A trust computed framework for IoT devices and fog computing environment

In this paper, we have demoralized the transmission processing concerns of fog nodes and IoT device layer attack during the handoff (mobility) of IoT devices in the fog environment. A secure routed and handoff mechanism is proposed in order to avoid the attack by exploring the trust value and rating of each fog IoT and fog nodes/devices based on their communication behaviour. A trust manager is established between fog layer and IoT layer that keeps the record of all fog nodes in its look-up table and detects the malicious fog and IoT nodes. Further, the fog nodes computes rating of their service requested IoT layer and routed the services through highly trusted possible path. The proposed mechanism is validated against conventional security approaches over certain networking parameters.

[1]  Yanan Xu,et al.  Urban noise mapping with a crowd sensing system , 2019, Wirel. Networks.

[2]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[3]  Cheng Li,et al.  Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks , 2017, IEEE Internet of Things Journal.

[4]  Sangtae Ha,et al.  Clarifying Fog Computing and Networking: 10 Questions and Answers , 2017, IEEE Communications Magazine.

[5]  Yong Peng,et al.  Toward Architectural and Protocol-Level Foundation for End-to-End Trustworthiness in Cloud/Fog Computing , 2017, IEEE Transactions on Big Data.

[6]  Roch H. Glitho,et al.  A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.

[7]  Joel J. P. C. Rodrigues,et al.  Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment , 2019, IEEE Access.

[8]  Xianbin Wang,et al.  A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication , 2018, IEEE Access.

[9]  Mauro Conti,et al.  Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.

[10]  Mukesh Singhal,et al.  Efficient and Scalable Query Authentication for Cloud-Based Storage Systems with Multiple Data Sources , 2017, IEEE Transactions on Services Computing.

[11]  Xiaodong Lin,et al.  Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[12]  Stéphane Devismes,et al.  SR3: secure resilient reputation-based routing , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.

[13]  Hemraj Saini,et al.  Modified AODV (MAODV) Against Black Hole in WMN , 2018 .

[14]  Jian Shen,et al.  An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks , 2016, J. Netw. Comput. Appl..

[15]  Hemraj Saini,et al.  Aspects of Trusted Routing Communication in Smart Networks , 2017, Wireless Personal Communications.

[16]  Peter C. Mason,et al.  Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.

[17]  Xiaodong Lin,et al.  Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications , 2016, SecureComm.

[18]  Rong Jin,et al.  Physical layer multi-user key generation in wireless networks , 2018, Wirel. Networks.

[19]  Victor C. M. Leung,et al.  Trust-Based Communication for the Industrial Internet of Things , 2018, IEEE Communications Magazine.

[20]  Tie Qiu,et al.  Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.

[21]  Pangun Park,et al.  Markov chain model of fault-tolerant wireless networked control systems , 2019, Wirel. Networks.

[22]  Mauro Conti,et al.  Lightweight solutions to counter DDoS attacks in software defined networking , 2019, Wirel. Networks.

[23]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[24]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[25]  Min Ji,et al.  CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..

[26]  Chunyan Miao,et al.  An Entropy-Based Approach to Protecting Rating Systems from Unfair Testimonies , 2006, IEICE Trans. Inf. Syst..

[27]  Jing Zhang,et al.  5G-Smart Diabetes: Toward Personalized Diabetes Diagnosis with Healthcare Big Data Clouds , 2018, IEEE Communications Magazine.

[28]  Yier Jin,et al.  Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.

[29]  Xuemin Shen,et al.  Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[30]  Jennifer Golbeck,et al.  Computing and Applying Trust in Web-based Social Networks , 2005 .

[31]  Hemraj Saini,et al.  A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology , 2019, Multimedia Tools and Applications.

[32]  Ashwin Machanavajjhala,et al.  Worst-Case Background Knowledge for Privacy-Preserving Data Publishing , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[33]  David Pointcheval,et al.  Short Randomizable Signatures , 2016, CT-RSA.

[34]  Mukesh Singhal,et al.  Trust Management in Distributed Systems , 2007, Computer.

[35]  Tarik Taleb,et al.  A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.

[36]  Lenka Lhotská,et al.  Social Impact Theory Based Optimizer , 2007, ECAL.

[37]  Xuemin Shen,et al.  EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.

[38]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[39]  Shailendra Kumar Shrivastava,et al.  Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks , 2018 .