当前位置: X-MOL 学术Wireless Pers. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
Wireless Personal Communications ( IF 1.9 ) Pub Date : 2020-10-14 , DOI: 10.1007/s11277-020-07834-w
K. N. Pallavi , V. Ravi Kumar

The emergence of fog computing has witnessed a big role in initiating secure communication amongst users. Fog computing poses the ability to perform analysis, processing, and storage for a set of Internet of Things (IoT) devices. Several IoT solutions are devised by utilizing the fog nodes to alleviate IoT devices from complex computation and heavy processing. This paper proposes an authentication scheme using fog nodes to manage IoT devices by providing security without considering a trusted third party. The proposed authentication scheme employed the benefits of fog node deployment. The authentication scheme using fog node offers reliable verification between the data owners and the requester without depending on the third party users. The proposed authentication scheme using fog nodes effectively solved the problems of a single point of failure in the storage system and offers many benefits by increasing the throughput and reducing the cost. The proposed scheme considers several entities, like end-users, IoT devices, fog nodes, and smart contracts, which help to administrate the authentication using access policies. The proposed authentication scheme using fog node provided superior results than other methods with minimal memory value of 4009.083 KB, minimal time of 76.915 s, and maximal Packet delivery ratio (PDR) of 76.



中文翻译:

雾计算环境中基于身份验证的物联网设备访问控制和数据交换机制

雾计算的出现见证了在用户之间发起安全通信的重要作用。雾计算使您能够对一组物联网(IoT)设备执行分析,处理和存储。通过利用雾节点设计了几种物联网解决方案,以减轻物联网设备的复杂计算和繁重的处理。本文提出了一种认证方案,该方案使用雾节点通过提供安全性而不考虑受信任的第三方来管理物联网设备。所提出的认证方案利用了雾节点部署的好处。使用雾节点的身份验证方案可在数据所有者和请求者之间提供可靠的验证,而无需依赖第三方用户。提出的使用雾节点的认证方案有效地解决了存储系统中单点故障的问题,并通过增加吞吐量和降低成本提供了许多好处。提议的方案考虑了多个实体,例如最终用户,IoT设备,雾节点和智能合约,这些实体有助于使用访问策略管理身份验证。提出的使用雾节点的身份验证方案提供了比其他方法更好的结果,其最小内存值为4009.083 KB,最短时间为76.915 s,最大包传送率(PDR)为76。这有助于使用访问策略管理身份验证。提出的使用雾节点的身份验证方案提供了比其他方法更好的结果,其最小内存值为4009.083 KB,最短时间为76.915 s,最大包传送率(PDR)为76。这有助于使用访问策略管理身份验证。提出的使用雾节点的身份验证方案提供了比其他方法更好的结果,其最小内存值为4009.083 KB,最短时间为76.915 s,最大包传送率(PDR)为76。

更新日期:2020-10-15
down
wechat
bug