Internet is a large network of networks that spans the entire globe. Internet is playing indispensable role in our daily lives. The physical things are connected to internet with the help of digital identity. With recent advancement of information and communication technologies IoT became vital part of human life. However, IoT is not having standardized architecture. Nowadays IoT is integrated with fog computing which extends platform of cloud computing by providing computing resources on edges of computer network. Fog computing is motivated by IOT and It is decentralized solution for IoT. In addition, Fog computing has supported features like geographic distribution, low latency, location awareness, operate on premise, installed on heterogeneous hardware. IoT with cloud computing does not have such features. Therefore, in this paper, at first we discuss about the distributed fog computing architecture. Subsequently, we address the problem of authentication and design a new authentication framework for fog enabled IOT environment. It is stated that the proposed authentication framework will be useful in many IoT applications such as healthcare system, transportation system, smart cities, home energy management etc.
Recently, applications of underwater wireless sensor networks like environment monitoring, underwater life imaging, tactical surveillance, ocean floor monitoring demand a persistent network period. However, underwater wireless sensor networks face many design challenges like unreliable link, high packet drop rate, inadequate bandwidth, restricted battery power, high attenuation, etc. Therefore, to prolong the network lifespan, energy efficient as well as energy balanced both types of approach is equally demanded. An energy-balanced hybrid transmission approach is proposed in this article, which uses depth information in place of location to transmit data packets. It uses some parameters like depth of the sensor nodes, residual energy of the node, and reliability of the link to select the relay node to forward data packets. In the proposal network divided into the slices of the same width, to control the hop-count as well as to balance the energy consumption of the sensor nodes participating in data transmission, and also prolonging the network lifespan. The effectiveness of the proposal is validated through extensive simulation and results show that the EBH-DBR outperforms its counterpart techniques in terms of network lifespan, energy consumption, throughput, and transmission loss.
Summary
The fog assisted‐Internet of Things (IoT) enabled network has been a novel topic in recent years. With the rapid development of the IoT, it is imperative to accomplish security in the fog computing environment. The surface for cryptographic attacks is expanded since the fog node can analyze, store, and process data between cloud and IoT device. This article proposes elliptic curve cryptography (ECC) based mutual authentication and key agreement scheme to support secure communication between device and fog server. In this work, we have formally analyzed the proposed scheme using the most widely accepted automated validation of Internet security protocols and application (AVISPA) tool. The informal security analysis of the proposed scheme shows that the proposed method is robust against several attacks. The performance analysis has been evaluated in terms of computation and storage overhead. The security and performance analysis with theoretical proof indicates that proposed scheme attains better security than related schemes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.