Visible to the public Secure the internet of things with challenge response authentication in fog computing

TitleSecure the internet of things with challenge response authentication in fog computing
Publication TypeConference Paper
Year of Publication2017
AuthorsAlharbi, S., Rodriguez, P., Maharaja, R., Iyer, P., Subaschandrabose, N., Ye, Z.
Conference Name2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)
Keywordsauthentication, challenge-response authentication, cloud computing, Computer crime, computer network security, DDoS Attacks, distributed denial of service attacks, edge computing, FOCUS system, Fog Computing, fog computing based security system, Internet of Things, IoT devices, IoT system, security, security of data, Servers, virtual private network, Virtual private networks, VPN server
Abstract

As the Internet of Things (IoT) continues to grow, there arises concerns and challenges with regard to the security and privacy of the IoT system. In this paper, we propose a FOg CompUting-based Security (FOCUS) system to address the security challenges in the IoT. The proposed FOCUS system leverages the virtual private network (VPN) to secure the access channel to the IoT devices. In addition, FOCUS adopts a challenge-response authentication to protect the VPN server against distributed denial of service (DDoS) attacks, which can further enhance the security of the IoT system. FOCUS is implemented in fog computing that is close to the end users, thus achieving a fast and efficient protection. We demonstrate FOCUS in a proof-of-concept prototype, and conduct experiments to evaluate its performance. The results show that FOCUS can effectively filter out malicious attacks with a very low response latency.

URLhttps://ieeexplore.ieee.org/document/8280489
DOI10.1109/PCCC.2017.8280489
Citation Keyalharbi_secure_2017