Skip to main content
Erschienen in: Mobile Networks and Applications 5/2017

21.04.2017

Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing

verfasst von: Abebe Abeshu Diro, Naveen Chilamkurti, Neeraj Kumar

Erschienen in: Mobile Networks and Applications | Ausgabe 5/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rapid growth of connected things across the globe has been brought about by the deployment of the Internet of things (IoTs) at home, in organizations and industries. The innovation of smart things is envisioned through various protocols, but the most prevalent protocols are pub-sub protocols such as Message Queue Telemetry Transport (MQTT) and Advanced Message Queuing Protocol (AMQP). An emerging paradigm of communication architecture for IoTs support is Fog computing in which events are processed near to the place they occur for efficient and fast response time. One of the major concerns in the adoption of Fog computing based publish-subscribe protocols for the Internet of things is the lack of security mechanisms because the existing security protocols such as SSL/TSL have a large overhead of computations, storage and communications. To address these issues, we propose a secure, Fog computing based publish-subscribe lightweight protocol using Elliptic Curve Cryptography (ECC) for the Internet of Things. We present analytical proofs and results for resource efficient security, comparing to the existing protocols of traditional Internet.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
2.
Zurück zum Zitat Shen H, Kumar N, He D, Shen J, Chilamkurti N (2016) A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. J Supercomput 72(9):3588–3600 Shen H, Kumar N, He D, Shen J, Chilamkurti N (2016) A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. J Supercomput 72(9):3588–3600
3.
Zurück zum Zitat Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong H-Y (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimed Tools Appl 74(10):3477–3488CrossRef Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong H-Y (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimed Tools Appl 74(10):3477–3488CrossRef
4.
Zurück zum Zitat Hankerson D, Vanstone S, Menezes AJ (2003) Guide to elliptic curve cryptography. Springer-Verlag New York, Inc., Secaucus Hankerson D, Vanstone S, Menezes AJ (2003) Guide to elliptic curve cryptography. Springer-Verlag New York, Inc., Secaucus
5.
Zurück zum Zitat Sandeep S (2006) Elliptic curve cryptography for constrained devices. PhD Dissertation Sandeep S (2006) Elliptic curve cryptography for constrained devices. PhD Dissertation
6.
Zurück zum Zitat Singh M, Rajan MA, Shivraj VL, Balamuralidhar P (2015) Secure MQTT for Internet of things (IoT). In communication systems and network technologies (CSNT), 2015 fifth International conference on, pp 746–751, 4-6 Apr 2015 Singh M, Rajan MA, Shivraj VL, Balamuralidhar P (2015) Secure MQTT for Internet of things (IoT). In communication systems and network technologies (CSNT), 2015 fifth International conference on, pp 746–751, 4-6 Apr 2015
7.
Zurück zum Zitat Porambage P, Braeken A, Schmitt C, Gurtov A, Ylianttila M, Stiller B (2015) Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. In Access, IEEE, vol 3:1503–1511 Porambage P, Braeken A, Schmitt C, Gurtov A, Ylianttila M, Stiller B (2015) Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. In Access, IEEE, vol 3:1503–1511
8.
Zurück zum Zitat Opyrchal L, Prakash A, Agrawal A (2006) Designing a publish-subscribe substrate for privacy/security in pervasive environments. Proceedings of the 2006 ACS/IEEE International conference on pervasive services, 26–29 June 2006, pp 313–316 Opyrchal L, Prakash A, Agrawal A (2006) Designing a publish-subscribe substrate for privacy/security in pervasive environments. Proceedings of the 2006 ACS/IEEE International conference on pervasive services, 26–29 June 2006, pp 313–316
9.
Zurück zum Zitat Wang C, Carzaniga A, Evans D, Wolf AL (2002) Security issues and requirements for Internet-scale publish-subscribe systems. System Sciences, 2002. HICSS. Proceedings of the 35th annual Hawaii International conference on, 2002, pp. 3940–3947 Wang C, Carzaniga A, Evans D, Wolf AL (2002) Security issues and requirements for Internet-scale publish-subscribe systems. System Sciences, 2002. HICSS. Proceedings of the 35th annual Hawaii International conference on, 2002, pp. 3940–3947
10.
Zurück zum Zitat Srivatsa M, Liu L, Iyengar A (2011) EventGuard: a system architecture for securing publish-subscribe networks. ACM Trans Comput Syst 29:4 Srivatsa M, Liu L, Iyengar A (2011) EventGuard: a system architecture for securing publish-subscribe networks. ACM Trans Comput Syst 29:4
11.
Zurück zum Zitat Stojemovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. IEEE federated conference on Computer Science and Information Systems Stojemovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. IEEE federated conference on Computer Science and Information Systems
12.
Zurück zum Zitat Srivatsa M, Liu L (2007) Secure event dissemination in publish-subscribe networks. In Distributed Computing Systems Conference Srivatsa M, Liu L (2007) Secure event dissemination in publish-subscribe networks. In Distributed Computing Systems Conference
13.
Zurück zum Zitat Gupta V, Wurm M, Yu Z, Millard M, Fung S, Gura N, Eberle H, Shantz SC (2005) Sizzle: a standards-based end-to-end security architecture for the embedded Internet. Technical Report. Sun Microsystems, Inc., Mountain View Gupta V, Wurm M, Yu Z, Millard M, Fung S, Gura N, Eberle H, Shantz SC (2005) Sizzle: a standards-based end-to-end security architecture for the embedded Internet. Technical Report. Sun Microsystems, Inc., Mountain View
14.
Zurück zum Zitat Fiege L, Zeidler A, Buchmann A, Kilian-Kehr R, Mühl G, Darmstadt T (2004) Security aspects in publish/subscribe systems. In third Intl. Workshop on distributed event-based systems (DEBS’04, 2004 Fiege L, Zeidler A, Buchmann A, Kilian-Kehr R, Mühl G, Darmstadt T (2004) Security aspects in publish/subscribe systems. In third Intl. Workshop on distributed event-based systems (DEBS’04, 2004
15.
Zurück zum Zitat Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. International Conference on Wireless Algorithms, Systems and Applications (WASA) Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. International Conference on Wireless Algorithms, Systems and Applications (WASA)
16.
Zurück zum Zitat Ibrahim M (2016) Octopus: an edge-fog mutual authentication scheme. International Journal of Network Security 18(6):1089-1101 Ibrahim M (2016) Octopus: an edge-fog mutual authentication scheme. International Journal of Network Security 18(6):1089-1101
17.
Zurück zum Zitat Mitchell JC, Shmatikov V, Stern U (1998) Finite-state analysis of SSL 3.0. In: Proceedings of the 7th conference on USENIX security symposium - volume 7 (SSYM'98), vol 7. USENIX Association, Berkeley, pp 16–16 Mitchell JC, Shmatikov V, Stern U (1998) Finite-state analysis of SSL 3.0. In: Proceedings of the 7th conference on USENIX security symposium - volume 7 (SSYM'98), vol 7. USENIX Association, Berkeley, pp 16–16
18.
Zurück zum Zitat Stojmenovic I, Wen S (2014) The Fog computing paradigm: Scenarios and security issues. Computer Science and Information Systems (FedCSIS), 2014 Federated conference on, Warsaw, 2014, pp. 1–8 Stojmenovic I, Wen S (2014) The Fog computing paradigm: Scenarios and security issues. Computer Science and Information Systems (FedCSIS), 2014 Federated conference on, Warsaw, 2014, pp. 1–8
Metadaten
Titel
Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing
verfasst von
Abebe Abeshu Diro
Naveen Chilamkurti
Neeraj Kumar
Publikationsdatum
21.04.2017
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 5/2017
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-017-0851-8

Weitere Artikel der Ausgabe 5/2017

Mobile Networks and Applications 5/2017 Zur Ausgabe

Neuer Inhalt