Analysis of Lightweight Encryption Scheme for Fog-to-Things Communication

The growing concerns in cybersecurity is preventing unknowns which evolve from time to time. Internet of Things (IoT) is one of the emerging fields that have been applied for smart cities and industries. The promises of IoTs could be confronted with the growth in the number and sophistication of cyberattacks. The extension of digital world into physical environment adds new attack surfaces on the existing security threats of traditional Internet. The major challenge brought about by physical connectivity of IoTs is to implement distributed security mechanisms for resource constrain of IoT devices. As an emerging architecture supporting IoT applications, fog computing can be considered to solve the resource and distribution issues in securing fog-to-things communication. Security functions and services, such as cryptography, could be offloaded to fog nodes to reduce computational and storage burdens on IoT devices. The distribution of fog nodes can also solve the scalability of cloud by reducing central processing and communications. On the other hand, lightweight cryptographic functions, such as elliptic curve cryptography, have been proved to be suitable for embedded systems. In this paper, we have analyzed security challenges in terms of cybersecurity principles and proposed a novel encryption scheme for fog-to-things communication.

[1]  Naveen K. Chilamkurti,et al.  Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.

[2]  Vinod Vaikuntanathan,et al.  Fast Proxy Re-Encryption for Publish/Subscribe Systems , 2017, IACR Cryptol. ePrint Arch..

[3]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[4]  You-Jin Song,et al.  Secure Data Sharing based on Proxy Re-encryption in Fog Computing Environment , 2016 .

[5]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[6]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[7]  Ivan Stojmenovic,et al.  An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..

[8]  Sandeep S. Kumar,et al.  Elliptic Curve Cryptography for Constrained Devices , 2008 .

[9]  Prakash Veeraraghavan,et al.  Elliptic Curve Based Cybersecurity Schemes for Publish-Subscribe Internet of Things , 2016, QSHINE.

[10]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[11]  Manjusha Pandey,et al.  Distributed Denial of Service Attacks: A Review , 2014 .

[12]  Zhiwei Wang Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing , 2018, Future Gener. Comput. Syst..

[13]  Naveen Chilamkurti,et al.  Differential flow space allocation scheme in SDN based fog computing for IoT applications , 2018 .

[14]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[15]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[16]  Mohsen Guizani,et al.  Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.

[17]  Matthew Green,et al.  Identity-Based Proxy Re-encryption , 2007, ACNS.

[18]  Ivan Stojmenovic,et al.  Fog computing: A cloud to the ground support for smart things and machine-to-machine networks , 2014, 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC).

[19]  John McCumber Assessing and Managing Security Risk in IT Systems: A Structured Methodology , 2004 .

[20]  Susan Hohenberger,et al.  Key-Private Proxy Re-encryption , 2009, CT-RSA.

[21]  Marthony Taguinod,et al.  Policy-driven security management for fog computing: Preliminary framework and a case study , 2014, Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014).

[22]  Maged Hamada Ibrahim,et al.  Octopus: An Edge-fog Mutual Authentication Scheme , 2016, Int. J. Netw. Secur..