Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks

Abstract Recently, there is an exponential increase in the multimedia and other data over the Internet of Things (IoT). This data is generally send to the cloud for processing and storage. The fog layer in-between readily bridges communication among the IoT devices and the cloud. It delivers services efficiently by computing and analyzing various multimedia information generated by the IoT devices residing on the sensors. However, provision of effective security and energy are critical challenges. The purpose of this work is to enhance the secure transfer of information like multimedia. This scheme uses Message Queue Telemetry Transport (MQTT) protocol over SSL/TLS. Since MQTT is vulnerable to eavesdropping, the Elliptic curve-ElGamal cryptography algorithm is introduced which lends a homomorphic factor thereby mitigating man-in-the-middle attack. The dynamic key change and proportional offloading of data as proposed in the current research work helps to preserve node energy by selectively transferring data to the cloud and the fog according to the data topic. The results depict that the system security and lifetime can be improved in comparison to the existing protocols.

[1]  Ruei-Hau Hsu,et al.  Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions , 2019, IEEE Consumer Electronics Magazine.

[2]  Graham Morgan,et al.  Fog Computing Security Challenges and Future Directions [Energy and Security] , 2019, IEEE Consumer Electronics Magazine.

[3]  Angelo Furfaro,et al.  Using virtual environments for the assessment of cybersecurity issues in IoT scenarios , 2017, Simul. Model. Pract. Theory.

[4]  Sudeep TanwarSudhanshu TyagiNeeraj Kumar,et al.  Multimedia Big Data Computing for IoT Applications , 2020 .

[5]  Aamir Mahmood,et al.  Fog Computing Enabling Industrial Internet of Things: State-of-the-Art and Research Challenges , 2019, Sensors.

[6]  Antonio J. Jara,et al.  Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices , 2015, Sensors.

[7]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[8]  P. Balamuralidhar,et al.  Secure MQTT for Internet of Things (IoT) , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[9]  Mingzhe Jiang,et al.  Leveraging Fog Computing for Healthcare IoT , 2018 .

[10]  Naveen K. Chilamkurti,et al.  Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.

[11]  Arwa Alrawais,et al.  An Attribute-Based Encryption Scheme to Secure Fog Communications , 2017, IEEE Access.

[12]  V. S. Malemath,et al.  Security attacks and secure routing protocols in RPL-based Internet of Things: Survey , 2017, 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI).

[13]  Mario Nemirovsky,et al.  Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing , 2014, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[14]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[15]  Floriano De Rango,et al.  Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks , 2020, Pervasive Mob. Comput..

[16]  Guojun Wang,et al.  A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking , 2019, Comput. Secur..

[17]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[18]  R. Sakthivel,et al.  High-performance ECC processor architecture design for IoT security applications , 2018, The Journal of Supercomputing.

[19]  Choong Seon Hong,et al.  Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges , 2019, Future Gener. Comput. Syst..

[20]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[21]  Liehuang Zhu,et al.  A privacy-preserving data aggregation scheme for dynamic groups in fog computing , 2020, Inf. Sci..

[22]  Vijay Laxmi,et al.  A Survey on Energy Efficient Routing for Delay Minimization in IoT Networks , 2018, 2018 International Conference on Intelligent Circuits and Systems (ICICS).

[23]  Zurina Mohd Hanapi,et al.  Comparison of ECC and RSA Algorithm in Resource Constrained Devices , 2013, 2013 International Conference on IT Convergence and Security (ICITCS).

[24]  Peng-Yu Wang,et al.  Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[25]  Srivaths Ravi,et al.  Analyzing the energy consumption of security protocols , 2003, ISLPED '03.

[26]  Joel J. P. C. Rodrigues,et al.  A Survey on Security and Privacy Challenges in Device Discovery for Next-Generation Systems , 2020, IEEE Access.

[27]  Tao Xiang,et al.  Two Secure Privacy-Preserving Data Aggregation Schemes for IoT , 2019, Wirel. Commun. Mob. Comput..

[28]  Nitin Gupta,et al.  A Survey on Mobile Agent based Intrusion Detection System , 2011 .

[29]  Yan Zhang,et al.  A Collusion-Resistant and Privacy-Preserving Data Aggregation Protocol in Crowdsensing System , 2017, Mob. Inf. Syst..

[30]  Prosanta Gope,et al.  LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm , 2019, Comput. Secur..

[31]  C. A. Dhote,et al.  Efficient homomorphic encryption using ECC-elgamal scheme for cloud data , 2016 .

[32]  Tao Jiang,et al.  Edge Computing Framework for Cooperative Video Processing in Multimedia IoT Systems , 2018, IEEE Transactions on Multimedia.