Authentication Devices in Fog-Mobile Edge Computing Environments Through a Wireless Grid Resource Sharing Protocol

07/05/2022
by   Tyson Brooks, et al.
0

The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing and wireless grids has resulted in the widespread deployment of relatively immature technology. These technologies, which will primarily use 5G wireless communication networks, are becoming popular because they can be deployed quickly with little infrastructure and lends themselves to environments utilizing numerous internet connected devices (ICD). Because of the threat of exploitation, these networks have to be protected by a robust security architecture due to these technologies being plagued with security problems. The authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new information system platforms. This article identifies an authentication process required for these ICDs, which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud network through a wireless grid authentication process. The purpose of this article is to hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and mobile edge computing clouds to create this new IoT architecture. An authentication process developed from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors depending on their capability to handle five primary functions: management of identification [ID] and presence, permissions management, data transferability, application-programming interface [API] and security.

READ FULL TEXT

page 4

page 5

page 10

page 11

page 13

page 14

research
09/07/2023

The Power of Internet of Things (IoT): Connecting the Dots with Cloud, Edge, and Fog Computing

The Internet of Things (IoT) is regarded as an improved communication sy...
research
12/08/2022

An SLR on Edge Computing Security and possible threat protection

Mobile and Internet of Things devices are generating enormous amounts of...
research
07/21/2019

A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing

With the advent of the Internet-of-Things (IoT), vehicular networks and ...
research
11/12/2020

A Fast and Scalable Authentication Scheme in IoT for Smart Living

Numerous resource-limited smart objects (SOs) such as sensors and actuat...
research
11/27/2018

Adaptive Edge Process Migration for IoT in Heterogeneous Cloud-Fog-Edge Computing Environment

The latency issue of the cloud-centric IoT management system has motivat...
research
04/15/2021

Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case

Today, the Internet of Things (IoT) is one of the emerging technologies ...
research
05/09/2018

Secure Mobile Edge Computing in IoT via Collaborative Online Learning

To accommodate heterogeneous tasks in Internet of Things (IoT), a new co...

Please sign up or login with your details

Forgot password? Click here to reset