A Lightweight Authentication and Key Agreement Schemes for Iot Environments

The Internet of Things (IoT) has converged with cloud computing to provide comprehensive services to users in different locations. However, with the exponential growth of smart devices connected to the internet, cloud computing presents major challenges, especially for applications that require low-latency real-time processing. Therefore, the fog computing paradigm has emerged, which is more compatible with IoT, where events are processed close to where they occurred to get a convenient and fast response time. Authentication is a critical issue for fog computing security, as fog gateways and IoT devices face many attacks. The main problem with authentication between IoT devices is that they have limited compute resources and processing. On the one hand, certificate-based authentication algorithms are secure, but they are difficult for IoT devices. On the other hand, pre-shared authentication algorithms such as PSK are suitable for device-poor devices, but are not widely used due to their low security. Therefore, this document proposes to use the ECDHE (Elliptic Curve DiffieâHellman Ephemeral) key exchange algorithm with the pre-shared key (PSK) as a lightweight and secure authentication scheme between the fog gateway and the IoT device, based on the Message Queuing Telemetry Transport (MQTT) publish-subscribe protocol in a distributed fog computing architecture. The proposed ECDHE-PSK authentication scheme uses an ephemeral pre-shared key instead of heavy certificates, which is very lightweight and also provides a PFS (Perfect Forward Secrecy) function to improve security compared to the static PSK algorithm. To assess the resource consumption and security resistance of the proposed schema, it was implemented in the real-world test environment and then compared to two state-of-the-art certificate-based authentication schemes and a static PSK-based schema. Comprehensive performance and security assessments have shown that in the distributed fog computing architecture for publications, the proposed ECDHE-PSK is almost as light as the PSK algorithm, while having all the security features of certificate-based algorithms.

Access to the content of social magazines varies depending on the title. If you have access to a magazine through a club or association membership, please access your company`s magazine, select an article you want to view, and follow the instructions in this field. If you have access to a journal through a company or associations, read the following instructions Some social journals require you to create a personal profile, and then activate your business account Sanaz Amanlou holds a Master`s degree in Computer Science (Network Technology) from the Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia, in 2020. She has more than 6 years of professional experience in the field of network communication and security. His research interests include the Internet of Things, network security, wireless sensor networks, cloud, and fog computing. Khairul Azmi Abu Bakar (Ph.D., PTech, MIEEE) holds a degree in Computer Engineering from Iowa State University, USA, and a Master`s degree in Communication and Computer Science from Universiti Kebangsaan Malaysia. He obtained a PhD in Electrical Engineering from the University of Strathclyde, UK, for the study of free-rider nodes in an open MANET. He is currently a Senior Lecturer at the Cybersecurity Centre of the Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia. Previously, he was a research associate at MIMOS Berhad, a national applied research and development centre in Malaysia for microelectronics and ICT.

He has been involved in numerous R&D projects in the field of microcontrollers, smart cards, security systems under open source platform. His main research interests include network security, the Internet of Things and computer networks. He is also a member of the IEEE. You can be logged in at the same time using one or all of the methods listed below. Contact us if you have trouble logging in. Mohammad Kamrul Hasan (Ph.D., PTechâ20, SMIEEEâ13, MIETâ16) currently works as a Senior Lecturer at the Research Cluster Network and Communication Technology, Center for Cyber Security, Universiti Kebangsaan Malaysia (UKM). He received his PhD in Electrical Engineering and Communications Engineering from the Faculty of Engineering, Islamic International University of Malaysia in 2016. Mr. Hasan received his M.Sc degree in Communications Engineering from the Department of Electrical and Computer Engineering, Islamic International University of Malaysia in 2012.

Dr. Kamrul is a Senior Fellow of the Institute of Electrical and Electronics Engineers, a Fellow of the Institution of Engineering and Technology, and a Fellow of the Internet Society since 2013. He was President of the IEEE IIUM Student Branch from 2014 to 2016. He is a certified professional technologist and advises related industries. His research interests include telecommunications, the Internet of Things, vehicle networks, smart grid technologies, microprocessors and interfaces, and physical cybersecurity. Sign up here to access free tools such as favorites and notifications, or access personal subscriptions If you have access to journal content through a university, library or employer, register here This document is the result of the research project funded by Universiti Kebangsaan Malaysia (UKM) under the FRGS/1/2020/ICT03/UKM/02/6 and GGPM-2017-021 grant. . . .