2022
DOI: 10.17762/ijcnis.v12i2.4464
|View full text |Cite
|
Sign up to set email alerts
|

Design of Lightweight Authentication Protocol for Fog enabled Internet of Things- A Centralized Authentication Framework

Abstract: Internet is a large network of networks that spans the entire globe. Internet is playing indispensable role in our daily lives. The physical things are connected to internet with the help of digital identity. With recent advancement of information and communication technologies IoT became vital part of human life. However, IoT is not having standardized architecture. Nowadays IoT is integrated with fog computing which extends platform of cloud computing by providing computing resources on edges of computer net… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…This attack is the illegal intercept of communications of two parties with the intent to eavesdrop, change, delay, or discard the messages during communication. When a patient is in urgent need of medication, the intruder may prescribe worst kind of medication procedures which may lead to the loss of valuable life [26] and [65]. Resistance to man-in-the-middle attack considered as one of the important security considerations to support authentication.…”
Section: Man-in-the-middle Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…This attack is the illegal intercept of communications of two parties with the intent to eavesdrop, change, delay, or discard the messages during communication. When a patient is in urgent need of medication, the intruder may prescribe worst kind of medication procedures which may lead to the loss of valuable life [26] and [65]. Resistance to man-in-the-middle attack considered as one of the important security considerations to support authentication.…”
Section: Man-in-the-middle Attackmentioning
confidence: 99%
“…This requirement guarantee that the intruder could never access the information of a legal party. The privacy of the client is kept secretive [65]. The user anonymity is significant requirement to be considered in preserving the security of the system [26].…”
Section: User Anonymitymentioning
confidence: 99%
“…Storage for IoT and Big Data applications is another pricey resource. Not all raw data generated for analytical purposes are necessary; certain information can be processed and handled on the system level [8]. It enables relevant information to be created before being sent for analysis to the cloud services unit.…”
Section: Intelligent Edge Processing Technique and Network Componentsmentioning
confidence: 99%
“…It tenses to decentralized security which is a difficult task in cloud computing here it discussed the fog computing architecture to find out the authentication problems. This framework of an IoT device authentication is very useful in health care system IoT [14].…”
Section: Literature Reviewmentioning
confidence: 99%