Skip to main content
Top
Published in: Journal of Combinatorial Optimization 2/2023

01-03-2023

RETRACTED ARTICLE: Lightweight multi-level authentication scheme for secured data transmission in IoT-Fog context

Authors: Pratik Kanani, Pooja Vartak, Kanchan Dabre, Vipul Gohil, Archana Nanade, Niti Desai, Mamta Padole

Published in: Journal of Combinatorial Optimization | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The IoT-sensed data is normally processed by Cloud Servers (CSs), but to reduce the cloud load and to avert network bandwidth wastage, Fog Computing (FC) is used. FC storages are LAN-based and they are not permanent. To store the data permanently, FNs (Fog Node) and IoT devices are making use of CSs. In the current scenario, we have IoT devices, FNs, and CSs. To process IoT data more efficiently, Multi-level FC architecture is suggested where normally, different security schemes are used at different information levels. Sometimes, the middle layer device has two varying security schemes, one to process lower-level data, and another to communicate the results with higher-level devices. Having multiple security algorithms make it more difficult to deploy any application, while the high complexity because of the multiple security schemes makes the system more vulnerable. Here, one unique lightweight security scheme is suggested that can single-handedly satisfy all the levels of security with different security levels. The scheme is based on Logical operations and it is multi-keyed logic. The proposed scheme makes sure that it has a lower time and space complexity to support IoT devices. In addition to that, the scheme has varied key-length features, which makes it capable to secure higher-level data at higher-level devices like servers. In designing, different HMACs, Op_codes, and chaining logic are used. The proposed mechanism is also analogized with other existing techniques and it is discovered to be superior to the others. Furthermore, it is tested against various attacks to prevent any vulnerabilities from exploitations. The given security scheme is lightweight and it provides security assurance in data transmission in the IoT-Fog, Fog to multi-Fog, and Fog to Cloud end.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abdullah W, Boudriga N, Kim D, An S (2015) An efficient and scalable key management mechanism for wireless sensor networks. In: 16th international conference on advanced communication technology 01–03 July 2015, Pyeong Chang, Korea (South), pp 480–493. https://doi.org/10.1109/ICACT.2015.7224913 Abdullah W, Boudriga N, Kim D, An S (2015) An efficient and scalable key management mechanism for wireless sensor networks. In: 16th international conference on advanced communication technology 01–03 July 2015, Pyeong Chang, Korea (South), pp 480–493. https://​doi.​org/​10.​1109/​ICACT.​2015.​7224913
go back to reference Abed AA, Boyacı A (2020) A lightweight cryptography algorithm for secure smart cities and IOT. Electrica 20(2):168–176CrossRef Abed AA, Boyacı A (2020) A lightweight cryptography algorithm for secure smart cities and IOT. Electrica 20(2):168–176CrossRef
go back to reference Abou-Tair DED, Buchsenstein S, Khalifeh A (2020) A fog computing-based framework for privacy preserving IoT environments. Int Arab J Inf Technol 17(3):306–315 Abou-Tair DED, Buchsenstein S, Khalifeh A (2020) A fog computing-based framework for privacy preserving IoT environments. Int Arab J Inf Technol 17(3):306–315
go back to reference Ali ZH, Ali HA, Badawy MM (2015) Article: Internet of Things (IoT): definitions, challenges and recent research directions. Int J Comput Appl 128(1):37–47 Ali ZH, Ali HA, Badawy MM (2015) Article: Internet of Things (IoT): definitions, challenges and recent research directions. Int J Comput Appl 128(1):37–47
go back to reference Butun I, Sari A, Osterberg P (2019) Security implications of fog computing on the internet of things. In: IEEE international conference on consumer electronics (ICCE) 11–13 January 2019, Las Vegas, NV, USA, pp 1–5 Butun I, Sari A, Osterberg P (2019) Security implications of fog computing on the internet of things. In: IEEE international conference on consumer electronics (ICCE) 11–13 January 2019, Las Vegas, NV, USA, pp 1–5
go back to reference Habak K, Shi C, Zegura EW, Harras KA, Ammar MH (2017) Elastic mobile device clouds: leveraging mobile devices to provide cloud computing services at the edge. Fog for 5G and IoT, pp 159–163 Habak K, Shi C, Zegura EW, Harras KA, Ammar MH (2017) Elastic mobile device clouds: leveraging mobile devices to provide cloud computing services at the edge. Fog for 5G and IoT, pp 159–163
go back to reference Ketel M (2017) Fog-cloud services for IoT. Proc Southeast Conf Kennesaw GA USA 13–15:262–264CrossRef Ketel M (2017) Fog-cloud services for IoT. Proc Southeast Conf Kennesaw GA USA 13–15:262–264CrossRef
go back to reference Krishna M, Doja M (2011) Symmetric key management and distribution techniques in Wireless ad-hoc Networks. In: International conference on computational intelligence and communication networks (CICN), 07–09 October, Gwalior, India, pp 727–731. https://doi.org/10.1109/CICN.2011.158 Krishna M, Doja M (2011) Symmetric key management and distribution techniques in Wireless ad-hoc Networks. In: International conference on computational intelligence and communication networks (CICN), 07–09 October, Gwalior, India, pp 727–731. https://​doi.​org/​10.​1109/​CICN.​2011.​158
go back to reference Shah K, Kaul V, Kanani P (2014) Logical cryptography in modern cryptosystem. Int J Emerg Trends Eng Dev 34:191–200 Shah K, Kaul V, Kanani P (2014) Logical cryptography in modern cryptosystem. Int J Emerg Trends Eng Dev 34:191–200
go back to reference Shah A, Engineer M (2019) A survey of lightweight cryptographic algorithms for IoT-based applications. In: Tiwari S, Trivedi M, Mishra K, Misra A, Kumar K (eds) Smart innovations in communication and computational sciences. Advances in intelligent systems and computing, 851. Springer, Singapore. https://doi.org/10.1007/978-981-13-2414-7_27 Shah A, Engineer M (2019) A survey of lightweight cryptographic algorithms for IoT-based applications. In: Tiwari S, Trivedi M, Mishra K, Misra A, Kumar K (eds) Smart innovations in communication and computational sciences. Advances in intelligent systems and computing, 851. Springer, Singapore. https://​doi.​org/​10.​1007/​978-981-13-2414-7_​27
go back to reference Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y (2017) Comprehensive study of symmetric key and asymmetric key encryption algorithms. In: Proceedings of the 2017 international conference on engineering and technology (ICET), Antalya, Turkey, 21–23 August 2017, pp 1–7. https://doi.org/10.1109/ICEngTechnol.2017.8308215 Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y (2017) Comprehensive study of symmetric key and asymmetric key encryption algorithms. In: Proceedings of the 2017 international conference on engineering and technology (ICET), Antalya, Turkey, 21–23 August 2017, pp 1–7. https://​doi.​org/​10.​1109/​ICEngTechnol.​2017.​8308215
Metadata
Title
RETRACTED ARTICLE: Lightweight multi-level authentication scheme for secured data transmission in IoT-Fog context
Authors
Pratik Kanani
Pooja Vartak
Kanchan Dabre
Vipul Gohil
Archana Nanade
Niti Desai
Mamta Padole
Publication date
01-03-2023
Publisher
Springer US
Published in
Journal of Combinatorial Optimization / Issue 2/2023
Print ISSN: 1382-6905
Electronic ISSN: 1573-2886
DOI
https://doi.org/10.1007/s10878-023-00987-x

Other articles of this Issue 2/2023

Journal of Combinatorial Optimization 2/2023 Go to the issue

Premium Partner