2019
DOI: 10.3390/jsan8010016
|View full text |Cite
|
Sign up to set email alerts
|

A Mechanism for Securing IoT-enabled Applications at the Fog Layer

Abstract: The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed of smart ubiquitous objects that are seamlessly connected to the Internet. These objects are deployed as Low power and Lossy Networks (LLN) to provide innovative services in various application domains such as smart cities, smart health, and smart communities. The LLN is a form of a network where the interconnected devices are highly resource-constrained (i.e., power, memory, and processing) and characterized by… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
48
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 99 publications
(49 citation statements)
references
References 42 publications
0
48
0
1
Order By: Relevance
“…Chaotic secure hashing in combination with a digital signature was used to authenticate user and then the user packets are analyzed. Rivest-Shamir-Adleman (RSA) algorithm was involved for secure transmission of the user credentials to the verifier entity [34]. The verification was provided by validating security parameters, device identity and password.…”
Section: Related Workmentioning
confidence: 99%
“…Chaotic secure hashing in combination with a digital signature was used to authenticate user and then the user packets are analyzed. Rivest-Shamir-Adleman (RSA) algorithm was involved for secure transmission of the user credentials to the verifier entity [34]. The verification was provided by validating security parameters, device identity and password.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [20] proposed a novel fog security service (FSS). The proposed security mechanism provides identity-based authentication, data integrity, and the non-repudiation of connecting nodes by using a private key generator (PKG).…”
Section: Literature Reviewmentioning
confidence: 99%
“…To a certain degree of network delay, FG requires less data transmission volume, has the ability to quickly process real-time data, improves local storage and computing capabilities, and eliminates bottlenecks in data transmission. Software-defined network (SDN), as a new type of network architecture, mainly separates the control plane from the data plane, and finally, realizes flexible control of network traffic [19]. Combining SDN with FG can effectively solve intermittent connections and high packet loss rates in the IoV, as well as optimizing and improving network deployment of the IoV through communication and consistent control between facilities.…”
Section: Iovmentioning
confidence: 99%