Document Type : Research Paper

Authors

1 Ferdowsi University of Mashhad

2 Computer Engineering Department, Ferdowsi University of Mashhad, Iran

Abstract

Nowadays Internet of Things (IoT) is growing to be a serious factor in numerous areas of our daily life style. Internet of Things brings different opportunities of intelligence to important aspects such as health, payments, energy management, industrial sectors, transportation and also many other specialties. It is important to notice that the interaction between these two part the embedded equipment and Cloud based web services is such a common or prevalent scenario of Internet of Things deployment. When it comes to the security point of view, jointly users (consumer) and smart devices need to reassure and establish a secure and confident communication channel and should have a perfect form of digital identity. In many situations, IoT devices needs an already or earlier established infrastructure for their usage and that cannot be managed by the device owner, such as the case in smart homes. Furthermore, the scenario presupposes a security stack that it is appropriate for heterogeneous devices which can be integrated in Internet of Things frameworks or in already presented operating systems. We proposed a Foggy Smart Home Architecture (FSHA). We identify end users by writing an authentication and authorization protocol, and we will reduce the time required for this security operation, so that the proposed method can prevent Non-manipulation, online/offline password guessing attack and user impersonation attack and man-in-the-middle attack. Our method improves performance of smart home and using fog layer can minimize traffic between cloud and gateways.

Keywords

Main Subjects

[1] I. Stojmenovic and S. Wen, “The fog computing
paradigm: Scenarios and security issues,” Computer
Science and Information Systems (FedCSIS), 2014
Federated Conference on, IEEE, (2014).
[2] Q. Jing, A.V. Vasilakos, J. Wan, J. Lu and D. Qiu,
“Security of the internet of things: Perspectives and
challenges,” Wireless Networks 20, 8, 2481-2501, 2014.
[3] S. Li, T. Tryfonas and H. Li, “The internet of things: a
security point of view,” Internet Research 26, 2, 337-359,
2016.
[4] S. Yi, Z. Qin and Q. Li, “Security and privacy issues of
fog computing: A survey International Conference on
Wireless Algorithms, Systems, and Applications,
Springer,” 2015.
[5] S.R. Moosavi, T.N. Gia, A.-M. Rahmani, E. Nigussie,
S. Virtanen, J. Isoaho and H. Tenhunen, “SEA: a secure
and efficient authentication and authorization architecture
for IoT-based healthcare using smart gateways,” Procedia
Computer Science 52, 452-459, 2015.
[6] L. Barreto, A. Celesti, M. Villari, M. Fazio and A.
Puliafito, “An authentication model for IoT clouds,”
Proceedings of the 2015 IEEE/ACM International
Conference on Advances in Social Networks Analysis and
Mining 2015, ACM, 2015.
[7] C.-T Li, T.-Y. Wu, C.-L. Chen, C.-C. Lee and C.-M.
Chen, “An efficient user authentication and user anonymity
scheme with provably security for iot-based medical care
system,” Sensors 17, 7, 1482, 2017.
[8] P. Kumar, A. Braeken, A. Gurtov, J. Iinatti and P. H.
Ha, “Anonymous Secure Framework in Connected Smart
Home Environments,” IEEE Transactions on Information
Forensics and Security 12, 4, 968-979, 2017.
[9] M. Amadeo, A. Molinaro, S. Y. Paratore, A. Altomare,
A. Giordano and C. Mastroianni, “A Cloud of Things
framework for smart home services based on Information
Centric Networking,” Networking, Sensing and Control
(ICNSC), 2017 IEEE 14th International Conference on,
IEEE., 2017.
[10] J. Dutta, and S. Roy, “IoT-fog-cloud based
architecture for smart city: Prototype of a smart building,”
Cloud Computing, Data Science & EngineeringConfluence, 2017 7th International Conference on, IEEE,
2017.
[11] J. Li, J. Jin, D. Yuan, M. Palaniswami and K.
Moessner, “EHOPES: Data-centered Fog platform for
smart living,” Telecommunication Networks and
Applications Conference (ITNAC), 2015 International,
IEEE, 2015.
[12] Y. Sahni, J. Cao, S. Zhang and L. Yang, “Edge Mesh:
A new paradigm to enable distributed intelligence in
Internet of Things,” IEEE Access 5, 16441-16458, 2017.
[13] W. Lee, K. Nam, H.-G. Roh and S.-H. Kim, “A
gateway based fog computing architecture for wireless
sensors and actuator networks,” Advanced Communication
Technology (ICACT), 2016 18th International Conference
on, IEEE, 2016.
[14] A. M. Rahmani, T. N. Gia, B. Negash, A. Anzanpour,
I. Azimi, M. Jiang and P. Liljeberg, “Exploiting smart ehealth gateways at the edge of healthcare internet-ofthings: a fog computing approach,” Future Generation
Computer Systems, 2017.
[15] H. Gupta, A. Vahid Dastjerdi, S. K. Ghosh and R.
Buyya, “iFogSim: A toolkit for modeling and simulation of
resource management techniques in the Internet of Things,
Edge and Fog computing environments,” Software:
Practice and Experience 47, 9, 275-1296, 2017.
[16] http://math.nist.gov/javanumerics/jama/
[17] Y. Park, and Y. Park, “A Selective Group
Authentication Scheme for IoT-Based Medical
Information System,” Journal of medical systems 41, 4, 48,
2017.
[18] Kabirzadeh, Sabihe, Dadmehr Rahbari, and Mohsen
Nickray. “A Hyper Heuristic Algorithm for Scheduling of
Fog Networks.” In Proceedings of the 21st Conference of
Open Innovations Association FRUCT, p. 20. FRUCT Oy,
2017.