Skip to main content
Erschienen in: Complex & Intelligent Systems 5/2022

Open Access 23.11.2021 | Original Article

Secure transmission technique for data in IoT edge computing infrastructure

verfasst von: Rohit Sharma, Rajeev Arya

Erschienen in: Complex & Intelligent Systems | Ausgabe 5/2022

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, the utilization of IoT technology has been rapidly increased in various applications such as smart city, smart banking, smart transport, etc. The internet of things allows the user to collect the data easily using the different sensors installed at various locations in the open environment. The data collection process by the IoT sensors is giving access to the various services. However, due to the open communication medium, it is difficult to provide secure access to these services. In this paper, a data transmission technique has been proposed, which will provide secure communication in IoT infrastructure for smart city applications. In this method, each IoT sensor have to prove their legitimacy to the reader and the base station before the transmission of data. Hence, the IoT sensors can transmit the required data in a secure and efficient way. In the proposed technique, the proof of correction shows that the required information is not supposed to send through an online medium, it is obtained at the receiver using the Euclidean parameters shared by the IoT sensors. The proposed technique is compatible to provide the security against most of the attacks performed by the attackers. Two random variables and complex mathematical calculation are making the proposed technique more reliable than others. This technique will significantly improve the security of different data transmission services which will be helpful to improve the smart city infrastructure.
Hinweise

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Introduction

The expansion of IoT services has developed a competitive environment by the introduction of new and innovative products launch for smart city applications. The frequently developed system imposed a new challenge towards system privacy and security [1]. Consequently, some of the products do not satisfy the privacy and security of the system which is the major concern of IoT as well as smart cities [2]. Most of the research work has been focusing on the possible applications and issues related to smart cities [3]. Earlier privacy and security are not taken as an important parameter until the ransomware threats have been developed like crypto wall [4], wannacry [5], crypto locker [6], etc. Due to these attacks, there is a sense of mistrust indulges for the IoT system. The system is criticized and said that it becomes the Internet of Vulnerabilities instead of the Internet of things [7]. There has been a wide wave of developing new applications for privacy and security within the IoT-based smart city implementation. There have been a variety of advertisements for secure products for smart cities [1]. In the proposed technique, three phases have been considered namely the Registration phase, Authentication phase, and Data transfer phase (Fig. 1). In the first phase, the IoT sensor has to perform the registration process by sending its Identity number along with the time stamp [(Siden)||T1]. In the authentication phase, sensor has to share [λi =  ∈ (Rg||T3)] and [Ecp] to the receiver and in data transfer mode, the IoT sensor calculates the Euclidean parameter (x, y, z) and will send these parameters to the receiver. The operations of these three steps are elaborated in brief in the upcoming sections.
The important part of this research implies that it can give a deep understanding of cyberattacks so that the new policies can be made accordingly. The study posed an important question of the overall security of the system [8]. There have been various challenges in the non-technical implementation of the system also, this is a major concern nowadays [9]. The reasons given by the study of “unsuccessful information technology projects” [10], for the failure of non-technical implementation are lack of support of top management, the business case is weak and project planning is poor. These kinds of problems are mostly possessed in the public sector. Several implications can be seen in the administrative history of the technological project in terms of technology adoption by government agencies [11]. Security is a tedious task in IoT, some of the concerns have arisen from the wireless sensor networks (WSNs) [12, 13]. The practical limitation in implementing IoT-based services in the security mechanism of smart cities is related to the IoT characteristics [14]. Smart cities show a dynamic behavior as they have a continuously changing environment due to the trade-off between CPS devices and citizens. The other complications arise due to the diverse architectures present in the smart city. Smart cities are also facing several economic problems in recent years. The challenges related to financing include declination of budget [15], descending order of state aid [16], and enhance budget uncertainty [17, 18]. In this paper, a secure data transmission technique has been introduced for IoT infrastructure. In this method, each IoT sensor (IOi) have to prove their legitimacy to the reader (Ri) and the base station (BSi) before the transmission of data. This technique will significantly improve the security of different data transmission services which will be helpful to improve the smart city infrastructure. The proposed technique resists many attacks such as Authentication attacks, User anonymity, forging attacks, and many more performed by the adversary.
The contribution of the paper is as follows:
1.
A secure data transmission technique has been proposed, which includes three phases namely Registration, Authentication, and Data transfer.
 
2.
Each IoT sensor (IOi) have to prove their legitimacy to the reader (Ri) and the base station (BSi) before the transmission of data.
 
3.
The sensor node needs to send three Euclidean parameters to the receiver instead of recorded information.
 
4.
The proposed technique resists many attacks such as Authentication attacks, User anonymity, forging attacks and many more attacks, which could be performed by the adversary.
 
In the first section, background related to smart cities and IoT security has been presented. The second section has the related literature and risks available in developing a smart city operation is described in the next section. The proposed secure data transmission technique has been discussed in the following section, also the analysis of the security has been investigated in the next section. The paper has been concluded in the next section with open issues.
It is necessary to authenticate as not to allow illegal participants into the network. There are so many conventional methods that are based on cryptography. The conventional method needs more time to process. One of the most common cryptography systems is RSA which requires a lot of time for its calculations. As there are so many limitations associated with conventional methods so, the researchers have proposed ECC (elliptic curve cryptosystem) for securing the network by doing the authentication [19]. The ECC is based on the Discrete Logarithm Problem (DLP) [20]. The proposed method is cost-effective but not secure as per individual users. The mobile users require a public key to access, it for authentication. There are several bilinear techniques propose to enhance the security level [21, 22] based on the Id system, these systems do not require to save every one another public key, so that memory space can also have minimized and credentials of every individual are safe. The different variant of ID-based systems is the grid security system for verification of atmospheric conditions based on clouds [2325]. The other methods are given based on the client–server technique which authenticates by bilinear pairing [2631]. As compared to the ECC technique cloud computing technique is more compatible. In the ECC technique, the managing key has to be in a secret form otherwise if the attacker got the major managing key of the service provider then the privacy of data will be gone. To resolve this issue cloud-based technique is used in which users can access resources on, on-demand basis. Also, to improve the security in cloud-based techniques, the position and history of the user should be known prior so that the privacy of the user is secured. The privacy of the users is secured by the verification method of information for ‘n’ times, the value of ‘n’ changes based on intended time provided by the cloud network [3235]. The authors propose the Merkle tree method which has four types of network initialization, cloud captivity, verification, and secure computing [31, 36]. Recently, security policies and agreements are available for authentication like set up of the system, registration of the user, and authentication. These agreements provide security to all mobile users as they have a secret key that is only known to the individual user. The major weakness of this system is that an insider can take the master key of the network and can play with every user’s credentials. The authors identify that there is no security between user and system [37, 38], the insider can identify the public key. In [39], the author proposes a collaborative task including security and energy-aware for D2D communication. This study measured the security workload by building a security model. The author has designed an authentication protocol using AI for real-time access to industrial medical. This authentication protocol can be overcome the various known attacks [40].
In the proposed method, each IoT sensor (IOi) have to prove their legitimacy to the reader (Ri) and the base station (BSi) before the transmission of data. This technique will significantly improve the security of different data transmission services which will be helpful to improve the smart city infrastructure. The proposed technique resists many attacks such as Authentication attacks, User anonymity, forging attacks, and many more performed by the adversary.

Inferences for safety and security for censorious infrastructure in smart cities

There are several risks while developing an efficient and reliable smart city operation. This section represents various risk factors related to smart cities (Fig. 2).

Risk of infrastructure in smart city

The lifeline of any city is the infrastructure of the system [41]. There are various risk factors associated with the concept of the infrastructure of the city. There are two types of concepts regarding the cybersecurity of smart cities. The first one shows a huge enhancement in computing capability that rapidly increases the attack on the network which should be defended at a level. All the smart devices such as televisions, refrigerators, cameras, routers can become a source of malicious activity as it uses different software’s. Urban areas show more effectiveness as compare to rural ones [42]. The second concept shows the presence of actuators in the system that affects the infrastructure of the smart city (such as filters, heating elements, switches, and valves). These actuators control things but at the same, there is a risk of physical damage as well. Therefore, when both the things are combined sensors and actuators the theft of security increases more [43].

Operational security and information security

Recently, major threat is ransomware and malware that encrypts files. These kinds of ransomware ask for ransom from the owner to unlock the files. These individual threats brought pathetic situations for user’s computers and organizational cyber cells [44]. There is a huge loss of data with crypto locker, wannacry, and Reventon-type ransomware [45]. Ransomware affects personal files, work files everything in personal and professional computers [46]. Some of the enterprises depend upon data operation where this ransomware damages the whole system and made it the worst case [47]. There is the various reported case also which are pending trials or pending appeals [48]. In the healthcare sector, there are series of cases, like the case of a presbyterian hospital in California affected by ransomware. The data of the hospital are crippled by ransomware [49]. The effects of wannacry ransomware have been seen in early 2017 at the sites of the British Health Service (NHS) [5052]. The data operations performed at payment machine, the computer to tackle traffic data, public transportation system also affected by some ransomware sometimes [53]. The ransom asked for these attacks is in several dollars and bitcoins [54]. A case of a transport system shows an extreme example of a ransomware attack which frees the travel cost and lost revenue [55]. The other way to cope up with the situation is to clean up all files from the system.

Safety and functional impacts vs. monetary impacts

The cyber-attack has serious consequences concerning financial access and confidential data. These are basic conceptual changes including physical impacts are present in smart cities, IoT, and other operational embedded networks [56]. There are structures like water waste control systems, transportation networks, and grid systems that are also computer-controlled networks [6466]. The real-time analysis and changes towards urban structures like parking systems to traffic lights, the connection between different portals and networks will make the smart city implementation more complex and insecure. The most important part for policymakers is to understand that ‘smart’ can be taken in many ways [67]. As the smart city contains different types of sensors and computers are embedded in the system that is prone to deceive, deviation, malicious nodes, and outside attack [6871].

Proposed secure data transmission technique

In the proposed technique, it is considered that the receivers are directly connected with the base stations. The notations used for the proposed techniques are elaborated in Table 1. In this study, three major nodes have been taken into consideration for the proposed technique, which are IoT sensor (IOi), Receiver (Ri), and Base station (BSi). The IoT sensors are denoted by (IOi) = {IO–IoT, i = 1,..., n}, receivers are denoted by (Ri) = {R Receiver, i = 1,..., n}, and Base station are denoted by (BSi) = {BS–Base station, i = 1,..., n}. At sensor end, data are classified in two categories namely Primary data [Prd = Sr||Cd||frg||Inf] and secondary data [Scd = Ninf||Latt||Long]. Here, the meaning of the primary data is the data that are linked to the secret information of the node, such as the node serial number, node capacity, frequency range, and real-time recorded information. The recorded information is the information that is being recorded by the IoT sensor for real-time event monitoring. On the other side, the meaning of the secondary data is the data that is not linked to secret information and which can be used publicly such as the longitude and latitude of the node. For this technique, only secondary data are utilizing as the part of transmission between sensor and receiver.
Table 1
Notations used for the proposed techniques
Symbols
Description
Siden
Identity of IOT sensor
T1
Time slot one
Pri
IOT sensor public key
T2
Time slot two
Pr
Prime number
rm
Random number
Prb
Base station public key
λi
Function of Rq & T3
ε
A function parameter
Rq
Request from IOT sensor
T3
Time slot three
λr
Function of Rq, T3 & T4
T4
Time slot four
ϕ
Quotient function
Pr(n)
Polynomial function of prime number
Scd(n)
Polynomial function of secondary information
Ninf
Node information
Prd
Primary data
Scd
Secondary data
Cd
Node capacity
frg
Frequency range
Inf
Recorded information of IOT sensor
Sr
Node serial number
Latt
Node latitude
Long
Node longitude
Pack
Positive acknowledgement
ψ
Polynomial function
Η
Hash function
α
Function of information
β
Function of quotient
z
Euclidean parameter
Gc
GCD function
x
Euclidean parameter
y
Euclidean parameter
A brief structure of the proposed technique is shown in Fig. 3. The architecture is showing the three major steps of the proposed technique, which are registration, authentication, and data transfer. In the first phase, the IoT sensor has to perform the registration process by sending its Identity number along with the time stamp [(Siden)||T1]. In response to this, the receiver will revert a private prime key Pri to the IoT sensor, which is useful in the upcoming steps at the sensor end. In parallel with Pri, the receiver provides Prb to the base station, where Pri and Pri contain the same prime values. In the authentication phase, the sensor has to share [λi =  ∈ (Rg||T3)] and [Ecp] to the receiver, and then, the receiver proceeds the λr along with a different timestamp to the base station for the calculation of \(\phi^{\prime}\left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right].\) Base station has to reverts \(E^{\prime}_{{{\text{cp}}}}\) to the receiver, which need to be matched with the Ecp received from the IoT sensor. If the condition satisfies, then authentication will be completed. In data transfer mode, the IoT sensor calculates the Euclidean parameter (x, y, z) and will send these parameters to the receiver. The receiver will forward these parameters to the base station for further processing. The values of \(\alpha^{\prime}\) will be calculated at the base station using the received Euclidean parameters and \(\beta^{\prime}\). The operations of these steps are elaborated in brief in the upcoming sections.
Here, it is avoiding to transmit primary data as it contains secret information. It is also considered that various IoT sensors are connected with a receiver and these sensors can send the data to the sensor on its request. For this technique, it is also considered that the base station stored all the needed information about the sensors such as Scd, Sr, Cd, and frg. Following are the important expression to continue the technique:
Equation (1) represents the IoT sensor public key, which is the combination of prime value, random value and time stamp.
$$ P_{{{\text{ri}}}} = \, \left( {P_{{\text{r}}} + \, r_{{\text{m}}} } \right)_{2}^{t} $$
(1)
[Req = Ninf] (node information)
[Scd = Ninf||Latt||Long] (secondary data)
[Prd = Sr||Cd||frg||Inf] (primary data)
$$ \phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] = \frac{{\psi_{{P_{{\text{r}}} \left( x \right)}} }}{{\psi_{{S_{{{\text{cd}}}} \left( x \right)}} }} $$
(2)
$$ E_{{{\text{cp}}}} = \, H\left[ {\phi \left( {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right)} \right]. $$
(3)
[H = e [Pr||rm]] (hash function)
Euclidean algorithm:
$$ \alpha x + \, \beta y = \, z. $$
(4)
Equation (2) represents the value of quotient of the division between two functions namely \(P_{{\text{r}}} \left( x \right)\) and \(S_{{{\text{cd}}}} \left( x \right)\). Equations (3) and (4) represent the values of encryption function and the Euclidean algorithm. α and β are the functions of recorded information and secondary information. X, Y, and Z are known as Euclidean parameters. The timestamp is included in all the messages processed by sensors or receivers. In the time stamp process, the transmitting message has to be framed along with the exact transmitting timing of the message. Timestamp will also be verified at both the end for avoiding the replay attack.

Registration phase

In the proposed technique, three phases have been considered namely the Registration phase, Authentication phase, and Data transfer phase. The registration phase can be shown in Fig. 4. In the first phase, the IoT sensor have to perform the registration process by sending its Identity number along with the time stamp [(Siden)||T1].
In response of this, receiver will revert a private prime key Pri to the IoT sensor, which is useful in the upcoming steps at the sensor end. In parallel of Pri, receiver provides Prb to the base station, where Pri and Pri contains the same prime values.

Authentication phase

The authentication phase can be shown in Fig. 5. In the authentication phase, the IoT sensor has to prove its authenticity to the receiver. For this process, the sensor has to share [λi =  ∈ (Rg||T3)] and [Ecp] to the receiver, which is nothing but the authentication request along with a timestamp and encrypted data. Then, the receiver proceeds the λr along with a different timestamp to the base station for the calculation of \(\phi^{\prime}\left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right]. \) In response of this, base station reverts \(E^{\prime}_{{{\text{cp}}}}\) to the receiver, which need to be matched with the Ecp received from the IoT sensor. If condition satisfies, then authentication will be successfully completed.
The new sensor registration and authentication process are discussed in Algorithm 1, the algorithm for receiver and base station are also elaborated below.
Proof of the authentication procedure In this section, the proof of the authentication procedure is discussed. For the completion of authentication, the following condition should be verified-
$$ E_{{{\text{CP}}}} \;{\text{should}}\;{\text{be}}\;{\text{equal}}\;{\text{to}}\;{\text{the}}\;E^{\prime}_{{{\text{cp}}}} , $$
where \(E_{{{\text{CP}}}}\) is encrypted function of Quotient, which is obtained after the division operation between two functions namely \(P_{{\text{r}}} \left( x \right)\) and \(S_{{{\text{cd}}}} \left( x \right)\) at IoT sensor. \(E^{\prime}_{{{\text{cp}}}}\) is the encrypted function of Quotient, which is obtained after the division operation between two functions namely \(P_{{\text{r}}} \left( x \right)\) and \(S_{{{\text{cd}}}} \left( x \right)\), and which is considered to be stored at the base station,
$$ E_{{{\text{CP}}}} = E^{\prime}_{{{\text{cp}}}} $$
$$ \left[ {E_{{{\text{CP}}}} = \left[ {\phi^{\prime}\left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right]} \right] $$
$$ \left[ {H\left[ {\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] = \left[ {\phi^{\prime}\left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right]} \right], $$
where [H = e [Pr||rm]], Pr and rm, both values are already sent to the base station by the receiver, therefore the same hash function can be applied at base station end.
$$ \left[ {H \left[ {\frac{{\psi_{{P_{{\text{r}}} \left( x \right)}} }}{{\psi_{{S_{{{\text{cd}}}} \left( x \right)}} }}} \right] = H \left\{ {\phi^{\prime}\left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right]} \right\}} \right] $$
$$ \left[ {\left[ {\frac{{\psi_{{P_{{\text{r}}} \left( x \right)}} }}{{\psi_{{S_{{{\text{cd}}}} \left( x \right)}} }}} \right] - \left[ {\frac{{\psi_{{P_{{\text{r}}} \left( x \right)}} }}{{\psi_{{S_{{{\text{cd}}}} \left( x \right)}} }}} \right]^{\prime } = 0 } \right]. $$
If the outcome of the procedure is equal to zero, then the authentication will be completed, else the operation will be denied. The Hash function is used to provide the fixed size enciphered data and then that enciphered data will be used for further processing [72, 73]. After the successful execution of the authentication process, a positive acknowledgment Pack will be transmitted to the IoT sensor from the receiver end.

Data transfer phase

The data transfer phase can be shown in Fig. 6. In data transfer mode, the IoT sensor calculates the Euclidean parameter (x, y, z) at their end and will send these parameters to the receiver. These parameters are calculated using the Euclidean Algo αx + βy = z. Here, (x, y, z) parameters are not directly linked with the information part, so the transmission will take place without sharing the secret data. These parameters are calculated using the Greatest Common Divisor operation between \(I_{{{\text{nf}}}}\) and \(\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right].\)
Receiver will forward these parameters to the base station for further processing. The values of \(\alpha^{\prime}\) will be calculated at the base station using the received Euclidean parameters and \(\beta^{\prime}\). Here, \(\beta^{\prime}\) is nothing but the Quotient, which is obtained after the division between two function namely \(P_{{\text{r}}} \left( x \right)\) and \(S_{{{\text{cd}}}} \left( x \right)\). \(\beta^{\prime}\) must be equal to \(\beta\) for retracting the correct information at the receiver side.
Proof of the data transmission procedure At IOT sensor: The Euclidean parameters need to be calculated using Eq. (5).
$$ \alpha x + \, \beta y \, = \, z \, = \, G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right], $$
(5)
where α and β are the functions of recorded information and secondary information.
The algo for processing the data at IoT sensor is as follows
X, Y and Z are known as Euclidean parameters. The value of z has been calculated using Eq. (6).
$$ z \, = \, G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] $$
(6)
$$ \beta = \phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right], $$
apply the value of α and β in equation number (5),
$$ \left( {I_{{{\text{nf}}}} } \right)x \, + \phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right]y = G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] $$
$$ \left( {I_{{{\text{nf}}}} } \right)x \, = G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] - \phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right]y, $$
after the analysis, the value of x and y will be as follows in Eq. (7)
$$ \left[ {x = \frac{{G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}} } \right] - \phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right]y }}{{\left( {I_{{{\text{nf}}}} } \right)}}} \right] $$
(7)
$$ \left[ {y = \frac{{G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] - \left( {I_{{{\text{nf}}}} } \right)x }}{{\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right]}}} \right]. $$
(8)
IoT sensor calculate the Euclidean parameter (x, y, z) at their end and will send these parameters to the receiver. Here, (x, y, z) parameters are not directly linked with the information part, so the transmission will take place without sharing the secret data.
At the Receiver Receiver will forward these parameters to the base station for further processing. The algo for processing the data at receiver is as follows.
At the Base station The values of \(\alpha^{\prime}\) will be calculated at the base station using the received Euclidean parameters and \(\beta^{\prime}\). Here, \(\beta^{\prime}\) is nothing but the Quotient, which is obtained after the division between two functions namely \(P_{{\text{r}}} \left( x \right)\) and \(S_{{{\text{cd}}}} \left( x \right)\). \(\beta^{\prime}\) must be equal to \(\beta\) for retracting the correct information at the receiver side.
$$ \alpha^{\prime}x + \, \beta^{\prime}y = \, z \, = \, G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right]. $$
(9)
The value of x, y, z is:
$$ \left[ {x = \frac{{G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] - \phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] }}{{\left( {I_{{{\text{nf}}}} } \right)}}} \right] $$
$$ \left[ {y = \frac{{G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] - \left( {I_{{{\text{nf}}}} } \right) }}{{\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right]}}} \right] $$
$$ z \, = \, G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right]. $$
Put the value of x, y and z in Eq. (9):
$$ \left[ {\alpha \left[ {\frac{{G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] - \phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] }}{{\left( {I_{{{\text{nf}}}} } \right)}}} \right] + \phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] \frac{{G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] - \left( {I_{{{\text{nf}}}} } \right)}}{{\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right]}} = G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] } \right] $$
$$ \alpha \, = \left[ {\frac{{G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] - \phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right]\frac{{G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] - \left( {I_{{{\text{nf}}}} } \right)}}{{\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right]}}}}{{\frac{{G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right] - \phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right]}}{{I_{{{\text{nf}}}} }}}}} \right]. $$
The value of α can be calculated using the above mathematical expression, the final value of α is as follows:
$$ {\text{Assume}} \left\{ {\begin{array}{*{20}c} {a = G_{{\text{c}}} \left[ {I_{{{\text{nf}}}} ||\phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right] } \right]} \\ {b = \phi \left[ {\frac{{P_{{\text{r}}} \left( x \right)}}{{S_{{{\text{cd}}}} \left( x \right)}}} \right]} \\ \end{array} } \right.. $$
Then, the final expression will as follows:
https://static-content.springer.com/image/art%3A10.1007%2Fs40747-021-00576-7/MediaObjects/40747_2021_576_Equp_HTML.png
The algo for processing the data at base station is as follows
Where a and b are also the function of information \(I_{{{\text{nf}}}}\). Hence, it is verified that the communication can be confirmed between the IoT sensor and receiver without sharing secret information. In the proposed technique, the significance of the Euclidean theorem is to create complexity in the calculation of different parameters, and confusion in the way of the adversary or attacker. The proposed technique will be very useful in many applications of IoT such as smart city, smart banking and smart transport, etc.

The analysis of security

In this section, we have analyzed the security of the proposed technique with various features such as replay attack resistance, authentication attack and resistance to forging attack.
Resistance to replay attack In the replay attack, an attacker can delay or repeat the transmission of the valid message [74]. In this attack, the attacker intercepts the data and retransmit it. The adversary cannot perform this attack in the proposed technique, because the time stamp Ti is included in all the messages processed by the sensor or receiver. The timestamp will be verified at both the end for avoiding the replay attack. The communication message can be dropped if the timestamp is not acceptable.
Authentication attack In the proposed technique, the authentication procedure is very secured. Here, the IoT sensor sharing a secret message Ecp to the receiver for performing the authentication. The secret message Ecp is the function of two random variables which are Pr (Prime number) and rm (random number) and these values are not fixed for each transaction. For the adversary, it is not possible to compute the exact value of Ecp. Therefore, an attacker cannot perform an authentication attack.
Forging attack Forging is a dangerous attack performed by the attackers. In this attack, the adversary trying to forge the private key of the communication process [75]. In the proposed technique, IoT sensor sharing a secret message Ecp to the receiver for performing the authentication. The secret message Ecp is the function of two random variables which are Pr (Prime number) and rm (random number) and these values are not fixed for each transaction. Therefore, it is not possible to find the exact values of Pr and rm.
A comparative analysis in terms of adversary attacks can be shown in Table 2 and Fig. 7. In Table 2, various attacks have been shown over which the proposed technique is compatible to overcome the adversary action.
Table 2
Comparative analysis
 
Dass et al. [57]
Fu et al. [58]
Chang et al. [59]
Li et al. [60]
Gui et al. [61]
Min et al. [62]
Ours
DoS attack resistance
N
N
N
Y
N
N
Y
Resistivity replay attack
Y
Y
Y
Y
Y
Y
Y
De synchronization resistance
Y
N
N
Y
N
N
Y
Mutual authentication
Y
N
Y
Y
Y
N
Y
Master key attack
N
Y
N
N
N
N
Y
Forward secrecy
Y
N
Y
N
Y
Y
Y
MITM attack resistance
Y
Y
Y
Y
Y
Y
Y
Traceability resistance
Y
N
Y
N
Y
Y
Y
Confidentiality and integrity
Y
Y
Y
Y
Y
Y
Y
Anonymity of tag
N
Y
Y
Y
Y
Y
Y
Y satisfy, N not satisfy

Computational cost and comparative analysis

In this section, the efficiency of the proposed technique is computed in terms of computational cost and comparative analysis. Previously published approaches have been considered for performing the comparative analysis.

Computational cost analysis

In the proposed technique, the computational cost has been computed using the time taken to authenticate one user or n number of users. The studies considered for the comparative analysis are Sun’s et al. [31] scheme, Dass et al. [57] scheme, Chang et al. [59]. scheme, Fu et al. [58] scheme, Chen et al. [63] scheme and Gui et al. [61] scheme. Following parameters have been considered for the analysis of computational cost TM: division operation, TD: division operation, TX: cost of XOR operation, TF: cost of flip operation, TS cost of circular shift operation, TP: cost of paring operation, TH: cost of hash function, TA: division operation and TR: cost of random number generation operation.
From Table 3, it can be seen that the computation cost of the proposed technique is comparatively very less. The computational cost of the proposed technique is 1TH, 2TP, and 1TD only. Hence, the proposed algo is computationally efficient than the previous techniques.
Table 3
Computational cost of authentication
 
Computation cost for one user
Computational cost for n user
Sun’s et al. [31] scheme
2TM + 1TH + 2TA
2nTM + 1nTH + 2nTA
Dass et al. [57] scheme
1TR + 1TX + 3TP + 2TH
1nTR + 1nTX + 3nTP + 2nTH
Chang et al. [59] scheme
4TH + 11TX + 2TR
4nTH + 11nTX + 2nTR
Fu et al. [58] scheme
2TR + 2TX + 4TH
2nTR + 2nTX + 4nTH
Chen et al. [63] scheme
TM + 2TH + 2TP + TA
nTM + 2nTH + 2nTP + nTA
Gui et al. [61] scheme
2TR + 1TF + 2TX + 3TH
2nTR + 1nTF + 2nTX + 3nTH
Ours
1TH + 2TP + 1TD
1nTH + 2nTP + 1nTD
The proposed approach is compatible to provide security against most of the attacks performed by the attackers. Two random variables and complex mathematical calculations are making the proposed technique more reliable than others.

Conclusion

In this paper, a secure data transmission technique has been introduced for IoT infrastructure. Each IoT sensor (IOi) have to prove their legitimacy to the reader (Ri) and the base station (BSi) before the transmission of data. The proposed technique includes three phases namely registration, authentication, and data transfer phase to complete communication between sensor and receiver. For security enhancements, the sensor node needs to send three Euclidean parameters to the receiver instead of recorded information. The proof of correction shows that the required information is not supposed to send through an online medium, it is obtained at the receiver using the Euclidean parameters shared by the IoT Sensors. This technique will significantly improve the security of data transmission services, which will lead to improving the smart city infrastructure. Figure 5 shows that the proposed technique resists many attacks such as Authentication attacks, User anonymity, forging attacks, and many more performed by the adversary. The authentication execution time for the proposed technique is very less in comparison with other techniques. Furthermore, a practical overview is needed for the proposed technique, which will have less execution time. An encrypted timestamp will be the next option to increase the complexity and confusion in the way of attackers. A more complex authentication approach for device-to-device communication in IoT infrastructure will be the next objective of this study.

Declarations

Conflict of interest

There is no conflict of interest.
Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creativecommons.​org/​licenses/​by/​4.​0/​.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Literatur
3.
Zurück zum Zitat Pouryazdan M, Kantarci B (2016) The smart citizen factor in trustworthy smart city crowdsensing. IT Prof 18(4):26–33CrossRef Pouryazdan M, Kantarci B (2016) The smart citizen factor in trustworthy smart city crowdsensing. IT Prof 18(4):26–33CrossRef
5.
Zurück zum Zitat Mohurle S, Patil M (2017) A brief study of Wannacry threat: Ransomware attack. Int J 8(5):1938–1940 Mohurle S, Patil M (2017) A brief study of Wannacry threat: Ransomware attack. Int J 8(5):1938–1940
7.
Zurück zum Zitat Angrishi K (2017) Turning internet of things (IoT) into internet of vulnerabilities (IoV): IoT botnets. arXiv preprint arXiv:1702.03681 Angrishi K (2017) Turning internet of things (IoT) into internet of vulnerabilities (IoV): IoT botnets. arXiv preprint arXiv:​1702.​03681
9.
Zurück zum Zitat Nam T, Pardo TA (2011) Smart city as urban innovation: focusing on management, policy, and context. Proceedings of the 5th international conference on theory and practice of electronic governance. ACM, pp 185–194 Nam T, Pardo TA (2011) Smart city as urban innovation: focusing on management, policy, and context. Proceedings of the 5th international conference on theory and practice of electronic governance. ACM, pp 185–194
10.
Zurück zum Zitat Whittaker B (1999) What went wrong? Unsuccessful information technology projects. Inf Manag Comput Secur 7(1):23–30CrossRef Whittaker B (1999) What went wrong? Unsuccessful information technology projects. Inf Manag Comput Secur 7(1):23–30CrossRef
11.
Zurück zum Zitat Goldfinch S (2007) Pessimism, computer failure, and information systems development in the public sector. Public Adm Rev 67(5):917–929CrossRef Goldfinch S (2007) Pessimism, computer failure, and information systems development in the public sector. Public Adm Rev 67(5):917–929CrossRef
14.
Zurück zum Zitat Zhang ZK, Cho MCY, Wang CW, Hsu CW, Chen CK, Shieh S-P (2014) IoT security: ongoing challenges and research opportunities. In: Proceedings - IEEE 7th international conference on service-oriented computing and applications, SOCA 2014. Matsue, 17–19 Nov 2014, pp 230–234 Zhang ZK, Cho MCY, Wang CW, Hsu CW, Chen CK, Shieh S-P (2014) IoT security: ongoing challenges and research opportunities. In: Proceedings - IEEE 7th international conference on service-oriented computing and applications, SOCA 2014. Matsue, 17–19 Nov 2014, pp 230–234
16.
Zurück zum Zitat Maciag M, Wogan J (2017) With less state aid, localities look for ways to cope. Governing 30:32–37 Maciag M, Wogan J (2017) With less state aid, localities look for ways to cope. Governing 30:32–37
20.
Zurück zum Zitat Recommendation for key management—Part 1: General (2005) Gaithersburg, MD, USA: Special Publication 800-57 Aug. Recommendation for key management—Part 1: General (2005) Gaithersburg, MD, USA: Special Publication 800-57 Aug.
21.
Zurück zum Zitat Advances in Cryptology-CRYPTO (2001) Identity-based encryption from the Weil pairing. Advances in cryptology-CRYPTO, vol. 2139. Springer, Berlin, pp 213–229 LNCS Advances in Cryptology-CRYPTO (2001) Identity-based encryption from the Weil pairing. Advances in cryptology-CRYPTO, vol. 2139. Springer, Berlin, pp 213–229 LNCS
24.
25.
Zurück zum Zitat Mao W (2004) An identity-based non-interactive authentication framework for computational grids. Palo Alto, CA, USA: HP Labs Tech. Rep. HPL-2004-96, Jun Mao W (2004) An identity-based non-interactive authentication framework for computational grids. Palo Alto, CA, USA: HP Labs Tech. Rep. HPL-2004-96, Jun
26.
Zurück zum Zitat Ahmad A, Paul A, Khan M, Jabbar S, Rathore MMU, Chilamkurti N et al (2017) Energy efficient hierarchical resource management for mobile cloud computing. IEEE Trans Sustain Comput 2(2):100–112CrossRef Ahmad A, Paul A, Khan M, Jabbar S, Rathore MMU, Chilamkurti N et al (2017) Energy efficient hierarchical resource management for mobile cloud computing. IEEE Trans Sustain Comput 2(2):100–112CrossRef
27.
Zurück zum Zitat Chen T, Yeh H, Shih W (2011) An advanced ecc dynamic id-based remote mutual authentication scheme for cloud computing. In: 2011 fifth FTRA international conference on multimedia and ubiquitous engineering. Loutraki, 28–30 June 2011, pp 155-159. https://doi.org/10.1109/MUE.2011.69 Chen T, Yeh H, Shih W (2011) An advanced ecc dynamic id-based remote mutual authentication scheme for cloud computing. In: 2011 fifth FTRA international conference on multimedia and ubiquitous engineering. Loutraki, 28–30 June 2011, pp 155-159. https://​doi.​org/​10.​1109/​MUE.​2011.​69
28.
Zurück zum Zitat Goriparthia T, Das ML, Saxena A (2009) An improved bilinear pairing based remote user authentication scheme. Comput Stand Interfaces 31(January 1):181–185CrossRef Goriparthia T, Das ML, Saxena A (2009) An improved bilinear pairing based remote user authentication scheme. Comput Stand Interfaces 31(January 1):181–185CrossRef
29.
Zurück zum Zitat Das ML, Saxena A, Gulati VP, Phafstak DB (2006) A novel remote user authentication scheme using bilinear pairings. Comput Secur 25(May 3):184–189CrossRef Das ML, Saxena A, Gulati VP, Phafstak DB (2006) A novel remote user authentication scheme using bilinear pairings. Comput Secur 25(May 3):184–189CrossRef
30.
Zurück zum Zitat Khan Pathan S, Hong CS, Hee K (2009) Bilinear-pairing-based remote user authentication schemes using smart cards. In: Proceedings of 3rd international conference ubiquitous information management communication. New York, pp 356–361 Khan Pathan S, Hong CS, Hee K (2009) Bilinear-pairing-based remote user authentication schemes using smart cards. In: Proceedings of 3rd international conference ubiquitous information management communication. New York, pp 356–361
31.
Zurück zum Zitat Sun H, Wen Q, Zhang H, Jin Z (2013) A novel remote user authentication and key agreement scheme for mobile client–server environment. Appl Math Inf Sci Lett 7(4):1365–1374MathSciNetCrossRef Sun H, Wen Q, Zhang H, Jin Z (2013) A novel remote user authentication and key agreement scheme for mobile client–server environment. Appl Math Inf Sci Lett 7(4):1365–1374MathSciNetCrossRef
39.
Zurück zum Zitat Li Z, Haiyang Hu, Hua Hu, Huang B, Ge J, Chang V (2021) Security and energy-aware collaborative task offloading in D2D communication. Future Gener Comput Syst 118:358–373CrossRef Li Z, Haiyang Hu, Hua Hu, Huang B, Ge J, Chang V (2021) Security and energy-aware collaborative task offloading in D2D communication. Future Gener Comput Syst 118:358–373CrossRef
40.
Zurück zum Zitat Qi R, Ji S, Shen J, Vijayakumar P, Kumar N (2021) Security preservation in industrial medical CPS using Chebyshev map: an AI approach. Future Gener Comput Syst 122:52–62CrossRef Qi R, Ji S, Shen J, Vijayakumar P, Kumar N (2021) Security preservation in industrial medical CPS using Chebyshev map: an AI approach. Future Gener Comput Syst 122:52–62CrossRef
43.
Zurück zum Zitat Baker AB, Eagan RJ, Falcone PK, Harris JM, Herrera GV, Hines WC et al (2019) A scalable systems approach for critical infrastructure security. Sandia National Laboratories, Albuquerque Baker AB, Eagan RJ, Falcone PK, Harris JM, Herrera GV, Hines WC et al (2019) A scalable systems approach for critical infrastructure security. Sandia National Laboratories, Albuquerque
44.
Zurück zum Zitat Al-rimy BAS, Maarof MA, Shaid SZM (2018) Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput Secur 74:144–166CrossRef Al-rimy BAS, Maarof MA, Shaid SZM (2018) Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput Secur 74:144–166CrossRef
45.
Zurück zum Zitat Hampton N, Baig ZA, He D, Chan S, Guizani M (2015) Ransomware: Emergence of the cyber-extortion menace. User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel Commun 22(1):28–34CrossRef Hampton N, Baig ZA, He D, Chan S, Guizani M (2015) Ransomware: Emergence of the cyber-extortion menace. User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel Commun 22(1):28–34CrossRef
46.
Zurück zum Zitat O’Gorman G, McDonald G (2012) Ransomware: a growing menace. Symantec Corporation, Tempe O’Gorman G, McDonald G (2012) Ransomware: a growing menace. Symantec Corporation, Tempe
50.
Zurück zum Zitat Dwyer A (2018) The NHS cyber-attack: a look at the complex environmental conditions of WannaCry. RAD Mag 44(512):25–26 Dwyer A (2018) The NHS cyber-attack: a look at the complex environmental conditions of WannaCry. RAD Mag 44(512):25–26
51.
Zurück zum Zitat Ehrenfeld JM (2017) Wannacry, cybersecurity and health information technology: a time to act. J Med Syst 41(7):104CrossRef Ehrenfeld JM (2017) Wannacry, cybersecurity and health information technology: a time to act. J Med Syst 41(7):104CrossRef
55.
Zurück zum Zitat Bay Area Rapid Transit (2017). About BART. https://www.bart.gov. Accessed 08 Oct 17. Beresford AR, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive computing 2(1):46–55 Bay Area Rapid Transit (2017). About BART. https://​www.​bart.​gov. Accessed 08 Oct 17. Beresford AR, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive computing 2(1):46–55
57.
Zurück zum Zitat Dass P, Hari O (2016) A secure authentication scheme for RFID systems. International Conference on Information Security & Privacy (ICISP2015), 11–12 December 2015, Nagpur, INDIA; Procedia Computer Science, vol 78. pp. 100–106 Dass P, Hari O (2016) A secure authentication scheme for RFID systems. International Conference on Information Security & Privacy (ICISP2015), 11–12 December 2015, Nagpur, INDIA; Procedia Computer Science, vol 78. pp. 100–106
58.
Zurück zum Zitat Fu J, Wu C, Chen X, Fan R, Ping L (2010) Scalable pseudo random RFID private mutual authentication. 2nd IEEE International conference on computer engineering and technology (ICCET), vol 7. pp 497–500. Fu J, Wu C, Chen X, Fan R, Ping L (2010) Scalable pseudo random RFID private mutual authentication. 2nd IEEE International conference on computer engineering and technology (ICCET), vol 7. pp 497–500.
59.
Zurück zum Zitat Chang AY, Dwen-Ren T, Chang-Lung T, Yong-Jiang L (2009) An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone. Security Technology; 43rd Annual International Carnahan Conference. IEEE, pp 36–40 Chang AY, Dwen-Ren T, Chang-Lung T, Yong-Jiang L (2009) An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone. Security Technology; 43rd Annual International Carnahan Conference. IEEE, pp 36–40
63.
Zurück zum Zitat Chen T, Yeh H, Shih W (2011) An advanced ECC dynamic ID-based remote mutual authentication scheme for cloud computing. In: 2011 fifth FTRA international conference on multimedia and ubiquitous engineering. Crete, pp 155–159. https://doi.org/10.1109/MUE.2011.69 Chen T, Yeh H, Shih W (2011) An advanced ECC dynamic ID-based remote mutual authentication scheme for cloud computing. In: 2011 fifth FTRA international conference on multimedia and ubiquitous engineering. Crete, pp 155–159. https://​doi.​org/​10.​1109/​MUE.​2011.​69
64.
Zurück zum Zitat Heeks R, Bhatnagar S (1999) Understanding success and failure in information age reform. Reinventing Gov Inf Age Int Pract IT Enabled Public Sect Reform 1:49–74 Heeks R, Bhatnagar S (1999) Understanding success and failure in information age reform. Reinventing Gov Inf Age Int Pract IT Enabled Public Sect Reform 1:49–74
67.
Zurück zum Zitat Bartoli A, Hernández-Serrano J, Soriano M, Dohler M, Kountouris A, Barthel D (2011) Security and privacy in your smart city. Proceedings of the Barcelona smart cities congress. pp 1–6 Bartoli A, Hernández-Serrano J, Soriano M, Dohler M, Kountouris A, Barthel D (2011) Security and privacy in your smart city. Proceedings of the Barcelona smart cities congress. pp 1–6
68.
Zurück zum Zitat Cerrudo C (2015) An emerging us (and world) threat: cities wide open to cyberattacks. Securing Smart Cities Cerrudo C (2015) An emerging us (and world) threat: cities wide open to cyberattacks. Securing Smart Cities
69.
Zurück zum Zitat Logota E, Mantas G, Rodriguez J, Marques H (2014) Analysis of the impact of denial of service attacks on centralized control in smart cities. International wireless internet conference. Springer, pp 91–96 Logota E, Mantas G, Rodriguez J, Marques H (2014) Analysis of the impact of denial of service attacks on centralized control in smart cities. International wireless internet conference. Springer, pp 91–96
71.
Zurück zum Zitat Kitchin R (2016) Getting smarter about smart cities: Improving data privacy and data security. Data Protection Unit, Department of the Taoiseach Kitchin R (2016) Getting smarter about smart cities: Improving data privacy and data security. Data Protection Unit, Department of the Taoiseach
74.
Zurück zum Zitat Ijaz S, Shah MA, Khan A, Ahmed M (2016) Smart cities: a survey on security concerns. Int J Adv Comput Sci Appl 7:612–625 Ijaz S, Shah MA, Khan A, Ahmed M (2016) Smart cities: a survey on security concerns. Int J Adv Comput Sci Appl 7:612–625
Metadaten
Titel
Secure transmission technique for data in IoT edge computing infrastructure
verfasst von
Rohit Sharma
Rajeev Arya
Publikationsdatum
23.11.2021
Verlag
Springer International Publishing
Erschienen in
Complex & Intelligent Systems / Ausgabe 5/2022
Print ISSN: 2199-4536
Elektronische ISSN: 2198-6053
DOI
https://doi.org/10.1007/s40747-021-00576-7

Weitere Artikel der Ausgabe 5/2022

Complex & Intelligent Systems 5/2022 Zur Ausgabe

Premium Partner