IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i22p4166-d966031.html
   My bibliography  Save this article

Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog

Author

Listed:
  • Jan Lansky

    (Department of Computer Science and Mathematics, Faculty of Economic Studies, University of Finance and Administration, 10100 Prague, Czech Republic)

  • Mahyar Sadrishojaei

    (Faculty of Industry, University of Applied Science and Technology (UAST), Tehran 11369, Iran)

  • Amir Masoud Rahmani

    (Future Technology Research Center, National Yunlin University of Science and Technology, Douliou 64002, Taiwan)

  • Mazhar Hussain Malik

    (Department of Computer Science and Creative Technologies, University of the West of England—UWE Bristol, Bristol BS16 1QY, UK)

  • Faeze Kazemian

    (Department of Computer Science, University of Applied Science and Technology (UAST), Tehran 11369, Iran)

  • Mehdi Hosseinzadeh

    (Pattern Recognition and Machine Learning Lab, Gachon University, 1342 Seongnamdaero, Seongnam 13120, Korea)

Abstract

The rapid development of technology has made the Internet of Things an integral element of modern society. Modern Internet of Things’ implementations often use Fog computing, an offshoot of the Cloud computing that offers localized processing power at the network’s periphery. The Internet of Things serves as the inspiration for the decentralized solution known as Fog computing. Features such as distributed computing, low latency, location awareness, on-premise installation, and support for heterogeneous hardware are all facilitated by Fog computing. End-to-end security in the Internet of Things is challenging due to the wide variety of use cases and the disparate resource availability of participating entities. Due to their limited resources, it is out of the question to use complex cryptographic algorithms for this class of devices. All Internet of Things devices, even those connected to servers online, have constrained resources such as power and processing speed, so they would rather not deal with strict security measures. This paper initially examines distributed Fog computing and creates a new authentication framework to support the Internet of Things environment. The following authentication architecture is recommended for various Internet of Things applications, such as healthcare systems, transportation systems, smart buildings, smart energy, etc. The total effectiveness of the method is measured by considering factors such as the cost of communication and the storage overhead incurred by the offered integrated authentication protocol. It has been proven that the proposed technique will reduce communication costs by at least 11%.

Suggested Citation

  • Jan Lansky & Mahyar Sadrishojaei & Amir Masoud Rahmani & Mazhar Hussain Malik & Faeze Kazemian & Mehdi Hosseinzadeh, 2022. "Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog," Mathematics, MDPI, vol. 10(22), pages 1-17, November.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:22:p:4166-:d:966031
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/22/4166/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/22/4166/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Mohamed Sarrab & Fatma Alshohoumi, 2021. "Assisted-Fog-Based Framework for IoT-Based Healthcare Data Preservation," International Journal of Cloud Applications and Computing (IJCAC), IGI Global, vol. 11(2), pages 1-16, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Mehdi Hosseinzadeh & Liliana Ionescu-Feleaga & Bogdan-Ștefan Ionescu & Mahyar Sadrishojaei & Faeze Kazemian & Amir Masoud Rahmani & Faheem Khan, 2022. "A Hybrid Delay Aware Clustered Routing Approach Using Aquila Optimizer and Firefly Algorithm in Internet of Things," Mathematics, MDPI, vol. 10(22), pages 1-15, November.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ho Seoung Na & Junseok Hwang & Hongbum Kim, 2023. "Which Attributes Should be Considered in Regulating the Internet of Things? Evidence From Conjoint Analysis," SAGE Open, , vol. 13(4), pages 21582440231, November.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:22:p:4166-:d:966031. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.