Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing

被引:32
作者
Diro, Abebe Abeshu [1 ]
Chilamkurti, Naveen [1 ]
Kumar, Neeraj [2 ]
机构
[1] La Trobe Univ, Melbourne, Vic, Australia
[2] Thapar Univ, Patiala, Punjab, India
关键词
Cyber security; Publish-subscribe systems; Internet of things; Elliptic curve cryptography; Fog computing;
D O I
10.1007/s11036-017-0851-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of connected things across the globe has been brought about by the deployment of the Internet of things (IoTs) at home, in organizations and industries. The innovation of smart things is envisioned through various protocols, but the most prevalent protocols are pub-sub protocols such as Message Queue Telemetry Transport (MQTT) and Advanced Message Queuing Protocol (AMQP). An emerging paradigm of communication architecture for IoTs support is Fog computing in which events are processed near to the place they occur for efficient and fast response time. One of the major concerns in the adoption of Fog computing based publish-subscribe protocols for the Internet of things is the lack of security mechanisms because the existing security protocols such as SSL/TSL have a large overhead of computations, storage and communications. To address these issues, we propose a secure, Fog computing based publish-subscribe lightweight protocol using Elliptic Curve Cryptography (ECC) for the Internet of Things. We present analytical proofs and results for resource efficient security, comparing to the existing protocols of traditional Internet.
引用
收藏
页码:848 / 858
页数:11
相关论文
共 18 条
  • [1] [Anonymous], TECHNICAL REPORT
  • [2] [Anonymous], 2015, INT C WIR ALG SYST A
  • [3] Chenxi Wang, 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, P3940, DOI 10.1109/HICSS.2002.994531
  • [4] Fiege L., 2004, 3 INT WORKSH DISTR E
  • [5] Frahim J, 2016, SECURING INTERNET TH
  • [6] Hankerson D., 2003, Guide to Elliptic Curve Cryptography
  • [7] Ibrahim Maged Ramada, 2016, International Journal of Network Security, V18, P1089
  • [8] Mitchell JC, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P201
  • [9] Opyrchal L, 2006, INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, P313
  • [10] Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
    Porambage, Pawani
    Braeken, An
    Schmitt, Corinna
    Gurtov, Andrei
    Ylianttila, Mika
    Stiller, Burkhard
    [J]. IEEE ACCESS, 2015, 3 : 1503 - 1511