Skip to main content
Top

2021 | OriginalPaper | Chapter

Security in Critical Communication for Mobile Edge Computing Based IoE Applications

Authors : Tanmoy Maitra, Debasis Giri, Arup Sarkar

Published in: Mobile Edge Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The new era of the Internet of Everything (IoE) applications demands low latency along with security into the networks. The cloud-based architecture alone cannot provide low response time to the users or mobile devices (like phone, laptop, sensors device, etc.). Therefore between mobile devices and cloud, edge devices (known as Fog device) are introduced as middleware device. From the edge devices, users can get information from local devices without interacting with the cloud via the Internet or radio. In such complicated networks, security preservation in communications becomes a challenging task. The security protocols for critical communication in such applications (e-medical, e-banking) are based on the architecture of the networks which can be centralized or distributed or hybrid (a mixture of centralized and distributed). This book chapter discusses the different security protocols in communications for the aforementioned architectures which can be designed for Mobile Edge Computing (MEC) based IoE applications. Moreover, this chapter covers (a) architectures and their security threats, (b) necessity of security model in such applications, (c) different secure communication protocols for those applications, (d) challenges to design security protocols to reduce response time, and latency (e) the future direction of this research domain which can be explored more.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., Lv, W.: Edge Computing Security: State of the Art and Challenges. in Proceedings of the IEEE. vol. 107. no. 8 (2019) 1608–1631. Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., Lv, W.: Edge Computing Security: State of the Art and Challenges. in Proceedings of the IEEE. vol. 107. no. 8 (2019) 1608–1631.
4.
go back to reference Antonakakis et al.: Understanding the Mirai botnet. in Proc. of 26th USENIX Secur. Symp. Vancouver, BC, Canada: USENIX Association (2017) 1093–1110. Antonakakis et al.: Understanding the Mirai botnet. in Proc. of 26th USENIX Secur. Symp. Vancouver, BC, Canada: USENIX Association (2017) 1093–1110.
5.
go back to reference Dutta, J., Roy, S., C. Chowdhury, C.: Unified framework for IoT and smartphone based different smart city related applications. Microsyst Technol. Vol. 25. (2019) 83–96. Dutta, J., Roy, S., C. Chowdhury, C.: Unified framework for IoT and smartphone based different smart city related applications. Microsyst Technol. Vol. 25. (2019) 83–96.
6.
go back to reference Maitra, T., Giri, D.,: An Efficient Biometric and Password-Based Remote User Authentication using Smart Card for Telecare Medical Information Systems in Multi-Server Environment. Journal of Medical Systems. Vol. 38. no. 12, article no. 142, (2014) 1–19. Maitra, T., Giri, D.,: An Efficient Biometric and Password-Based Remote User Authentication using Smart Card for Telecare Medical Information Systems in Multi-Server Environment. Journal of Medical Systems. Vol. 38. no. 12, article no. 142, (2014) 1–19.
7.
go back to reference Giri, D., Maitra, T., Amin, R., Srivastava, P. D.: An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems. Journal of Medical Systems. Vol. 39. article no. 145, 2015. Giri, D., Maitra, T., Amin, R., Srivastava, P. D.: An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems. Journal of Medical Systems. Vol. 39. article no. 145, 2015.
8.
go back to reference Hu, L., Ni, Q.: IoT-Driven Automated Object Detection Algorithm for Urban Surveillance Systems in Smart Cities. IEEE Internet of Things Journal. Vol. 5, no. 2, (2018) 747–754.CrossRef Hu, L., Ni, Q.: IoT-Driven Automated Object Detection Algorithm for Urban Surveillance Systems in Smart Cities. IEEE Internet of Things Journal. Vol. 5, no. 2, (2018) 747–754.CrossRef
9.
go back to reference Dutta, J., Wang, Y., Maitra, T., Islam, SK. H., Rawal, B. S., Giri, D.: ES3B: Enhanced Security System for Smart Building using IoT. in Proc. of The 3rd IEEE International Conference on Smart Cloud (SmartCloud 2018). New York, USA, (2018) 158–165. Dutta, J., Wang, Y., Maitra, T., Islam, SK. H., Rawal, B. S., Giri, D.: ES3B: Enhanced Security System for Smart Building using IoT. in Proc. of The 3rd IEEE International Conference on Smart Cloud (SmartCloud 2018). New York, USA, (2018) 158–165.
10.
go back to reference Ou, Q., Zhen, Y., Li, X., Zhang, Y., Zeng, L.: Application of Internet of Things in Smart Grid Power Transmission. in the proc. of 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing. Vancouver, BC, (2012) 96–100. Ou, Q., Zhen, Y., Li, X., Zhang, Y., Zeng, L.: Application of Internet of Things in Smart Grid Power Transmission. in the proc. of 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing. Vancouver, BC, (2012) 96–100.
11.
go back to reference Kong, L., Khan, M. K., Wu, F., Chen, G., Zeng, P.: Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges. IEEE Communications Magazine. Vol. 55. no. 1. (2017) 62–68.CrossRef Kong, L., Khan, M. K., Wu, F., Chen, G., Zeng, P.: Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges. IEEE Communications Magazine. Vol. 55. no. 1. (2017) 62–68.CrossRef
12.
go back to reference Hsu, R., Lee, J., Quek, T. Q. S., Chen, J.: Reconfigurable Security: Edge-Computing-Based Framework for IoT, IEEE Network. Vol. 32. no. 5. (2018) 92–99.CrossRef Hsu, R., Lee, J., Quek, T. Q. S., Chen, J.: Reconfigurable Security: Edge-Computing-Based Framework for IoT, IEEE Network. Vol. 32. no. 5. (2018) 92–99.CrossRef
13.
go back to reference Giri, D., Obaidat, M. S., Maitra, T.: SecHealth: An Efficient Fog based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System. in Proc. of IEEE GLOBECOM 2017. Singapore, (2017) 1–6. Giri, D., Obaidat, M. S., Maitra, T.: SecHealth: An Efficient Fog based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System. in Proc. of IEEE GLOBECOM 2017. Singapore, (2017) 1–6.
14.
go back to reference Maitra, T., Obaidat, M. S., Islam, SK, H., Giri, D., Amin, R.: Security analysis and design of an efficient ecc-based two-factor password authentication scheme. Security and Communication Networks. Vol. 9. no. 17. (2016) 4166–4181.CrossRef Maitra, T., Obaidat, M. S., Islam, SK, H., Giri, D., Amin, R.: Security analysis and design of an efficient ecc-based two-factor password authentication scheme. Security and Communication Networks. Vol. 9. no. 17. (2016) 4166–4181.CrossRef
15.
go back to reference Kaur, K., Garg, S., Kaddoum, G., Guizani, M., Jayakody, D. N. K.: A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing. in Proc. of IEEE GLOBECOM 2019. Waikoloa, HI, USA, (2019) 1–6. Kaur, K., Garg, S., Kaddoum, G., Guizani, M., Jayakody, D. N. K.: A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing. in Proc. of IEEE GLOBECOM 2019. Waikoloa, HI, USA, (2019) 1–6.
16.
go back to reference Omala, A.A, Kibiwott, K.P., Li, F.: An efficient remote authentication scheme for wireless body area network. Journal of Medical Systems. Vol. 41. no. 2. (2016) 1–9. Omala, A.A, Kibiwott, K.P., Li, F.: An efficient remote authentication scheme for wireless body area network. Journal of Medical Systems. Vol. 41. no. 2. (2016) 1–9.
17.
go back to reference Cheng, Q., Zhang, X., and Ma, J.: Icasme: An improved cloud-based authentication scheme for medical environment. Journal of Medical Systems, Vol. 41. no. 3 (2017) 1–14.CrossRef Cheng, Q., Zhang, X., and Ma, J.: Icasme: An improved cloud-based authentication scheme for medical environment. Journal of Medical Systems, Vol. 41. no. 3 (2017) 1–14.CrossRef
18.
go back to reference He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, Vol. 11. no. 4, (2016) 1–12. He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, Vol. 11. no. 4, (2016) 1–12.
19.
go back to reference Maitra, T., Roy, S.: Secpms: An efficient and secure communication protocol for continuous patient monitoring system using body sensors. in proc. of 9th International Conference on Communication Systems and Networks (COMSNETS 2017), Bangalore, India, (2017) 322–329.CrossRef Maitra, T., Roy, S.: Secpms: An efficient and secure communication protocol for continuous patient monitoring system using body sensors. in proc. of 9th International Conference on Communication Systems and Networks (COMSNETS 2017), Bangalore, India, (2017) 322–329.CrossRef
20.
go back to reference Mahmood, K., Li, X., Chaudhry, S.A., Naqvi, H., Kumari, S., Sangaiah, A.K., Rodrigues, J.J.P.C.: Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Future Generation Computer Systems. Vol. 88. (2018) 491–500.CrossRef Mahmood, K., Li, X., Chaudhry, S.A., Naqvi, H., Kumari, S., Sangaiah, A.K., Rodrigues, J.J.P.C.: Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Future Generation Computer Systems. Vol. 88. (2018) 491–500.CrossRef
21.
go back to reference Wang, Z.: A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity. Future Generation Computer Systems, Vol. 82. (2018) 342–348.CrossRef Wang, Z.: A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity. Future Generation Computer Systems, Vol. 82. (2018) 342–348.CrossRef
23.
go back to reference Pang, H.H., and K. Tan, K.: Authenticating query results in edge computing. in proc. of 20th International Conference on Data Engineering. Boston, MA, USA, (2004) 560–571. Pang, H.H., and K. Tan, K.: Authenticating query results in edge computing. in proc. of 20th International Conference on Data Engineering. Boston, MA, USA, (2004) 560–571.
Metadata
Title
Security in Critical Communication for Mobile Edge Computing Based IoE Applications
Authors
Tanmoy Maitra
Debasis Giri
Arup Sarkar
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-69893-5_13

Premium Partner