Abstract Due to the large number of IoT devices available, data needed to be processed by cloud service providers has grown exponentially. This leads to increase in the latency of cloud services and by extension latency in many IoT applications. To reduce this latency, computing devices are installed at the edge of the network close to the user. These devices are called “Fog Nodes”. They allow the user to process some data without going all the way to the data center. While the data centers are equipped with abundant resources (i.e. processors, energy and memory), the fog devices are not. This means traditional techniques for preventing intrusion are not applicable at the fog level, because they will incur more latency and/or energy consumption. Therefore, there is a need for low resource demanding, yet strong security system that will protect the fog layer from being attacked. This paper proposes an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) for Man in the Middle (MitM) attack at the fog layer. The IDS consists of IDS nodes that periodically interrogate nodes one hop away. The IPS uses lightweight encryption to prevent Man in the Middle attack and its variants (i.e. Eavesdropping, Packet Modification and Wormhole attack).
[1]
Jin-cui Yang,et al.
Security model and key technologies for the Internet of things
,
2011
.
[2]
Simon Parkinson,et al.
Fog computing security: a review of current applications and security solutions
,
2017,
Journal of Cloud Computing.
[3]
Tao Zhang,et al.
Fog and IoT: An Overview of Research Opportunities
,
2016,
IEEE Internet of Things Journal.
[4]
Mark Nixon,et al.
A Comparison of WirelessHART™ and ISA100.11a
,
2012
.
[5]
Vijanth S. Asirvadam,et al.
Energy Consumption Analysis of WirelessHART Adaptor for Industrial Wireless Sensor Actuator Network
,
2017
.
[6]
Ilango Krishnamurthi,et al.
Modified DSR protocol for detection and removal of selective black hole attack in MANET
,
2014,
Comput. Electr. Eng..
[7]
David P. Jablon.
Strong password-only authenticated key exchange
,
1996,
CCRV.