2022
DOI: 10.3390/math10224166
|View full text |Cite
|
Sign up to set email alerts
|

Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog

Abstract: The rapid development of technology has made the Internet of Things an integral element of modern society. Modern Internet of Things’ implementations often use Fog computing, an offshoot of the Cloud computing that offers localized processing power at the network’s periphery. The Internet of Things serves as the inspiration for the decentralized solution known as Fog computing. Features such as distributed computing, low latency, location awareness, on-premise installation, and support for heterogeneous hardwa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 42 publications
0
6
0
Order By: Relevance
“…Cloud and Fog: In this domain, researchers [10,15,[40][41][42], collaboratively contribute 8%, highlighting the pivotal role of identity verification for securing access to both cloud services and fog computing nodes. The common objectives underscore the imperative for robust authentication mechanisms in these distributed environments.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
See 3 more Smart Citations
“…Cloud and Fog: In this domain, researchers [10,15,[40][41][42], collaboratively contribute 8%, highlighting the pivotal role of identity verification for securing access to both cloud services and fog computing nodes. The common objectives underscore the imperative for robust authentication mechanisms in these distributed environments.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
“…In general, authentication processes in IoT are challenged by the need for security in information sharing and data transmission [6,28,68], wireless communication [49,51,56,57,62], proximity-based authentication [36], false-positive identification [13], or service operations [38]. Another similar aspect is the ability to resist/detection of evolving cyberattacks [14,15,28,37,41,47,52,53,57,65,66,68], leading to the adoption of fog computing that compliments the needs of IoT [40,72]. From the cybersecurity research perspective, the problem with group key distribution or multiowned devices from an industrial capacity was prevalent [9,16,26,29,31,44,73], as well as an identity-based authentication protocol for IoT [43,60,70,74].…”
Section: Rq3 What Kinds Of Problems Are Present In Iot Authentication?mentioning
confidence: 99%
See 2 more Smart Citations
“…This framework uses an encrypted biometric identification approach and can satisfy a variety of security features such as replay attacks, user anonymity, and man-in-the-middle attacks. However, these common IoTs authentication schemes are mainly based on a centralized system [42][43][44]. That is, a trusted centralized server is used to provide authentication services for IoTs devices.…”
Section: Preliminariesmentioning
confidence: 99%