Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment

被引:0
|
作者
K. N. Pallavi
V. Ravi Kumar
机构
[1] NMAM Institute of Technology,
[2] Vidyavardhaka College of Engineering,undefined
来源
关键词
Authentication; Smart contracts; Internet of Things (IoT); Fog computing; Access Control;
D O I
暂无
中图分类号
学科分类号
摘要
The emergence of fog computing has witnessed a big role in initiating secure communication amongst users. Fog computing poses the ability to perform analysis, processing, and storage for a set of Internet of Things (IoT) devices. Several IoT solutions are devised by utilizing the fog nodes to alleviate IoT devices from complex computation and heavy processing. This paper proposes an authentication scheme using fog nodes to manage IoT devices by providing security without considering a trusted third party. The proposed authentication scheme employed the benefits of fog node deployment. The authentication scheme using fog node offers reliable verification between the data owners and the requester without depending on the third party users. The proposed authentication scheme using fog nodes effectively solved the problems of a single point of failure in the storage system and offers many benefits by increasing the throughput and reducing the cost. The proposed scheme considers several entities, like end-users, IoT devices, fog nodes, and smart contracts, which help to administrate the authentication using access policies. The proposed authentication scheme using fog node provided superior results than other methods with minimal memory value of 4009.083 KB, minimal time of 76.915 s, and maximal Packet delivery ratio (PDR) of 76.
引用
收藏
页码:3039 / 3060
页数:21
相关论文
共 50 条
  • [1] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    Pallavi, K. N.
    Ravi Kumar, V.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (04) : 3039 - 3060
  • [2] Mutual authentication scheme of IoT devices in fog computing environment
    Sunakshi Singh
    Vijay Kumar Chaurasiya
    [J]. Cluster Computing, 2021, 24 : 1643 - 1657
  • [3] Mutual authentication scheme of IoT devices in fog computing environment
    Singh, Sunakshi
    Chaurasiya, Vijay Kumar
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1643 - 1657
  • [4] Lightweight Failover Authentication Mechanism for IoT-Based Fog Computing Environment
    Banerjee, Soumya
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Jamal, Sajjad Shaukat
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. ELECTRONICS, 2021, 10 (12)
  • [5] Authentication-based access control approach for enhancing security in pervasive computing environments
    Gnaneshwari, G. R.
    Hema, M. S.
    Lingareddy, S. C.
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 211 - 232
  • [6] An Authorized Identity Authentication-based Data Access Control Scheme in Cloud
    Shen, Jian
    Liu, Dengzhi
    Liu, Qi
    Wang, Baowei
    Fu, Zhangjie
    [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 56 - 60
  • [7] Access management of IoT devices using access control mechanism and decentralized authentication: A review
    Singh, Inderpal
    Singh, Balraj
    [J]. Measurement: Sensors, 2023, 25
  • [8] Optimizing energy in Fog computing architecture based on offloading mechanism for IoT devices
    Hoan, L. E.
    [J]. 2023 ASIA MEETING ON ENVIRONMENT AND ELECTRICAL ENGINEERING, EEE-AM, 2023,
  • [9] A trust computed framework for IoT devices and fog computing environment
    Rathee, Geetanjali
    Sandhu, Rajinder
    Saini, Hemraj
    Sivaram, M.
    Dhasarathan, Vigneswaran
    [J]. WIRELESS NETWORKS, 2020, 26 (04) : 2339 - 2351
  • [10] A trust computed framework for IoT devices and fog computing environment
    Geetanjali Rathee
    Rajinder Sandhu
    Hemraj Saini
    M. Sivaram
    Vigneswaran Dhasarathan
    [J]. Wireless Networks, 2020, 26 : 2339 - 2351