Secure the Internet of Things with Challenge Response Authentication in Fog Computing

被引:0
作者
Alharbi, Salem [1 ]
Rodriguez, Peter [1 ]
Maharaja, Rajaputhri [1 ]
Iyer, Prashant [1 ]
Subaschandrabose, Nivethitha [1 ]
Ye, Zilong [1 ]
机构
[1] Calif State Univ Los Angeles, 5151 State Univ Dr, Los Angeles, CA 90032 USA
来源
2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC) | 2017年
关键词
Internet of Things; security; Fog computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet of Things (IoT) continues to grow, there arises concerns and challenges with regard to the security and privacy of the IoT system. In this paper, we propose a FOg CompUting-based Security (FOCUS) system to address the security challenges in the IoT. The proposed FOCUS system leverages the virtual private network (VPN) to secure the access channel to the IoT devices. In addition, FOCUS adopts a challenge-response authentication to protect the VPN server against distributed denial of service (DDoS) attacks, which can further enhance the security of the IoT system. FOCUS is implemented in fog computing that is close to the end users, thus achieving a fast and efficient protection. We demonstrate FOCUS in a proof-of-concept prototype, and conduct experiments to evaluate its performance. The results show that FOCUS can effectively filter out malicious attacks with a very low response latency.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] Fog Computing for the Internet of Things: A Survey
    Puliafito, Carlo
    Mingozzi, Enzo
    Longo, Francesco
    Puliafito, Antonio
    Rana, Omer
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (02)
  • [2] A survey on fog computing for the Internet of Things
    Bellavista, Paolo
    Berrocal, Javier
    Corradi, Antonio
    Das, Sajal K.
    Foschini, Luca
    Zanni, Alessandro
    PERVASIVE AND MOBILE COMPUTING, 2019, 52 : 71 - 99
  • [3] A Review on Fog Computing for the Internet of Things
    Javed, Waheed
    Parveen, Gulnaz
    Aabid, Fatima
    Rubab, Syeda Um E.
    Ikram, Sidra
    Rehman, Khawaja Ubaid Ur
    Danish, Muhammad
    4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 892 - 898
  • [4] Fog computing and the internet of things: A review
    Atlam H.F.
    Walters R.J.
    Wills G.B.
    Big Data and Cognitive Computing, 2018, 2 (02) : 1 - 18
  • [5] Identification and Authentication in Healthcare Internet-of-Things Using Integrated Fog Computing Based Blockchain Model
    Shukla, Saurabh
    Thakur, Subhasis
    Hussain, Shahid
    Breslin, John G.
    Jameel, Syed Muslim
    INTERNET OF THINGS, 2021, 15
  • [6] Authentication and secure communications for internet of vehicles (IOV)-assisted fog computing
    Naser J.I.
    Alsalman H.A.G.
    Kadhim A.J.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (18): : 1659 - 1670
  • [7] Secure Authentication on the Internet of Things
    Griffin, Phillip H.
    SOUTHEASTCON 2017, 2017,
  • [8] Provably Secure Authentication Scheme for Fog Computing-Enabled Intelligent Social Internet of Vehicles
    Chen, Chien-Ming
    Li, Zhen
    Das, Ashok Kumar
    Chaudhry, Shehzad Ashraf
    Lorenz, Pascal
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (09) : 13600 - 13610
  • [9] A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services
    Weng, Chi-Yao
    Li, Chun-Ta
    Chen, Chin-Ling
    Lee, Cheng-Chi
    Deng, Yong-Yuan
    IEEE ACCESS, 2021, 9 : 145522 - 145537
  • [10] An improved data aggregation for fog computing devices in internet of things
    Jalasri M.
    Lakshmanan L.
    International Journal of Networking and Virtual Organisations, 2024, 30 (02) : 114 - 133