Secure the Internet of Things with Challenge Response Authentication in Fog Computing

被引:0
|
作者
Alharbi, Salem [1 ]
Rodriguez, Peter [1 ]
Maharaja, Rajaputhri [1 ]
Iyer, Prashant [1 ]
Subaschandrabose, Nivethitha [1 ]
Ye, Zilong [1 ]
机构
[1] Calif State Univ Los Angeles, 5151 State Univ Dr, Los Angeles, CA 90032 USA
关键词
Internet of Things; security; Fog computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet of Things (IoT) continues to grow, there arises concerns and challenges with regard to the security and privacy of the IoT system. In this paper, we propose a FOg CompUting-based Security (FOCUS) system to address the security challenges in the IoT. The proposed FOCUS system leverages the virtual private network (VPN) to secure the access channel to the IoT devices. In addition, FOCUS adopts a challenge-response authentication to protect the VPN server against distributed denial of service (DDoS) attacks, which can further enhance the security of the IoT system. FOCUS is implemented in fog computing that is close to the end users, thus achieving a fast and efficient protection. We demonstrate FOCUS in a proof-of-concept prototype, and conduct experiments to evaluate its performance. The results show that FOCUS can effectively filter out malicious attacks with a very low response latency.
引用
收藏
页数:2
相关论文
共 50 条
  • [41] Fog Computing for the Internet of Mobile Things: issues and challenges
    Puliafito, Carlo
    Mingozzi, Enzo
    Anastasi, Giuseppe
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 283 - 288
  • [42] Components of Fog Computing in an Industrial Internet of Things Context
    Gazis, Vangelis
    Leonardi, Alessandro
    Mathioudakis, Kostas
    Sasloglou, Konstantinos
    Kikiras, Panayotis
    Sudhaakar, Raghuram
    2015 12TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING - WORKSHOPS (SECON WORKSHOPS), 2015, : 37 - 42
  • [43] Fog Computing: Towards Minimizing Delay in the Internet of Things
    Yousefpour, Ashkan
    Ishigaki, Genya
    Jue, Jason P.
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 17 - 24
  • [44] Comment on "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things"
    Tan, Syh-Yuan
    IEEE ACCESS, 2018, 6 : 22464 - 22465
  • [45] An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios
    Tian, Jun-Feng
    Wang, Hao-Ning
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [46] Distributing Computing in the Internet of Things: Cloud, Fog and Edge Computing Overview
    Escamilla-Ambrosio, P. J.
    Rodriguez-Mota, A.
    Aguirre-Anaya, E.
    Acosta-Bermejo, R.
    Salinas-Rosales, M.
    NEO 2016: RESULTS OF THE NUMERICAL AND EVOLUTIONARY OPTIMIZATION WORKSHOP NEO 2016 AND THE NEO CITIES 2016 WORKSHOP, 2018, 731 : 87 - 115
  • [47] Compressive Massive Access for Internet of Things: Cloud Computing or Fog Computing?
    Ke, Malong
    Gao, Zhen
    Wu, Yongpeng
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [48] Secure Quantum Steganography Protocol for Fog Cloud Internet of Things
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Hossain, M. Shamim
    Elmougy, Samir
    Ghoneim, Ahmed
    IEEE ACCESS, 2018, 6 : 10332 - 10340
  • [49] Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things
    Lee, Tian-Fu
    Chen, Wei-Yu
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
  • [50] Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things
    Lee, Tian-Fu
    Chen, Wei-Yu
    Journal of Information Security and Applications, 2021, 59