Attribute identification based IoT fog data security control and forwarding

被引:1
|
作者
Xiao, Jingxu [1 ]
Chang, Chaowen [1 ]
Wu, Ping [1 ]
Ma, Yingying [1 ,2 ]
机构
[1] Informat Engn Univ Peoples Liberat Army Strateg Su, Zhengzhou 450001, Peoples R China
[2] Zhengzhou Univ Technol, Zhengzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
IoT-Fog security; Software defined network; Attribute-based signature; Packet verification; Access control;
D O I
10.7717/peerj-cs.1747
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As Internet of Things (IoT) applications continue to proliferate, traditional cloud computing is increasingly unable to meet the low-latency demands of these applications. The IoT fog architecture solves this limitation by introducing fog servers in the fog layer that are closer to the IoT devices. However, this architecture lacks authentication mechanisms for information sources, security verification for information transmission, and reasonable allocation of fog nodes. To ensure the secure transmission of end to-end information in the IoT fog architecture, an attribute identification based security control and forwarding method for IoT fog data (AISCF) is proposed. AISCF applies attribute signatures to the IoT fog architecture and uses software defined network (SDN) to control and forward fog layer data flows. Firstly, IoT devices add attribute identifiers to the data they send based on attribute features. The ingress switch then performs fine-grained access control on the data based on these attribute identifiers. Secondly, SDN uses attribute features as flow table matching items to achieve finegrained control and forwarding of fog layer data flows based on attribute identifiers. Lastly, the egress switch dynamically samples data flows and verifies the attribute signatures of the sampled data packets at the controller end. Experimental validation has demonstrated that AISCF can effectively detect attacks such as data tampering and forged matching items. Moreover, AISCF imposes minimal overhead on network throughput, CPU utilization and packet forwarding latency, and has practicality in IoT fog architecture.
引用
收藏
页数:38
相关论文
共 50 条
  • [31] Achieving IoT data security based blockchain
    Liao, Dan
    Li, Hui
    Wang, Wentao
    Wang, Xiong
    Zhang, Ming
    Chen, Xue
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 2694 - 2707
  • [32] Achieving IoT data security based blockchain
    Dan Liao
    Hui Li
    Wentao Wang
    Xiong Wang
    Ming Zhang
    Xue Chen
    Peer-to-Peer Networking and Applications, 2021, 14 : 2694 - 2707
  • [33] A Distributed Fog-based Access Control Architecture for IoT
    Alnefaie, Seham
    Cherif, Asma
    Alshehri, Suhair
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (12): : 4545 - 4566
  • [34] Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing
    Tu, Shanshan
    Huang, Fengming
    Zhang, Shengju
    Badshah, Akhtar
    Alasmary, Hisham
    Waqas, Muhammad
    2022 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS, CITS, 2022, : 116 - 122
  • [35] A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled IoT?
    Sarma, Richa
    Barbhuiya, Ferdous Ahmed
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [36] Improving the attribute retrieval on ABAC using opportunistic caches for Fog-Based IoT Networks
    Bruno, Cremonezi
    Gomes Filho, Airton Ribeiro
    Edelberto, Franco Silva
    Jose, Augusto Miranda Nacif
    Alex, Borges Vieira
    Nogueira, Michele
    COMPUTER NETWORKS, 2022, 213
  • [37] MOFIT: An Efficient Access Control Scheme with Attribute Merging and Outsourcing Capability for Fog-Enhanced IoT
    Sarma, Richa
    Barbhuiya, Ferdous Ahmed
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT 2021, 2022, 13148 : 523 - 535
  • [38] Attribute Based Access Control and Security for Collaboration Environments
    Zhu, Jian
    Smari, Waleed W.
    NAECON 2008 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2008, : 31 - 35
  • [39] Attribute Based Access Control for APIs in Spring Security
    Armando, Alessandro
    Carbone, Roberto
    Chekole, Eyasu Getahun
    Ranise, Silvio
    PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 85 - 88
  • [40] Evaluation of table-based access control in IoT data distribution method using fog computing
    Yoshii, Masaki
    Banno, Ryohei
    Mizuno, Osamu
    IEICE COMMUNICATIONS EXPRESS, 2021, 10 (10): : 822 - 827