Flexible IoT security middleware for end-to-end cloud–fog communication
Autor: | Daniel Dunn, Bidyut Mukherjee, Yijie Ren, Roshan Lal Neupane, Songjie Wang, Qi Su, Wenyi Lu, Prasad Calyam |
---|---|
Rok vydání: | 2018 |
Předmět: |
Computer Networks and Communications
business.industry Computer science 020206 networking & telecommunications Cloud computing 02 engineering and technology Encryption End-to-end principle Hardware and Architecture Middleware 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing Session (computer science) Enhanced Data Rates for GSM Evolution Communications protocol business Software Computer network |
Zdroj: | Future Generation Computer Systems. 87:688-703 |
ISSN: | 0167-739X |
DOI: | 10.1016/j.future.2017.12.031 |
Popis: | IoT (Internet of Things) based smart devices such as sensors have been actively used in edge clouds i.e., ‘fogs’ along with public clouds. They provide critical data during scenarios ranging from e.g., disaster response to in-home healthcare. However, for these devices to work effectively, end-to-end security schemes for the device communication protocols have to be flexible and should depend upon the application requirements as well as the resource constraints at the network-edge. In this paper, we present the design and implementation of a flexible IoT security middleware for end-to-end cloud–fog communications involving smart devices and cloud-hosted applications. The novel features of our middleware are in its ability to cope with intermittent network connectivity as well as device constraints in terms of computational power, memory, energy, and network bandwidth. To provide security during intermittent network conditions, we use a ‘Session Resumption’ algorithm in order for our middleware to reuse encrypted sessions from the recent past, if a recently disconnected device wants to resume a prior connection that was interrupted. In addition, we describe an ‘Optimal Scheme Decider’ algorithm that enables our middleware to select the best possible end-to-end security scheme option that matches with a given set of device constraints. Experiment results show how our middleware implementation also provides fast and resource-aware security by leveraging static properties i.e., static pre-shared keys (PSKs) for a variety of IoT-based application requirements that have trade-offs in higher security or faster data transfer rates. |
Databáze: | OpenAIRE |
Externí odkaz: |