IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT Devices.
Reads0
Chats0
TLDR
An edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG) and a secure communication protocol for communication between edge IoT devices and edge Internet gateways are presented.Abstract:
The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.read more
Citations
More filters
Journal ArticleDOI
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications
Irene Ioannidou,Nicolas Sklavos +1 more
TL;DR: In this article, the authors explore the existing literature on various data privacy concerns, posed by the use of wearable devices, and experimentally analyze the data exchanged through mobile applications, in order to identify the underlying privacy and security risks.
Book ChapterDOI
Layered Architecture for End-To-End Security, Trust, and Privacy for the Internet of Things
TL;DR: In this paper, a new seven layers of IoT communication architecture are proposed to address the issues mentioned above, where data communication and processing are done in a decentralized and distributed manner, and a new protocol is proposed to secure communication between IoT infrastructure and cloud computing components.
Proceedings ArticleDOI
A Survey on Security Issues and Secure Frameworks in Internet of Things (IoT)
TL;DR: The survey identifies the less explored research gaps to group them and address the concerns related to device management, user management, key management, trust management and data management and the surveyed secured frameworks in IoT address the multiple dimensions of security concerns and their aspects.
Book ChapterDOI
Dynamic and Decentralized Trust Management for the Internet of Things (IoT) Paradigm
TL;DR: In this paper, the authors defined the trust management for IoT and discussed the need for trusted architecture for dynamic IoT infrastructure, and elaborated the requirements of trust management policies, and heightened the need to decentralized architecture for trust management.
References
More filters
Journal ArticleDOI
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Journal ArticleDOI
A Survey on Mobile Edge Computing: The Communication Perspective
TL;DR: A comprehensive survey of the state-of-the-art MEC research with a focus on joint radio-and-computational resource management is provided in this paper, where a set of issues, challenges, and future research directions for MEC are discussed.
Book
The SPIN Model Checker: Primer and Reference Manual
TL;DR: The SPIN Model Checker as mentioned in this paper is used for both teaching software verification techniques, and for validating large scale applications, and it has been estimated that up to three-quarters of the $400 billion spent annually to hire programmers in the United States is ultimately spent on debugging.
Posted Content
A Survey on Mobile Edge Computing: The Communication Perspective
TL;DR: A comprehensive survey of the state-of-the-art MEC research with a focus on joint radio-and-computational resource management and recent standardization efforts on MEC are introduced.