IDEAS home Printed from https://ideas.repec.org/a/wly/intnem/v33y2023i5ne2248.html
   My bibliography  Save this article

Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system

Author

Listed:
  • Erukala Suresh Babu
  • Mekala Srinivasa Rao
  • Gandharba Swain
  • A. Kousar Nikhath
  • Rajesh Kaluri

Abstract

The technological integration of the Internet of Things (IoT)‐Cloud paradigm has enabled intelligent linkages of things, data, processes, and people for efficient decision making without human intervention. However, it poses various challenges for IoT networks that cannot handle large amounts of operation technology (OT) data due to physical storage shortages, excessive latency, higher transfer costs, a lack of context awareness, impractical resiliency, and so on. As a result, the fog network emerged as a new computing model for providing computing capacity closer to IoT edge devices. The IoT‐Fog‐Cloud network, on the other hand, is more vulnerable to multiple security flaws, such as missing key management problems, inappropriate access control, inadequate software update mechanism, insecure configuration files and default passwords, missing communication security, and secure key exchange algorithms over unsecured channels. Therefore, these networks cannot make good security decisions, which are significantly easier to hack than to defend the fog‐enabled IoT environment. This paper proposes the cooperative flow for securing edge devices in fog‐enabled IoT networks using a permissioned blockchain system (pBCS). The proposed fog‐enabled IoT network provides efficient security solutions for key management issues, communication security, and secure key exchange mechanism using a blockchain system. To secure the fog‐based IoT network, we proposed a mechanism for identification and authentication among fog, gateway, and edge nodes that should register with the blockchain network. The fog nodes maintain the blockchain system and hold a shared smart contract for validating edge devices. The participating fog nodes serve as validators and maintain a distributed ledger/blockchain to authenticate and validate the request of the edge nodes. The network services can only be accessed by nodes that have been authenticated against the blockchain system. We implemented the proposed pBCS network using the private Ethereum 2.0 that enables secure device‐to‐device communication and demonstrated performance metrics such as throughput, transaction delay, block creation response time, communication, and computation overhead using state‐of‐the‐art techniques. Finally, we conducted a security analysis of the communication network to protect the IoT edge devices from unauthorized malicious nodes without data loss.

Suggested Citation

  • Erukala Suresh Babu & Mekala Srinivasa Rao & Gandharba Swain & A. Kousar Nikhath & Rajesh Kaluri, 2023. "Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system," International Journal of Network Management, John Wiley & Sons, vol. 33(5), September.
  • Handle: RePEc:wly:intnem:v:33:y:2023:i:5:n:e2248
    DOI: 10.1002/nem.2248
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/nem.2248
    Download Restriction: no

    File URL: https://libkey.io/10.1002/nem.2248?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:intnem:v:33:y:2023:i:5:n:e2248. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1002/(ISSN)1099-1190 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.