FOCUS: A fog computing-based security system for the Internet of Things

As the Internet of Things (IoT) continues to grow, there arises concerns and challenges with regard to the security and privacy of the IoT. Cyber attacks such as man-in-the-middle and distributed denial of service (DDoS) are typical threats to the IoT. In this paper, we propose a FOg CompUting-based Security (FOCUS) system to protect the IoT against malware cyber attacks. The proposed FOCUS system leverages the virtual private network (VPN) to secure the communication channels to the IoT devices. In addition, FOCUS adopts a challenge-response authentication to protect the VPN server against potential DDoS attacks, which can further enhance the security of the IoT system. Such a double protection scheme is effective in mitigating various malicious attacks and can provide a high standard security for the IoT system. Furthermore, FOCUS is implemented in fog computing that is close to the end users, thus achieving a fast response and an efficient network consumption. We demonstrate FOCUS in a proof-of-concept prototype, and conduct experiments to evaluate its performance. The results show that FOCUS can effectively filter out malicious attacks with a low response time and a small amount of network bandwidth consumption.

[1]  Wuu Yang,et al.  DDoS detection and traceback with decision tree and grey relational analysis , 2011, Int. J. Ad Hoc Ubiquitous Comput..

[2]  Nikolay Kakanakov,et al.  Adaptive models for security and data protection in IoT with Cloud technologies , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[3]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[4]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[5]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[6]  Prasad Calyam,et al.  End-to-End IoT Security Middleware for Cloud-Fog Communication , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).

[7]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[8]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[9]  Alex X. Liu,et al.  Privacy Preserving Collaborative Enforcement of Firewall Policies in Virtual Private Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[10]  Nazar Abbas Saqib,et al.  Internet of Things data analytics for user authentication and activity recognition , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).

[11]  Riccardo Bonetto,et al.  Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[12]  Yixian Yang,et al.  Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things , 2017, IEEE Access.

[13]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[14]  Panita Pongpaibool,et al.  Authorization mechanism for MQTT-based Internet of Things , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[15]  Rodrigo Roman,et al.  From SMOG to Fog: A security perspective , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).