [25] | TBM strategy to enhance Cloud-assisted IoT |
|
|
Shahidinejad and Ghobaei-Arani [36] | Light-Edge authentication system |
|
|
Abdussami and Amin [37] | Mutual authentication technique by a physically unclonable feature |
|
|
Erroutbi and El Hanjri [38] | Mutual authentication built on a hash-based message |
|
|
Proposed Mechanism | Lightweight authentication framework for mutual authentication |
|
|
Notation | Explanations |
---|---|
T | Thing |
F | Fog |
C | Cloud Server |
IDt | Thing’s Identity |
TPK | Thing’s Public Key |
IDf | Fog Node’s Identity |
FPK | Fog Node’s Public Key |
FPR | Fog Node’s Private Key |
CPK | Cloud Server’s Public Key |
CPR | Cloud Server’s Private Key |
H(IPV6) | Identity of Thing’s Hash |
R1, R2, R3 | Random Nonce |
Notation | Explanations |
---|---|
Cloud Layer | This is the highest level in the Fog computing stack. Computing, networking, and storage are all handled at the Cloud layer, which is accessible from anywhere in the world. The server and data centers that make up this layer conduct a worldwide evaluation of the information they collect from the Fog layer. |
Fog Layer | This is the middle and core layer and includes the switches, gateways, and routers that can also function as Fog nodesand. Any computer or machine connected to a network, which could perform localized tasks such as computing, networking, and storage, could be considered a Fog machine. The Fog node seems to be a specialized network node that can be placed anywhere along the platform’s edge. It is familiar with the gadgets in its immediate vicinity and is liable for routinely uploading data to a Cloud server. The services provided by this layer to the device layer can be accessed with or without the Cloud layer being involved. |
Device Layer | This is the base layer, and it includes both stationary and mobile Internet of Things gadgets. The gadgets’ low processing power and memory prevent them from adapting to changing circumstances. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lansky, J.; Sadrishojaei, M.; Rahmani, A.M.; Malik, M.H.; Kazemian, F.; Hosseinzadeh, M. Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog. Mathematics 2022, 10, 4166. https://doi.org/10.3390/math10224166
Lansky J, Sadrishojaei M, Rahmani AM, Malik MH, Kazemian F, Hosseinzadeh M. Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog. Mathematics. 2022; 10(22):4166. https://doi.org/10.3390/math10224166
Chicago/Turabian StyleLansky, Jan, Mahyar Sadrishojaei, Amir Masoud Rahmani, Mazhar Hussain Malik, Faeze Kazemian, and Mehdi Hosseinzadeh. 2022. "Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog" Mathematics 10, no. 22: 4166. https://doi.org/10.3390/math10224166
APA StyleLansky, J., Sadrishojaei, M., Rahmani, A. M., Malik, M. H., Kazemian, F., & Hosseinzadeh, M. (2022). Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog. Mathematics, 10(22), 4166. https://doi.org/10.3390/math10224166