Cloud-Centric Multi-Level Authentication as a Service for Secure Public Safety Device Networks

被引:84
作者
Butun, Ismail [1 ]
Erol-Kantarci, Melike [2 ]
Kantarci, Burak [3 ]
Song, Houbing [4 ]
机构
[1] Bursa Tech Univ, Dept Mechatron Engn, Bursa, Turkey
[2] Clarkson Univ, Dept Elect & Comp Engn, Networked Syst & Commun Res NETCORE Lab, Potsdam, NY USA
[3] Clarkson Univ, Dept Elect & Comp Engn, Potsdam, NY USA
[4] W Virginia Univ, Dept Elect & Comp Engn, Montgomery, AL USA
关键词
D O I
10.1109/MCOM.2016.7452265
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the advances in IoT, future public safety responders will be well armed with devices that pump data between on-site responders and command centers, carrying useful information about the event scene, the status of a mission, and helping critical decisions to be made in real time. In addition, wearable and on-body sensors will monitor the vital signals and well being of the responders. These connected devices or the so-called IoT surrounding public safety responders generate highly vulnerable data, where security breaches may have life threatening consequences. Authentication of responder devices is essential in order to control access to public safety networks. Most of the existing authentication schemes do not scale well with the large number of devices of IoT, and are not fast enough to work during time-critical public safety missions. On the other hand, for general IoT services, cloud-based solutions provide unlimited resources for storing and accessing IoT data. However, the cloud may have some implications for sensitive data that are collected for public safety. Therefore, authentication solutions are desired to integrate well into the cloud environment. In this article, we propose cloud-centric, multi-level authentication as a service approach that addresses scalability and time constraints, and demonstrate its effectiveness. We draw future research directions for secure public safety networks in the presence of IoT devices and the cloud.
引用
收藏
页码:47 / 53
页数:7
相关论文
共 16 条
  • [1] [Anonymous], 1909, NEW YORK TIMES
  • [2] Benenson Z., 2005, P WKSP REAL WORLD WI
  • [3] Butun Ismail, 2012, International Journal of Security and Networks, V7, P107
  • [4] Butun I., 2015, IEEE ICC 2015 1 WKSP
  • [5] Gaubatz G, 2005, LECT NOTES COMPUT SC, V3313, P2
  • [6] Intrado Inc, 2015, CJIS COMPL CLOUD COM
  • [7] Kantarci B., 2015, IEEE INT C CLOUD NET, P182
  • [8] SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices
    Khan, Rasib
    Hasan, Ragib
    Xu, Jinfang
    [J]. 2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 41 - 50
  • [9] Le X. H., 2009, P 5 IEEE INT C DISTR
  • [10] Le X. H., 2009, J COMMUN NETWORKS, V5