A Mechanism for Securing IoT-enabled Applications at the Fog Layer

Nadeem Abbas, Muhammad Asim, Noshina Tariq, Thar Baker, Sohail Abbas

Research output: Contribution to journalArticlepeer-review

Abstract

The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed of smart ubiquitous objects that are seamlessly connected to the Internet. These objects are deployed as Low power and Lossy Networks (LLN) to provide innovative services in various application domains such as smart cities, smart health, and smart communities. The LLN is a form of a network where the interconnected devices are highly resource-constrained (i.e., power, memory, and processing) and characterized by high loss rates, low data rates, and instability in the communication links. Additionally, IoT devices produce a massive amount of confidential and security-sensitive data. Various cryptographic-based techniques exist that can effectively cope with security attacks but are not suitable for IoT as they incur high consumption of resources (i.e., memory, storage and processing). One way to address this problem is by offloading the additional security-related operations to a more resourceful entity such as a fog-based node. Generally, fog computing enables security and analysis of latency-sensitive data directly at the network’s edge. This paper proposes a novel Fog Security Service (FSS) to provide end-to-end security at the fog layer for IoT devices using two well-established cryptographic schemes, identity-based encryption, and identity-based signature. The FSS provides security services such as authentication, confidentiality, and non-repudiation. The proposed architecture would be implemented and evaluated in an OPNET simulator using a single network topology with different traffic loads. The FSS performed better when compared with the APaaS and the legacy method.
Original languageEnglish
Article number16
JournalJournal of Sensor and Actuator Networks
Volume8
Issue number1
DOIs
Publication statusPublished - 18 Feb 2019

Fingerprint

Dive into the research topics of 'A Mechanism for Securing IoT-enabled Applications at the Fog Layer'. Together they form a unique fingerprint.

Cite this