Visible to the public Fog Computing Security Assessment for Device Authentication in the Internet of Things

TitleFog Computing Security Assessment for Device Authentication in the Internet of Things
Publication TypeConference Paper
Year of Publication2020
AuthorsAl Harbi, Saud, Halabi, Talal, Bellaiche, Martine
Conference Name2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
Date Publisheddec
Keywordsauthentication, authentication requirements, cloud computing, Computer architecture, fog architecture, Fog Computing, Fog Computing and Security, fog security, Internet of Things, Internet of Things security, privacy, pubcrawl, Resiliency, Scalability, security, security management
AbstractThe Fog is an emergent computing architecture that will support the mobility and geographic distribution of Internet of Things (IoT) nodes and deliver context-aware applications with low latency to end-users. It forms an intermediate layer between IoT devices and the Cloud. However, Fog computing brings many requirements that increase the cost of security management. It inherits the security and trust issues of Cloud and acquires some of the vulnerable features of IoT that threaten data and application confidentiality, integrity, and availability. Several existing solutions address some of the security challenges following adequate adaptation, but others require new and innovative mechanisms. These reflect the need for a Fog architecture that provides secure access, efficient authentication, reliable and secure communication, and trust establishment among IoT devices and Fog nodes. The Fog might be more convenient to deploy decentralized authentication solutions for IoT than the Cloud if appropriately designed. In this short survey, we highlight the Fog security challenges related to IoT security requirements and architectural design. We conduct a comparative study of existing Fog architectures then perform a critical analysis of different authentication schemes in Fog computing, which confirms some of the fundamental requirements for effective authentication of IoT devices based on the Fog, such as decentralization, less resource consumption, and low latency.
DOI10.1109/HPCC-SmartCity-DSS50907.2020.00202
Citation Keyal_harbi_fog_2020