Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F04274644%3A_____%2F22%3A%230000914" target="_blank" >RIV/04274644:_____/22:#0000914 - isvavai.cz</a>
Result on the web
<a href="https://doi.org/10.3390/math10224166" target="_blank" >https://doi.org/10.3390/math10224166</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.3390/math10224166" target="_blank" >10.3390/math10224166</a>
Alternative languages
Result language
angličtina
Original language name
Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog
Original language description
The rapid development of technology has made the Internet of Things an integral element of modern society. Modern Internet of Things’ implementations often use Fog computing, an offshoot of the Cloud computing that offers localized processing power at the network’s periphery. The Internet of Things serves as the inspiration for the decentralized solution known as Fog computing. Features such as distributed computing, low latency, location awareness, on-premise installation, and support for heterogeneous hardware are all facilitated by Fog computing. End-to-end security in the Internet of Things is challenging due to the wide variety of use cases and the disparate resource availability of participating entities. Due to their limited resources, it is out of the question to use complex cryptographic algorithms for this class of devices. All Internet of Things devices, even those connected to servers online, have constrained resources such as power and processing speed, so they would rather not deal with strict security measures. This paper initially examines distributed Fog computing and creates a new authentication framework to support the Internet of Things environment. The following authentication architecture is recommended for various Internet of Things applications, such as healthcare systems, transportation systems, smart buildings, smart energy, etc. The total effectiveness of the method is measured by considering factors such as the cost of communication and the storage overhead incurred by the offered integrated authentication protocol. It has been proven that the proposed technique will reduce communication costs by at least 11%.
Czech name
—
Czech description
—
Classification
Type
J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
—
Continuities
S - Specificky vyzkum na vysokych skolach
Others
Publication year
2022
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
Mathematics
ISSN
2227-7390
e-ISSN
—
Volume of the periodical
10
Issue of the periodical within the volume
22
Country of publishing house
CH - SWITZERLAND
Number of pages
17
Pages from-to
1-17
UT code for WoS article
000887512300001
EID of the result in the Scopus database
2-s2.0-85142470228