Secure the internet of things with challenge response authentication in fog computing
Title | Secure the internet of things with challenge response authentication in fog computing |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Alharbi, S., Rodriguez, P., Maharaja, R., Iyer, P., Subaschandrabose, N., Ye, Z. |
Conference Name | 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC) |
Keywords | authentication, challenge-response authentication, cloud computing, Computer crime, computer network security, DDoS Attacks, distributed denial of service attacks, edge computing, FOCUS system, Fog Computing, fog computing based security system, Internet of Things, IoT devices, IoT system, security, security of data, Servers, virtual private network, Virtual private networks, VPN server |
Abstract | As the Internet of Things (IoT) continues to grow, there arises concerns and challenges with regard to the security and privacy of the IoT system. In this paper, we propose a FOg CompUting-based Security (FOCUS) system to address the security challenges in the IoT. The proposed FOCUS system leverages the virtual private network (VPN) to secure the access channel to the IoT devices. In addition, FOCUS adopts a challenge-response authentication to protect the VPN server against distributed denial of service (DDoS) attacks, which can further enhance the security of the IoT system. FOCUS is implemented in fog computing that is close to the end users, thus achieving a fast and efficient protection. We demonstrate FOCUS in a proof-of-concept prototype, and conduct experiments to evaluate its performance. The results show that FOCUS can effectively filter out malicious attacks with a very low response latency. |
URL | https://ieeexplore.ieee.org/document/8280489 |
DOI | 10.1109/PCCC.2017.8280489 |
Citation Key | alharbi_secure_2017 |
- fog computing based security system
- VPN server
- Virtual private networks
- virtual private network
- Servers
- security of data
- security
- IoT system
- IoT devices
- Internet of Things
- authentication
- Fog computing
- FOCUS system
- edge computing
- distributed denial of service attacks
- DDoS Attacks
- computer network security
- Computer crime
- Cloud Computing
- challenge-response authentication