Secure the Internet of Things with Challenge Response Authentication in Fog Computing

被引:0
作者
Alharbi, Salem [1 ]
Rodriguez, Peter [1 ]
Maharaja, Rajaputhri [1 ]
Iyer, Prashant [1 ]
Subaschandrabose, Nivethitha [1 ]
Ye, Zilong [1 ]
机构
[1] Calif State Univ Los Angeles, 5151 State Univ Dr, Los Angeles, CA 90032 USA
来源
2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC) | 2017年
关键词
Internet of Things; security; Fog computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet of Things (IoT) continues to grow, there arises concerns and challenges with regard to the security and privacy of the IoT system. In this paper, we propose a FOg CompUting-based Security (FOCUS) system to address the security challenges in the IoT. The proposed FOCUS system leverages the virtual private network (VPN) to secure the access channel to the IoT devices. In addition, FOCUS adopts a challenge-response authentication to protect the VPN server against distributed denial of service (DDoS) attacks, which can further enhance the security of the IoT system. FOCUS is implemented in fog computing that is close to the end users, thus achieving a fast and efficient protection. We demonstrate FOCUS in a proof-of-concept prototype, and conduct experiments to evaluate its performance. The results show that FOCUS can effectively filter out malicious attacks with a very low response latency.
引用
收藏
页数:2
相关论文
共 50 条
  • [41] A Secure Mutual authentication approach to fog computing environment
    Kalaria, Rudri
    Kayes, A. S. M.
    Rahayu, Wenny
    Pardede, Eric
    COMPUTERS & SECURITY, 2021, 111
  • [42] Design of Cognitive Fog Computing for Intrusion Detection in Internet of Things
    Prabavathy, S.
    Sundarakantham, K.
    Shalinie, S. Mercy
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2018, 20 (03) : 291 - 298
  • [43] Towards smart technologies with integration of the internet of things, cloud computing, and fog computing
    Ahlawat C.
    Krishnamurthi R.
    International Journal of Networking and Virtual Organisations, 2023, 29 (01) : 73 - 124
  • [44] Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things
    Dave, Jay
    Choudhury, Nikumani
    Tiwari, Utkarsh
    Kamtam, Samyu
    Rohith, Kudapa Sai
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 1237 - 1242
  • [45] A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration
    Dizdarevic, Jasenka
    Carpio, Francisco
    Jukan, Admela
    Masip-Bruin, Xavi
    ACM COMPUTING SURVEYS, 2019, 51 (06)
  • [46] An Authentication-Based Secure Data Aggregation Method in Internet of Things
    Maryam Ataei Nezhad
    Hamid Barati
    Ali Barati
    Journal of Grid Computing, 2022, 20
  • [47] Secure and anonymous authentication scheme for the Internet of Things with pairing
    Wu H.-L.
    Chang C.-C.
    Chen L.-S.
    Pervasive and Mobile Computing, 2020, 67
  • [48] A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing
    Alsaeed, Norah
    Nadeem, Farrukh
    Albalwy, Faisal
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 151 : 162 - 181
  • [49] An Authentication-Based Secure Data Aggregation Method in Internet of Things
    Ataei Nezhad, Maryam
    Barati, Hamid
    Barati, Ali
    JOURNAL OF GRID COMPUTING, 2022, 20 (03)
  • [50] Design of secure key management and user authentication scheme for fog computing services
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 (475-492): : 475 - 492