Smart City Gnosys

Smart city article details

Title Secure And Lightweight Hmac Mutual Authentication Protocol For Communication Between Iot Devices And Fog Nodes
ID_Doc 47586
Authors Erroutbi A.; El Hanjri A.; Sekkaki A.
Year 2019
Published 5th IEEE International Smart Cities Conference, ISC2 2019
DOI http://dx.doi.org/10.1109/ISC246665.2019.9071788
Abstract The transition from regular Internet to 'Internet of Things' (IoT) is leading to multiple changes in the standard ways of communication. Today, the cloud computing paradigm faces many challenges like low capacity, high latency and network failure. It can show its limits in a context of connected objects for example, latency-sensitive applications will need to use a large number of nodes to meet the performance level. However the performance of such cloud services was limited by the performance loads offered by the respective data centers servers hosting these cloud services. In addition, these devices generate data in a large number of formats using various protocols, making acquisition and processing in real time difficult. That are critical for some IoT applications. For all these reasons, the world has seen the emergence of a new competing concept or rather a complement to cloud computing, which is more adapted to the Internet of Things: it is the Fog Computing. On the other hand, the heterogeneous nature of IoT communications and the imbalanced resource capabilities between different entities make it challenging to provide end to end secured connections. Nevertheless, a direct use of existing standard key establishment protocols to initiate connections between two IoT entities does not suit resource-constrained devices and is in most cases impractical, as the use of expensive cryptographic primitives leaves aside a whole class of resourceconstrained devices. Unlike Internet servers, most IoT components are characterized by low power and computing capacity, and are therefore unable to support complex security systems. In this article, we present the architecture, characteristic of fog computing, the key differences between the Fog model and Cloud Computing, the role-played for the internet of things and reviews a wide range of applications of fog computing. Then, we present also an HMAC mutual authentication protocol for Securing IoT-enabled Applications at the Fog Platform. © 2019 IEEE.
Author Keywords Fog Computing; hMAC; internet of Things; mutualAuthentication; security


Similar Articles


Id Similarity Authors Title Published
26758 View0.901Al Harbi S.; Halabi T.; Bellaiche M.Fog Computing Security Assessment For Device Authentication In The Internet Of ThingsProceedings - 2020 IEEE 22nd International Conference on High Performance Computing and Communications, IEEE 18th International Conference on Smart City and IEEE 6th International Conference on Data Science and Systems, HPCC-SmartCity-DSS 2020 (2020)
32182 View0.852Kuchuk H.; Malokhvii E.Integration Of Iot With Cloud, Fog, And Edge Computing: A ReviewAdvanced Information Systems, 8, 2 (2024)