Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model

The Internet of Things (IoT) has converged with Cloud computing to provide comprehensive services to users in different places. However, with the exponential growth of smart devices connected to the Internet, Cloud computing has severe challenges, especially for applications that require low-latency...

Full description

Saved in:
Bibliographic Details
Published inComputer networks (Amsterdam, Netherlands : 1999) Vol. 199; p. 108465
Main Authors Amanlou, Sanaz, Hasan, Mohammad Kamrul, Bakar, Khairul Azmi Abu
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier B.V 09.11.2021
Elsevier Sequoia S.A
Subjects
Online AccessGet full text
ISSN1389-1286
1872-7069
DOI10.1016/j.comnet.2021.108465

Cover

Abstract The Internet of Things (IoT) has converged with Cloud computing to provide comprehensive services to users in different places. However, with the exponential growth of smart devices connected to the Internet, Cloud computing has severe challenges, especially for applications that require low-latency and real-time processing. Therefore, the Fog computing paradigm emerged that is more compatible with the IoT, in which events are processed near where they occurred for practical and quick response time. Authentication is an essential issue for fog computing security since fog gateways and IoT devices are subject to many attacks. The main problem to provide authentication between IoT devices is that they have limited resources and computational processing. On the one hand, certificate-based authentication algorithms are secure, but they are heavy for IoT devices. On the other hand, Pre-shared authentication algorithms such as PSK are suitable for low-resource devices, but are not widely used due to their low security. Therefore, this paper proposes to use the Elliptic Curve Diffie–Hellman Ephemeral (ECDHE) key exchange algorithm along with the Pre-Shared Key (PSK) as a lightweight and secure authentication scheme between the fog gateway and IoT device based on the Message Queuing Telemetry Transport (MQTT) publish–subscribe protocol in a distributed fog computing architecture. The proposed ECDHE-PSK authentication scheme uses Ephemeral Pre-shared key instead of heavy certificates that is very lightweight and also provides Perfect Forward Secrecy (PFS) feature to enhance security in comparison with the static PSK algorithm. To evaluate the resource consumption and security resistance of the proposed scheme it was implemented on the real test environment and then was compared with two state-of-the-art certificate-based authentication schemes and a static PSK-based scheme. The comprehensive performance and security evaluations showed that in the distributed publish–subscribe fog computing architecture the proposed ECDHE-PSK is almost as light as the PSK algorithm while has all security features of certificate-based algorithms.
AbstractList The Internet of Things (IoT) has converged with Cloud computing to provide comprehensive services to users in different places. However, with the exponential growth of smart devices connected to the Internet, Cloud computing has severe challenges, especially for applications that require low-latency and real-time processing. Therefore, the Fog computing paradigm emerged that is more compatible with the IoT, in which events are processed near where they occurred for practical and quick response time. Authentication is an essential issue for fog computing security since fog gateways and IoT devices are subject to many attacks. The main problem to provide authentication between IoT devices is that they have limited resources and computational processing. On the one hand, certificate-based authentication algorithms are secure, but they are heavy for IoT devices. On the other hand, Pre-shared authentication algorithms such as PSK are suitable for low-resource devices, but are not widely used due to their low security. Therefore, this paper proposes to use the Elliptic Curve Diffie–Hellman Ephemeral (ECDHE) key exchange algorithm along with the Pre-Shared Key (PSK) as a lightweight and secure authentication scheme between the fog gateway and IoT device based on the Message Queuing Telemetry Transport (MQTT) publish–subscribe protocol in a distributed fog computing architecture. The proposed ECDHE-PSK authentication scheme uses Ephemeral Pre-shared key instead of heavy certificates that is very lightweight and also provides Perfect Forward Secrecy (PFS) feature to enhance security in comparison with the static PSK algorithm. To evaluate the resource consumption and security resistance of the proposed scheme it was implemented on the real test environment and then was compared with two state-of-the-art certificate-based authentication schemes and a static PSK-based scheme. The comprehensive performance and security evaluations showed that in the distributed publish–subscribe fog computing architecture the proposed ECDHE-PSK is almost as light as the PSK algorithm while has all security features of certificate-based algorithms.
ArticleNumber 108465
Author Amanlou, Sanaz
Hasan, Mohammad Kamrul
Bakar, Khairul Azmi Abu
Author_xml – sequence: 1
  givenname: Sanaz
  orcidid: 0000-0001-5736-3273
  surname: Amanlou
  fullname: Amanlou, Sanaz
  email: sanaz.amanlou@gmail.com
– sequence: 2
  givenname: Mohammad Kamrul
  orcidid: 0000-0001-5511-0205
  surname: Hasan
  fullname: Hasan, Mohammad Kamrul
  email: mkhasan@ukm.edu.my, hasankamrul@ieee.org
– sequence: 3
  givenname: Khairul Azmi Abu
  orcidid: 0000-0002-0575-2100
  surname: Bakar
  fullname: Bakar, Khairul Azmi Abu
BookMark eNqFUMtOwzAQtFCRoIU_4GCJc4odp47DAQkhHpUqcYGzFTub1qWxi-2AuPEP_CFfgks4cYDL7mp3ZndnxmhknQWETiiZUkL52XqqXWchTnOS09QSBZ_toUMqyjwrCa9GqWaiymgu-AEah7AmhBRFLg5RtzDLVXyFXcS1bXAA3XvAdR9XYKPRdTTO4qBX0AFuncdz94DTrVfnn7CqAzQ4zbe92piw-nz_CL0K2hu1Ay9x-mvbR2OXuHMNbI7QfltvAhz_5Al6vLl-uLrLFve386vLRaYZK2I2q6BktdAk6Sh5VVYlIUy1qa1EAUyzRiWEEpDrGShetQ1rCy6Aa-CgWckm6HTYu_XuuYcQ5dr13qaTMueE00rkdJZQ5wNKexeCh1ZqE7_1Rl-bjaRE7uyVaznYK3f2ysHeRC5-kbfedLV_-492MdAgyX8x4GXQBqyGxnjQUTbO_L3gC-wTm5w
CitedBy_id crossref_primary_10_3390_s23249692
crossref_primary_10_1109_TSC_2024_3382950
crossref_primary_10_1155_2022_9065768
crossref_primary_10_3390_s22062100
crossref_primary_10_1155_2022_7125491
crossref_primary_10_1155_2022_8750840
crossref_primary_10_69955_ajoeee_24_v4i2_62
crossref_primary_10_1002_spe_3392
crossref_primary_10_1007_s00607_023_01208_3
crossref_primary_10_1016_j_comnet_2023_109844
crossref_primary_10_1155_2022_3804553
crossref_primary_10_1109_TII_2022_3197201
crossref_primary_10_1109_ACCESS_2023_3290906
crossref_primary_10_32604_cmc_2025_060372
crossref_primary_10_3390_app14156407
crossref_primary_10_1016_j_jnca_2024_103922
crossref_primary_10_37391_IJEER_120115
crossref_primary_10_1155_2021_8567894
crossref_primary_10_1002_ett_4957
crossref_primary_10_1007_s12083_024_01843_3
crossref_primary_10_1155_2023_9731239
crossref_primary_10_1016_j_micpro_2024_105088
crossref_primary_10_1111_exsy_13603
crossref_primary_10_1049_cmu2_12301
crossref_primary_10_32604_cmc_2024_049017
crossref_primary_10_26599_TST_2024_9010005
crossref_primary_10_1016_j_measen_2024_101057
crossref_primary_10_3390_sym16020171
crossref_primary_10_1016_j_comcom_2023_07_012
crossref_primary_10_1155_2022_2650742
crossref_primary_10_1016_j_compeleceng_2023_108715
crossref_primary_10_3390_app122211650
crossref_primary_10_1109_TCE_2023_3332133
crossref_primary_10_1016_j_gltp_2022_04_015
crossref_primary_10_37391_10_37391_IJEER_120115
crossref_primary_10_1109_ACCESS_2024_3393567
crossref_primary_10_1016_j_comnet_2022_109354
crossref_primary_10_3390_app12147173
crossref_primary_10_1007_s10586_021_03461_7
crossref_primary_10_3390_en16052487
crossref_primary_10_1007_s10207_023_00762_3
crossref_primary_10_1049_cmu2_12315
crossref_primary_10_1049_cit2_12200
crossref_primary_10_3390_s22197391
Cites_doi 10.1016/j.comnet.2010.05.010
10.1109/TII.2019.2963328
10.1109/ACCESS.2018.2844406
10.1109/SAHCN.2014.6990364
10.1016/j.procs.2018.04.064
10.1007/s10796-014-9492-7
10.1016/j.jpdc.2019.10.009
10.1145/2789116.2802650
10.1109/WTS.2016.7482039
10.3390/sym12101674
10.1109/ACCESS.2020.3030192
10.3390/fi11030066
10.17576/apjitm-2018-0702(02)-05
10.1109/ACCESS.2020.3024964
10.3390/s17091978
10.1109/COMSNETS.2019.8711402
10.1109/TSUSC.2017.2714959
10.3389/fphy.2020.00358
10.12720/jcm.15.1.14-30
10.1109/ACCESS.2017.2757844
10.1016/j.jpdc.2019.01.004
10.1109/JIOT.2020.2981005
10.1109/ACCESS.2020.3012121
10.1007/s13389-014-0090-x
10.1109/WF-IoT.2016.7845414
10.1155/2015/393754
10.1155/2020/8897098
10.1109/TrustCom.2014.31
10.1109/FTC.2016.7821693
10.3390/s18082660
10.1109/ICoAC48765.2019.246840
10.3390/su13010338
10.1109/ISC246665.2019.9071788
10.1016/j.future.2017.12.031
10.1109/ACCESS.2020.2983117
10.23919/DATE.2017.7927078
10.1016/j.iot.2020.100254
10.1007/s11227-020-03415-7
10.3390/s20236837
10.3390/en13215777
10.1109/MetroInd4.0IoT48571.2020.9138303
ContentType Journal Article
Copyright 2021 Elsevier B.V.
Copyright Elsevier Sequoia S.A. Nov 9, 2021
Copyright_xml – notice: 2021 Elsevier B.V.
– notice: Copyright Elsevier Sequoia S.A. Nov 9, 2021
DBID AAYXX
CITATION
7SC
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
DOI 10.1016/j.comnet.2021.108465
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Library and Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1872-7069
ExternalDocumentID 10_1016_j_comnet_2021_108465
S1389128621004175
GrantInformation_xml – fundername: Universiti Kebangsaan Malaysia (UKM)
  grantid: FRGS/1/2020/ICT03/UKM/02/6; GGPM-2017-021
  funderid: http://dx.doi.org/10.13039/501100004515
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
6OB
7-5
71M
77K
8P~
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABMAC
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EO8
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
IHE
J1W
JJJVA
KOM
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
PQQKQ
Q38
ROL
RPZ
RXW
SDF
SDG
SDP
SES
SPC
SPCBC
SST
SSV
SSZ
T5K
TAE
TN5
ZMT
~G-
29F
77I
AATTM
AAXKI
AAYWO
AAYXX
ABFNM
ABJNI
ABXDB
ACLOT
ACNNM
ACVFH
ADCNI
ADJOM
AEIPS
AEUPX
AFJKZ
AFPUW
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
EJD
F0J
FGOYB
HZ~
R2-
SEW
ZY4
~HD
7SC
8FD
AFXIZ
AGCQF
AGRNS
BNPGV
E3H
F2A
JQ2
L7M
L~C
L~D
SSH
ID FETCH-LOGICAL-c334t-59e73a8c0465769797003bf59eb84e3c3db9e7b8e2c5eb69fd3f468e6ce6ec373
IEDL.DBID .~1
ISSN 1389-1286
IngestDate Mon Jul 14 08:08:31 EDT 2025
Wed Oct 01 04:06:53 EDT 2025
Thu Apr 24 23:08:40 EDT 2025
Fri Feb 23 02:42:39 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Fog computing
Lightweight authentication
Internet of Things (IoT)
Pre-shared keys
Elliptic Curve Diffie–Hellman Ephemeral
Security
Perfect forward secrecy
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c334t-59e73a8c0465769797003bf59eb84e3c3db9e7b8e2c5eb69fd3f468e6ce6ec373
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-0575-2100
0000-0001-5736-3273
0000-0001-5511-0205
PQID 2606198215
PQPubID 47119
ParticipantIDs proquest_journals_2606198215
crossref_citationtrail_10_1016_j_comnet_2021_108465
crossref_primary_10_1016_j_comnet_2021_108465
elsevier_sciencedirect_doi_10_1016_j_comnet_2021_108465
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-11-09
PublicationDateYYYYMMDD 2021-11-09
PublicationDate_xml – month: 11
  year: 2021
  text: 2021-11-09
  day: 09
PublicationDecade 2020
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Computer networks (Amsterdam, Netherlands : 1999)
PublicationYear 2021
Publisher Elsevier B.V
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier B.V
– name: Elsevier Sequoia S.A
References Fabricio, Liang (b22) 2020; 8
Diro, Reda, Chilamkurti, A.Mahmood, Nam (b34) 2020; 8
Onumanyi, Abu-Mahfouz, Hancke (b3) 2020; 20
Mo, Liang, Xing, Liao, Liu (b7) 2020; 8
Alhaidari, Alqahtani (b14) 2020; 15
Suárez-Albela, Fernández-Caramés, Fraga-Lamas, Castedo (b31) 2017; 17
Udoo neo
Subramanian, Tamilselvan (b47) 2020
Ubuntu mate 18.04: Linux for odroid board
M.A. Jan, P. Nanda, X. He, Z. Tan, R.P. Liu, A robust authentication scheme for observing resources in the internet of things environment, in: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014, pp. 1294–1298.
L. Bondi, L. Baroffio, M. Cesana, A.E. Redondi, M. Tagliasacchi, Open-source and flexible framework for visual sensor networks, in: Proceedings of the 9th International Conference on Distributed Smart Cameras, 2015, pp. 197–198.
R. Hummen, H. Shafagh, S. Raza, T. Voig, K. Wehrle, Delegation-based authentication and authorization for the IP-based internet of things, in: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking(SECON), 2014, pp. 284–292.
Patonico, Nguyen, Shabisha, Braeken, Steenhaut (b33) 2021; 77
Odroid-c1
L. Loffi, C.M. Westphall, L.D. Grüdtner, C.B. Westphall, Mutual authentication for IoT in the context of fog computing, in: 2019 11th International Conference on Communication Systems & Networks (COMSNETS), 2019, pp. 67–374.
A. Erroutbi, A. El Hanjri, A. Sekkaki, Secure and lightweight HMAC mutual authentication protocol for communication between IoT devices and fog nodes, in: 2019 IEEE International Smart Cities Conference (ISC2), 2019, pp. 251–257.
Kang, Park, Kwon, Jung (b63) 2015; 11
Raspbian pi os lite
The intel edison module iot
Hassan, Qamar, Hasan, Aman, Ahmed (b4) 2020; 12
Bonomi, Milito, Zhu, Addepalli (b9) 2012
Barken, Bermel, Eder, Fanady, Mee, Palumbo, Keobrick (b48) 2004
F. De Santis, A. Schauer, G. Sigl, ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications, in: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pp. 692–697.
Jaloudi (b12) 2019; 11
S.J. Johnston, M. Apetroaie-Cristea, M. Scott, S.J. Cox, Applicability of commodity, low cost, single board computers for Internet of Things devices, in: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, pp. 141–146.
Raspberry pi zero w
Memon, Shaikh, Hasan, Hassan, Haq, Zainol (b6) 2020; 2020
Mukherjee, Wang, Lu, Neupane, Dunn, Ren, Su, Calyam (b26) 2018; 87
Kamil, Ayob, Sheikhabdullah, Ahmad (b25) 2018; 7
Mughal, Luo, Ullah, Ullah, Mahmood (b17) 2018; 6
R. Narayanan, S. Jayashree, N.D. Philips, A. Saranya, S.B. Prathiba, G. Raja, TLS cipher suite: Secure communication of 6LoWPAN devices, in: 2019 11th International Conference on Advanced Computing (ICoAC), 2019, pp. 197–203.
S. Forsström, U. Jennehag, X. Guan, A plain low threshold IoT platform for enabling new IoT products from SMEs, in: 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2020, pp. 390–394.
Turner (b52) 2015
Hasan, Islam, Sulaiman, Khan, Hashim, Habib, Islam, Alyahya, Ahmed, Kamil, Hassan (b19) 2021
Ahmed, Hasan, Saeed, Hassan, Islam, Mokhtar, Khan, Akhtaruzzaman (b8) 2020; 8
Ghazal, Hasan, Hassan, Islam, Abdullah, Afifi, Kalra (b20) 2020; 63
Nurelmadina, Hasan, Memon, Saeed, Zainol Ariffin, Ali, Mokhtar, Islam, Hossain, Hassan (b5) 2021; 13
Al Hamid, Rahman, Hossain, Almogren, Alamri (b27) 2017; 5
New generation of libelium product lines
Amnalou, Bakar (b18) 2020; 11
A. Raza, A.A. Ikram, A. Amin, A.J. Ikram, A review of low cost and power efficient development boards for IoT applications, in: 2016 Future Technologies Conference (FTC), 2016, pp. 786–790.
Haseeb, Din, Almogren, Jan, Abbas, Adnan (b23) 2020; 8
Polk, McKay, Chokhani (b54) 2014; 800
Hasan, Alvares, Ledoux, Pazat (b21) 2017; 2
Liang, Zhang, Leung (b15) 2020; 7
Veeramanikandan, Sankaranarayanan (b11) 2019; 127
Wang, Mei, Jia, Zheng, Wang, Xie (b10) 2020; 136
Cortex-a series family
Moosavi, Nigussie, Levorato, Virtanen, Isoaho (b32) 2018; 130
Li, Da Xu, Zhao (b2) 2015; 17
H. Khemissa, D. Tandjaoui, A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things, in: 2016 Wireless Telecommunications Symposium (WTS), 2016, pp. 1–6.
Gueron, Krasnov (b46) 2015; 5
Atzori, Iera, Morabito (b1) 2010; 54
Wang, Chen, Wu (b30) 2020; 13
Froiz-Míguez, Fernández-Caramés, Fraga-Lamas, Castedo (b13) 2018; 18
accessed on 10 2020.
Bernstein (b51) 2005
Udoo x86
Yang, He, Tian, Zhou (b45) 2019; 16
Teltonika rut230 ap- router
Nir, Langley (b49) 2015
Martino, Cilardo (b53) 2020; 11
Amlogic s805 datasheet
Kodali, Budwal, Patel, Sarma (b16) 2013
10.1016/j.comnet.2021.108465_b55
10.1016/j.comnet.2021.108465_b56
Bernstein (10.1016/j.comnet.2021.108465_b51) 2005
10.1016/j.comnet.2021.108465_b57
10.1016/j.comnet.2021.108465_b58
Alhaidari (10.1016/j.comnet.2021.108465_b14) 2020; 15
Liang (10.1016/j.comnet.2021.108465_b15) 2020; 7
Li (10.1016/j.comnet.2021.108465_b2) 2015; 17
10.1016/j.comnet.2021.108465_b50
Memon (10.1016/j.comnet.2021.108465_b6) 2020; 2020
Yang (10.1016/j.comnet.2021.108465_b45) 2019; 16
Nir (10.1016/j.comnet.2021.108465_b49) 2015
Martino (10.1016/j.comnet.2021.108465_b53) 2020; 11
Veeramanikandan (10.1016/j.comnet.2021.108465_b11) 2019; 127
10.1016/j.comnet.2021.108465_b62
Onumanyi (10.1016/j.comnet.2021.108465_b3) 2020; 20
Amnalou (10.1016/j.comnet.2021.108465_b18) 2020; 11
10.1016/j.comnet.2021.108465_b24
Bonomi (10.1016/j.comnet.2021.108465_b9) 2012
Wang (10.1016/j.comnet.2021.108465_b30) 2020; 13
Fabricio (10.1016/j.comnet.2021.108465_b22) 2020; 8
Hassan (10.1016/j.comnet.2021.108465_b4) 2020; 12
10.1016/j.comnet.2021.108465_b60
10.1016/j.comnet.2021.108465_b61
Turner (10.1016/j.comnet.2021.108465_b52) 2015
10.1016/j.comnet.2021.108465_b59
Polk (10.1016/j.comnet.2021.108465_b54) 2014; 800
Ghazal (10.1016/j.comnet.2021.108465_b20) 2020; 63
Atzori (10.1016/j.comnet.2021.108465_b1) 2010; 54
Mughal (10.1016/j.comnet.2021.108465_b17) 2018; 6
10.1016/j.comnet.2021.108465_b35
Haseeb (10.1016/j.comnet.2021.108465_b23) 2020; 8
10.1016/j.comnet.2021.108465_b36
Kodali (10.1016/j.comnet.2021.108465_b16) 2013
Gueron (10.1016/j.comnet.2021.108465_b46) 2015; 5
Kamil (10.1016/j.comnet.2021.108465_b25) 2018; 7
Mo (10.1016/j.comnet.2021.108465_b7) 2020; 8
Jaloudi (10.1016/j.comnet.2021.108465_b12) 2019; 11
Ahmed (10.1016/j.comnet.2021.108465_b8) 2020; 8
Hasan (10.1016/j.comnet.2021.108465_b21) 2017; 2
10.1016/j.comnet.2021.108465_b28
10.1016/j.comnet.2021.108465_b29
10.1016/j.comnet.2021.108465_b40
10.1016/j.comnet.2021.108465_b41
10.1016/j.comnet.2021.108465_b42
Kang (10.1016/j.comnet.2021.108465_b63) 2015; 11
10.1016/j.comnet.2021.108465_b43
10.1016/j.comnet.2021.108465_b44
Froiz-Míguez (10.1016/j.comnet.2021.108465_b13) 2018; 18
Suárez-Albela (10.1016/j.comnet.2021.108465_b31) 2017; 17
Al Hamid (10.1016/j.comnet.2021.108465_b27) 2017; 5
Subramanian (10.1016/j.comnet.2021.108465_b47) 2020
Wang (10.1016/j.comnet.2021.108465_b10) 2020; 136
Mukherjee (10.1016/j.comnet.2021.108465_b26) 2018; 87
Nurelmadina (10.1016/j.comnet.2021.108465_b5) 2021; 13
10.1016/j.comnet.2021.108465_b37
10.1016/j.comnet.2021.108465_b38
Hasan (10.1016/j.comnet.2021.108465_b19) 2021
10.1016/j.comnet.2021.108465_b39
Patonico (10.1016/j.comnet.2021.108465_b33) 2021; 77
Diro (10.1016/j.comnet.2021.108465_b34) 2020; 8
Barken (10.1016/j.comnet.2021.108465_b48) 2004
Moosavi (10.1016/j.comnet.2021.108465_b32) 2018; 130
References_xml – volume: 12
  start-page: 1674
  year: 2020
  ident: b4
  article-title: Internet of things and its applications: A comprehensive survey
  publication-title: Symmetry
– reference: R. Hummen, H. Shafagh, S. Raza, T. Voig, K. Wehrle, Delegation-based authentication and authorization for the IP-based internet of things, in: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking(SECON), 2014, pp. 284–292.
– start-page: 352
  year: 2013
  end-page: 356
  ident: b16
  article-title: Fuzzy controlled scalar multiplication for ECC
  publication-title: IEEE 2013 Tencon-Spring
– volume: 15
  start-page: 14
  year: 2020
  end-page: 30
  ident: b14
  article-title: Securing communication between fog computing and iot using constrained application protocol (coap): A survey
  publication-title: J. Commun.
– volume: 11
  start-page: 66
  year: 2019
  ident: b12
  article-title: Communication protocols of an industrial internet of things environment: A comparative study
  publication-title: Future Internet
– volume: 11
  start-page: 202
  year: 2020
  end-page: 207
  ident: b18
  article-title: Lightweight security mechanism over MQTT protocol for IoT devices
  publication-title: Int. J. Adv. Comput. Sci. Appl.
– volume: 17
  start-page: 243
  year: 2015
  end-page: 259
  ident: b2
  article-title: The internet of things: a survey
  publication-title: Inf. Syst. Front.
– volume: 5
  start-page: 141
  year: 2015
  end-page: 151
  ident: b46
  article-title: Fast prime field elliptic-curve cryptography with 256-bit primes
  publication-title: J. Cryptogr. Eng.
– reference: , accessed on 10 2020.
– volume: 17
  start-page: 1978
  year: 2017
  ident: b31
  article-title: A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications
  publication-title: Sensors
– volume: 2020
  year: 2020
  ident: b6
  article-title: Protect mobile travelers information in sensitive region based on fuzzy logic in IoT technology
  publication-title: Secur. Commun. Netw.
– volume: 136
  start-page: 75
  year: 2020
  end-page: 85
  ident: b10
  article-title: Edge-based differential privacy computing for sensor–cloud systems
  publication-title: J. Parallel Distrib. Comput.
– reference: Cortex-a series family,
– volume: 20
  start-page: 6837
  year: 2020
  ident: b3
  article-title: Low Power Wide Area network, cognitive radio and the internet of things: Potentials for integration
  publication-title: Sensors
– volume: 77
  start-page: 4056
  year: 2021
  end-page: 4080
  ident: b33
  article-title: Toward the inclusion of end-to-end security in the OM2m platform
  publication-title: J. Supercomput.
– volume: 8
  start-page: 60539
  year: 2020
  end-page: 60551
  ident: b34
  article-title: Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication
  publication-title: IEEE Access
– volume: 63
  start-page: 2513
  year: 2020
  end-page: 2521
  ident: b20
  article-title: Security vulnerabilities, attacks, threats and the proposed countermeasures for the internet of things applications
  publication-title: Solid State Technol.
– volume: 2
  start-page: 113
  year: 2017
  end-page: 126
  ident: b21
  article-title: Investigating energy consumption and performance trade-off for interactive cloud application
  publication-title: IEEE Trans. Sustain. Comput.
– volume: 130
  start-page: 432
  year: 2018
  end-page: 439
  ident: b32
  article-title: Performance analysis of end-to-end security schemes in healthcare IoT
  publication-title: Procedia Comput. Sci.
– reference: Teltonika rut230 ap- router,
– year: 2021
  ident: b19
  article-title: Lightweight encryption technique to enhance medical image security on internet of medical things applications
  publication-title: IEEE Access
– reference: H. Khemissa, D. Tandjaoui, A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things, in: 2016 Wireless Telecommunications Symposium (WTS), 2016, pp. 1–6.
– volume: 87
  start-page: 688
  year: 2018
  end-page: 703
  ident: b26
  article-title: Flexible IoT security middleware for end-to-end cloud–fog communication
  publication-title: Future Gener. Comput. Syst.
– reference: The intel edison module iot,
– reference: Udoo x86,
– volume: 11
  year: 2020
  ident: b53
  article-title: Designing a SHA-256 processor for blockchain-based IoT applications
  publication-title: Internet Things
– volume: 127
  start-page: 18
  year: 2019
  end-page: 27
  ident: b11
  article-title: Publish/subscribe based multi-tier edge computational model in internet of things for latency reduction
  publication-title: J. Parallel Distrib. Comput.
– volume: 13
  start-page: 5777
  year: 2020
  ident: b30
  article-title: Client-aware negotiation for secure and efficient data transmission
  publication-title: Energies
– volume: 800
  start-page: 32
  year: 2014
  ident: b54
  article-title: Guidelines for the selection, configuration, and use of transport layer security (TLS) implementations
  publication-title: NIST Special Publication
– reference: A. Raza, A.A. Ikram, A. Amin, A.J. Ikram, A review of low cost and power efficient development boards for IoT applications, in: 2016 Future Technologies Conference (FTC), 2016, pp. 786–790.
– reference: Ubuntu mate 18.04: Linux for odroid board,
– reference: M.A. Jan, P. Nanda, X. He, Z. Tan, R.P. Liu, A robust authentication scheme for observing resources in the internet of things environment, in: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014, pp. 1294–1298.
– reference: Udoo neo,
– reference: Odroid-c1,
– reference: Raspberry pi zero w,
– start-page: 13
  year: 2012
  end-page: 16
  ident: b9
  article-title: Fog computing and its role in the internet of things
  publication-title: Eur. Phys. J. B
– volume: 8
  start-page: 185752
  year: 2020
  end-page: 185760
  ident: b23
  article-title: Ddr-esc: a distributed and data reliability model for mobile edge-based sensor-cloud
  publication-title: IEEE Access
– volume: 13
  start-page: 338
  year: 2021
  ident: b5
  article-title: A systematic review on cognitive radio in low Power Wide Area network for industrial IoT applications
  publication-title: Sustainability
– reference: S.J. Johnston, M. Apetroaie-Cristea, M. Scott, S.J. Cox, Applicability of commodity, low cost, single board computers for Internet of Things devices, in: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, pp. 141–146.
– reference: F. De Santis, A. Schauer, G. Sigl, ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications, in: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pp. 692–697.
– reference: L. Loffi, C.M. Westphall, L.D. Grüdtner, C.B. Westphall, Mutual authentication for IoT in the context of fog computing, in: 2019 11th International Conference on Communication Systems & Networks (COMSNETS), 2019, pp. 67–374.
– volume: 8
  year: 2020
  ident: b8
  article-title: Optimizing energy consumption for cloud internet of things
  publication-title: Front. Phys.
– volume: 6
  start-page: 31630
  year: 2018
  end-page: 31643
  ident: b17
  article-title: A lightweight digital signature based security scheme for human-centered Internet of Things
  publication-title: IEEE Access
– volume: 7
  start-page: 53
  year: 2018
  end-page: 62
  ident: b25
  article-title: Challenges in multi-layer data security for video steganography revisited
  publication-title: Asia-Pacific J. Inf. Technol. Multimed
– start-page: 1
  year: 2020
  end-page: 11
  ident: b47
  article-title: Elliptic curve Diffie–Hellman cryptosystem in big data cloud security
  publication-title: Cluster Comput.
– reference: R. Narayanan, S. Jayashree, N.D. Philips, A. Saranya, S.B. Prathiba, G. Raja, TLS cipher suite: Secure communication of 6LoWPAN devices, in: 2019 11th International Conference on Advanced Computing (ICoAC), 2019, pp. 197–203.
– reference: Amlogic s805 datasheet,
– volume: 11
  year: 2015
  ident: b63
  article-title: ESSE: efficient secure session establishment for internet-integrated wireless sensor networks
  publication-title: Int. J. Distrib. Sens. Netw.
– volume: 5
  start-page: 22313
  year: 2017
  end-page: 22328
  ident: b27
  article-title: A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography
  publication-title: IEEE Access
– reference: A. Erroutbi, A. El Hanjri, A. Sekkaki, Secure and lightweight HMAC mutual authentication protocol for communication between IoT devices and fog nodes, in: 2019 IEEE International Smart Cities Conference (ISC2), 2019, pp. 251–257.
– volume: 54
  start-page: 2787
  year: 2010
  end-page: 2805
  ident: b1
  article-title: The internet of things: A survey
  publication-title: Comput. Netw.
– reference: Raspbian pi os lite,
– reference: New generation of libelium product lines,
– year: 2004
  ident: b48
  article-title: Wireless Hacking
– year: 2015
  ident: b49
  article-title: ChaCha20 and poly1305 for IETF protocols
– year: 2005
  ident: b51
  article-title: The poly1305-AES message-authentication code
– reference: L. Bondi, L. Baroffio, M. Cesana, A.E. Redondi, M. Tagliasacchi, Open-source and flexible framework for visual sensor networks, in: Proceedings of the 9th International Conference on Distributed Smart Cameras, 2015, pp. 197–198.
– volume: 8
  start-page: 177206
  year: 2020
  end-page: 177218
  ident: b7
  article-title: Network simplification and K-terminal reliability evaluation of sensor-cloud systems
  publication-title: IEEE Access
– volume: 16
  start-page: 6584
  year: 2019
  end-page: 6596
  ident: b45
  article-title: Faster authenticated key agreement with perfect forward secrecy for industrial Internet-of-Things
  publication-title: IEEE Trans. Ind. Inf.
– volume: 7
  start-page: 5481
  year: 2020
  end-page: 5490
  ident: b15
  article-title: A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud
  publication-title: IEEE Internet Things J.
– volume: 18
  start-page: 2660
  year: 2018
  ident: b13
  article-title: Design, implementation and practical evaluation of an IoT home automation system for fog computing applications based on MQTT and ZigBee-WiFi sensor nodes
  publication-title: Sensors
– reference: S. Forsström, U. Jennehag, X. Guan, A plain low threshold IoT platform for enabling new IoT products from SMEs, in: 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2020, pp. 390–394.
– year: 2015
  ident: b52
  article-title: Using SHA2 algorithms with cryptographic message syntax
– volume: 8
  start-page: 139244
  year: 2020
  end-page: 139254
  ident: b22
  article-title: A secure and reliable device access control scheme for IoT based sensor cloud systems
  publication-title: IEEE Access
– volume: 54
  start-page: 2787
  year: 2010
  ident: 10.1016/j.comnet.2021.108465_b1
  article-title: The internet of things: A survey
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2010.05.010
– volume: 16
  start-page: 6584
  year: 2019
  ident: 10.1016/j.comnet.2021.108465_b45
  article-title: Faster authenticated key agreement with perfect forward secrecy for industrial Internet-of-Things
  publication-title: IEEE Trans. Ind. Inf.
  doi: 10.1109/TII.2019.2963328
– volume: 6
  start-page: 31630
  year: 2018
  ident: 10.1016/j.comnet.2021.108465_b17
  article-title: A lightweight digital signature based security scheme for human-centered Internet of Things
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2844406
– ident: 10.1016/j.comnet.2021.108465_b62
  doi: 10.1109/SAHCN.2014.6990364
– start-page: 352
  year: 2013
  ident: 10.1016/j.comnet.2021.108465_b16
  article-title: Fuzzy controlled scalar multiplication for ECC
– volume: 130
  start-page: 432
  year: 2018
  ident: 10.1016/j.comnet.2021.108465_b32
  article-title: Performance analysis of end-to-end security schemes in healthcare IoT
  publication-title: Procedia Comput. Sci.
  doi: 10.1016/j.procs.2018.04.064
– volume: 17
  start-page: 243
  year: 2015
  ident: 10.1016/j.comnet.2021.108465_b2
  article-title: The internet of things: a survey
  publication-title: Inf. Syst. Front.
  doi: 10.1007/s10796-014-9492-7
– volume: 136
  start-page: 75
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b10
  article-title: Edge-based differential privacy computing for sensor–cloud systems
  publication-title: J. Parallel Distrib. Comput.
  doi: 10.1016/j.jpdc.2019.10.009
– ident: 10.1016/j.comnet.2021.108465_b43
  doi: 10.1145/2789116.2802650
– volume: 800
  start-page: 32
  year: 2014
  ident: 10.1016/j.comnet.2021.108465_b54
  article-title: Guidelines for the selection, configuration, and use of transport layer security (TLS) implementations
– ident: 10.1016/j.comnet.2021.108465_b35
  doi: 10.1109/WTS.2016.7482039
– volume: 12
  start-page: 1674
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b4
  article-title: Internet of things and its applications: A comprehensive survey
  publication-title: Symmetry
  doi: 10.3390/sym12101674
– ident: 10.1016/j.comnet.2021.108465_b58
– volume: 8
  start-page: 185752
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b23
  article-title: Ddr-esc: a distributed and data reliability model for mobile edge-based sensor-cloud
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3030192
– volume: 11
  start-page: 66
  year: 2019
  ident: 10.1016/j.comnet.2021.108465_b12
  article-title: Communication protocols of an industrial internet of things environment: A comparative study
  publication-title: Future Internet
  doi: 10.3390/fi11030066
– ident: 10.1016/j.comnet.2021.108465_b44
– year: 2015
  ident: 10.1016/j.comnet.2021.108465_b49
– volume: 7
  start-page: 53
  year: 2018
  ident: 10.1016/j.comnet.2021.108465_b25
  article-title: Challenges in multi-layer data security for video steganography revisited
  publication-title: Asia-Pacific J. Inf. Technol. Multimed
  doi: 10.17576/apjitm-2018-0702(02)-05
– volume: 8
  start-page: 177206
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b7
  article-title: Network simplification and K-terminal reliability evaluation of sensor-cloud systems
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3024964
– volume: 17
  start-page: 1978
  year: 2017
  ident: 10.1016/j.comnet.2021.108465_b31
  article-title: A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications
  publication-title: Sensors
  doi: 10.3390/s17091978
– ident: 10.1016/j.comnet.2021.108465_b39
– volume: 11
  start-page: 202
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b18
  article-title: Lightweight security mechanism over MQTT protocol for IoT devices
  publication-title: Int. J. Adv. Comput. Sci. Appl.
– ident: 10.1016/j.comnet.2021.108465_b24
  doi: 10.1109/COMSNETS.2019.8711402
– ident: 10.1016/j.comnet.2021.108465_b55
– volume: 2
  start-page: 113
  year: 2017
  ident: 10.1016/j.comnet.2021.108465_b21
  article-title: Investigating energy consumption and performance trade-off for interactive cloud application
  publication-title: IEEE Trans. Sustain. Comput.
  doi: 10.1109/TSUSC.2017.2714959
– ident: 10.1016/j.comnet.2021.108465_b59
– ident: 10.1016/j.comnet.2021.108465_b41
– year: 2004
  ident: 10.1016/j.comnet.2021.108465_b48
– start-page: 13
  year: 2012
  ident: 10.1016/j.comnet.2021.108465_b9
  article-title: Fog computing and its role in the internet of things
  publication-title: Eur. Phys. J. B
– volume: 8
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b8
  article-title: Optimizing energy consumption for cloud internet of things
  publication-title: Front. Phys.
  doi: 10.3389/fphy.2020.00358
– volume: 15
  start-page: 14
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b14
  article-title: Securing communication between fog computing and iot using constrained application protocol (coap): A survey
  publication-title: J. Commun.
  doi: 10.12720/jcm.15.1.14-30
– volume: 5
  start-page: 22313
  year: 2017
  ident: 10.1016/j.comnet.2021.108465_b27
  article-title: A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2757844
– year: 2021
  ident: 10.1016/j.comnet.2021.108465_b19
  article-title: Lightweight encryption technique to enhance medical image security on internet of medical things applications
  publication-title: IEEE Access
– year: 2005
  ident: 10.1016/j.comnet.2021.108465_b51
– volume: 127
  start-page: 18
  year: 2019
  ident: 10.1016/j.comnet.2021.108465_b11
  article-title: Publish/subscribe based multi-tier edge computational model in internet of things for latency reduction
  publication-title: J. Parallel Distrib. Comput.
  doi: 10.1016/j.jpdc.2019.01.004
– volume: 7
  start-page: 5481
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b15
  article-title: A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.2981005
– volume: 8
  start-page: 139244
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b22
  article-title: A secure and reliable device access control scheme for IoT based sensor cloud systems
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3012121
– volume: 5
  start-page: 141
  year: 2015
  ident: 10.1016/j.comnet.2021.108465_b46
  article-title: Fast prime field elliptic-curve cryptography with 256-bit primes
  publication-title: J. Cryptogr. Eng.
  doi: 10.1007/s13389-014-0090-x
– ident: 10.1016/j.comnet.2021.108465_b40
  doi: 10.1109/WF-IoT.2016.7845414
– ident: 10.1016/j.comnet.2021.108465_b56
– volume: 11
  year: 2015
  ident: 10.1016/j.comnet.2021.108465_b63
  article-title: ESSE: efficient secure session establishment for internet-integrated wireless sensor networks
  publication-title: Int. J. Distrib. Sens. Netw.
  doi: 10.1155/2015/393754
– volume: 2020
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b6
  article-title: Protect mobile travelers information in sensitive region based on fuzzy logic in IoT technology
  publication-title: Secur. Commun. Netw.
  doi: 10.1155/2020/8897098
– ident: 10.1016/j.comnet.2021.108465_b28
  doi: 10.1109/TrustCom.2014.31
– ident: 10.1016/j.comnet.2021.108465_b38
  doi: 10.1109/FTC.2016.7821693
– volume: 18
  start-page: 2660
  year: 2018
  ident: 10.1016/j.comnet.2021.108465_b13
  article-title: Design, implementation and practical evaluation of an IoT home automation system for fog computing applications based on MQTT and ZigBee-WiFi sensor nodes
  publication-title: Sensors
  doi: 10.3390/s18082660
– ident: 10.1016/j.comnet.2021.108465_b37
  doi: 10.1109/ICoAC48765.2019.246840
– ident: 10.1016/j.comnet.2021.108465_b42
– ident: 10.1016/j.comnet.2021.108465_b61
– volume: 13
  start-page: 338
  year: 2021
  ident: 10.1016/j.comnet.2021.108465_b5
  article-title: A systematic review on cognitive radio in low Power Wide Area network for industrial IoT applications
  publication-title: Sustainability
  doi: 10.3390/su13010338
– ident: 10.1016/j.comnet.2021.108465_b29
  doi: 10.1109/ISC246665.2019.9071788
– volume: 87
  start-page: 688
  year: 2018
  ident: 10.1016/j.comnet.2021.108465_b26
  article-title: Flexible IoT security middleware for end-to-end cloud–fog communication
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.12.031
– volume: 8
  start-page: 60539
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b34
  article-title: Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2983117
– ident: 10.1016/j.comnet.2021.108465_b57
– ident: 10.1016/j.comnet.2021.108465_b50
  doi: 10.23919/DATE.2017.7927078
– volume: 63
  start-page: 2513
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b20
  article-title: Security vulnerabilities, attacks, threats and the proposed countermeasures for the internet of things applications
  publication-title: Solid State Technol.
– volume: 11
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b53
  article-title: Designing a SHA-256 processor for blockchain-based IoT applications
  publication-title: Internet Things
  doi: 10.1016/j.iot.2020.100254
– year: 2015
  ident: 10.1016/j.comnet.2021.108465_b52
– volume: 77
  start-page: 4056
  year: 2021
  ident: 10.1016/j.comnet.2021.108465_b33
  article-title: Toward the inclusion of end-to-end security in the OM2m platform
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-020-03415-7
– start-page: 1
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b47
  article-title: Elliptic curve Diffie–Hellman cryptosystem in big data cloud security
  publication-title: Cluster Comput.
– volume: 20
  start-page: 6837
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b3
  article-title: Low Power Wide Area network, cognitive radio and the internet of things: Potentials for integration
  publication-title: Sensors
  doi: 10.3390/s20236837
– volume: 13
  start-page: 5777
  year: 2020
  ident: 10.1016/j.comnet.2021.108465_b30
  article-title: Client-aware negotiation for secure and efficient data transmission
  publication-title: Energies
  doi: 10.3390/en13215777
– ident: 10.1016/j.comnet.2021.108465_b36
  doi: 10.1109/MetroInd4.0IoT48571.2020.9138303
– ident: 10.1016/j.comnet.2021.108465_b60
SSID ssj0004428
Score 2.5442717
Snippet The Internet of Things (IoT) has converged with Cloud computing to provide comprehensive services to users in different places. However, with the exponential...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 108465
SubjectTerms Algorithms
Authentication
Cloud computing
Computer architecture
Computer networks
Curves
Cybersecurity
Electronic devices
Elliptic Curve Diffie–Hellman Ephemeral
Fog computing
Gateways
Internet of Things
Internet of Things (IoT)
Lightweight
Lightweight authentication
Network latency
Perfect forward secrecy
Performance evaluation
Pre-shared keys
Response time (computers)
Secrecy aspects
Security
Telemetry
Title Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model
URI https://dx.doi.org/10.1016/j.comnet.2021.108465
https://www.proquest.com/docview/2606198215
Volume 199
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1872-7069
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0004428
  issn: 1389-1286
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  customDbUrl:
  eissn: 1872-7069
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0004428
  issn: 1389-1286
  databaseCode: ACRLP
  dateStart: 19990114
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection
  customDbUrl:
  eissn: 1872-7069
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0004428
  issn: 1389-1286
  databaseCode: .~1
  dateStart: 19990114
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals [SCFCJ]
  customDbUrl:
  eissn: 1872-7069
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0004428
  issn: 1389-1286
  databaseCode: AIKHN
  dateStart: 19990114
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1872-7069
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0004428
  issn: 1389-1286
  databaseCode: AKRWK
  dateStart: 19990114
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZQWWBAPEV5yQOrqVo7djIiRNVSYIBWsFm246AiGioaxIb4D_xDfgl3TsJLSEgMURTn4kRn-175zkfIvjHWtZWxzEVRxkQaRyzOZMqUSBMD-tdziwH9s3PZG4mT6-h6jhzVuTAIq6xkfynTg7SuWloVN1vT8bh1GX6xdcAix03PQAtiBruQCOs7eP6EeQgR6qsiMUPqOn0uYLyg79wjorLTRrCdQBXzu3r6IaiD9ukuk6XKbKSH5ZetkDmfr5LFL5sJrpHJKfrZTyHUSU2e0hmG0j01iGHPiyo2R8Gb9RNPwVal_fshzUsYOEVtllK4Py3jUm8vr7NSplgkvqEulH-AN9FQPGedjLrHw6Meq4opMMe5KFiUeMVN7MAfBhcjUYmC9WwzaLYxjIjjqQUKG_uOi7yVSZbyTMjYS-eld1zxDdLI73O_SWjKhfVcGZHBYlaRhEE1WQxHxmXbSt8kvOahdtVO41jw4k7XkLJbXXJeI-d1yfkmYR9PTcudNv6gV_Xw6G8zRoMy-OPJnXo0dbViZxr8OvAlY7CAtv7d8TZZwKuQqpjskEbx8Oh3wWYp7F6YlHtk_rA_6J3jeXBxNXgHgX3wzg
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR27TsMw8ARlAAbEU7zxwGpVrR07GVFF1ULpQpHYLNtxEAjSihax8g_8IV_C2XF4CQmJIYt9dqI7-165B8Cx1sa2pDbUJklBeZ4mNC1ETiXPM43y1zHjHfoXQ9G74mfXyfUcdOpcGB9WGXl_xdMDt44jzYjN5uT2tnkZfrG1USP3Rc9QCs7DAk-QJzdg4aR_3ht-pkfy0GLVw1O_oM6gC2FeuH3pfFBlu-Xj7biXMr9LqB-8Ogig7iqsRM2RnFQftwZzrlyH5S_1BDfgYeBN7efg7SS6zMnUe9Md0T6MvZxF9xxBg9Y9OILqKumPR6SsIsGJF2g5wflJ5Zp6e3mdVmzFeOAbYkMHCHwTCf1zNuGqezrq9Gjsp0AtY3xGk8xJplOLJjFaGZnMJF5pU-CwSZEoluUGIUzq2jZxRmRFzgouUiesE84yybagUY5Ltw0kZ9w4JjUv8D7LRCBddZHiUzDRMsLtAKtxqGwsNu57XtyrOqrsTlWYVx7zqsL8DtCPVZOq2MYf8LImj_p2aBTKgz9W7tfUVPHSThWadmhOpqgE7f574yNY7I0uBmrQH57vwZKfCZmL2T40Zo9P7gBVmJk5jEf0HSAg8dY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Lightweight+and+secure+authentication+scheme+for+IoT+network+based+on+publish%E2%80%93subscribe+fog+computing+model&rft.jtitle=Computer+networks+%28Amsterdam%2C+Netherlands+%3A+1999%29&rft.au=Amanlou%2C+Sanaz&rft.au=Hasan%2C+Mohammad+Kamrul&rft.au=Bakar%2C+Khairul+Azmi+Abu&rft.date=2021-11-09&rft.pub=Elsevier+Sequoia+S.A&rft.issn=1389-1286&rft.eissn=1872-7069&rft.volume=199&rft.spage=1&rft_id=info:doi/10.1016%2Fj.comnet.2021.108465&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1389-1286&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1389-1286&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1389-1286&client=summon