scispace - formally typeset
Open AccessJournal ArticleDOI

IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT Devices.

Kazi Masum Sadique, +2 more
- 16 Nov 2020 - 
- Vol. 20, Iss: 22, pp 6546
Reads0
Chats0
TLDR
An edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG) and a secure communication protocol for communication between edge IoT devices and edge Internet gateways are presented.
Abstract
The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.

read more

Citations
More filters
Journal ArticleDOI

On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications

TL;DR: In this article, the authors explore the existing literature on various data privacy concerns, posed by the use of wearable devices, and experimentally analyze the data exchanged through mobile applications, in order to identify the underlying privacy and security risks.
Book ChapterDOI

Layered Architecture for End-To-End Security, Trust, and Privacy for the Internet of Things

TL;DR: In this paper, a new seven layers of IoT communication architecture are proposed to address the issues mentioned above, where data communication and processing are done in a decentralized and distributed manner, and a new protocol is proposed to secure communication between IoT infrastructure and cloud computing components.
Proceedings ArticleDOI

A Survey on Security Issues and Secure Frameworks in Internet of Things (IoT)

TL;DR: The survey identifies the less explored research gaps to group them and address the concerns related to device management, user management, key management, trust management and data management and the surveyed secured frameworks in IoT address the multiple dimensions of security concerns and their aspects.
Book ChapterDOI

Dynamic and Decentralized Trust Management for the Internet of Things (IoT) Paradigm

TL;DR: In this paper, the authors defined the trust management for IoT and discussed the need for trusted architecture for dynamic IoT infrastructure, and elaborated the requirements of trust management policies, and heightened the need to decentralized architecture for trust management.
References
More filters
Journal ArticleDOI

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Journal ArticleDOI

Elliptic curve cryptosystems

TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Journal ArticleDOI

A Survey on Mobile Edge Computing: The Communication Perspective

TL;DR: A comprehensive survey of the state-of-the-art MEC research with a focus on joint radio-and-computational resource management is provided in this paper, where a set of issues, challenges, and future research directions for MEC are discussed.
Book

The SPIN Model Checker: Primer and Reference Manual

TL;DR: The SPIN Model Checker as mentioned in this paper is used for both teaching software verification techniques, and for validating large scale applications, and it has been estimated that up to three-quarters of the $400 billion spent annually to hire programmers in the United States is ultimately spent on debugging.
Posted Content

A Survey on Mobile Edge Computing: The Communication Perspective

TL;DR: A comprehensive survey of the state-of-the-art MEC research with a focus on joint radio-and-computational resource management and recent standardization efforts on MEC are introduced.
Related Papers (5)