Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model
The Internet of Things (IoT) has converged with Cloud computing to provide comprehensive services to users in different places. However, with the exponential growth of smart devices connected to the Internet, Cloud computing has severe challenges, especially for applications that require low-latency...
Saved in:
Published in | Computer networks (Amsterdam, Netherlands : 1999) Vol. 199; p. 108465 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Amsterdam
Elsevier B.V
09.11.2021
Elsevier Sequoia S.A |
Subjects | |
Online Access | Get full text |
ISSN | 1389-1286 1872-7069 |
DOI | 10.1016/j.comnet.2021.108465 |
Cover
Abstract | The Internet of Things (IoT) has converged with Cloud computing to provide comprehensive services to users in different places. However, with the exponential growth of smart devices connected to the Internet, Cloud computing has severe challenges, especially for applications that require low-latency and real-time processing. Therefore, the Fog computing paradigm emerged that is more compatible with the IoT, in which events are processed near where they occurred for practical and quick response time. Authentication is an essential issue for fog computing security since fog gateways and IoT devices are subject to many attacks. The main problem to provide authentication between IoT devices is that they have limited resources and computational processing. On the one hand, certificate-based authentication algorithms are secure, but they are heavy for IoT devices. On the other hand, Pre-shared authentication algorithms such as PSK are suitable for low-resource devices, but are not widely used due to their low security. Therefore, this paper proposes to use the Elliptic Curve Diffie–Hellman Ephemeral (ECDHE) key exchange algorithm along with the Pre-Shared Key (PSK) as a lightweight and secure authentication scheme between the fog gateway and IoT device based on the Message Queuing Telemetry Transport (MQTT) publish–subscribe protocol in a distributed fog computing architecture. The proposed ECDHE-PSK authentication scheme uses Ephemeral Pre-shared key instead of heavy certificates that is very lightweight and also provides Perfect Forward Secrecy (PFS) feature to enhance security in comparison with the static PSK algorithm. To evaluate the resource consumption and security resistance of the proposed scheme it was implemented on the real test environment and then was compared with two state-of-the-art certificate-based authentication schemes and a static PSK-based scheme. The comprehensive performance and security evaluations showed that in the distributed publish–subscribe fog computing architecture the proposed ECDHE-PSK is almost as light as the PSK algorithm while has all security features of certificate-based algorithms. |
---|---|
AbstractList | The Internet of Things (IoT) has converged with Cloud computing to provide comprehensive services to users in different places. However, with the exponential growth of smart devices connected to the Internet, Cloud computing has severe challenges, especially for applications that require low-latency and real-time processing. Therefore, the Fog computing paradigm emerged that is more compatible with the IoT, in which events are processed near where they occurred for practical and quick response time. Authentication is an essential issue for fog computing security since fog gateways and IoT devices are subject to many attacks. The main problem to provide authentication between IoT devices is that they have limited resources and computational processing. On the one hand, certificate-based authentication algorithms are secure, but they are heavy for IoT devices. On the other hand, Pre-shared authentication algorithms such as PSK are suitable for low-resource devices, but are not widely used due to their low security. Therefore, this paper proposes to use the Elliptic Curve Diffie–Hellman Ephemeral (ECDHE) key exchange algorithm along with the Pre-Shared Key (PSK) as a lightweight and secure authentication scheme between the fog gateway and IoT device based on the Message Queuing Telemetry Transport (MQTT) publish–subscribe protocol in a distributed fog computing architecture. The proposed ECDHE-PSK authentication scheme uses Ephemeral Pre-shared key instead of heavy certificates that is very lightweight and also provides Perfect Forward Secrecy (PFS) feature to enhance security in comparison with the static PSK algorithm. To evaluate the resource consumption and security resistance of the proposed scheme it was implemented on the real test environment and then was compared with two state-of-the-art certificate-based authentication schemes and a static PSK-based scheme. The comprehensive performance and security evaluations showed that in the distributed publish–subscribe fog computing architecture the proposed ECDHE-PSK is almost as light as the PSK algorithm while has all security features of certificate-based algorithms. |
ArticleNumber | 108465 |
Author | Amanlou, Sanaz Hasan, Mohammad Kamrul Bakar, Khairul Azmi Abu |
Author_xml | – sequence: 1 givenname: Sanaz orcidid: 0000-0001-5736-3273 surname: Amanlou fullname: Amanlou, Sanaz email: sanaz.amanlou@gmail.com – sequence: 2 givenname: Mohammad Kamrul orcidid: 0000-0001-5511-0205 surname: Hasan fullname: Hasan, Mohammad Kamrul email: mkhasan@ukm.edu.my, hasankamrul@ieee.org – sequence: 3 givenname: Khairul Azmi Abu orcidid: 0000-0002-0575-2100 surname: Bakar fullname: Bakar, Khairul Azmi Abu |
BookMark | eNqFUMtOwzAQtFCRoIU_4GCJc4odp47DAQkhHpUqcYGzFTub1qWxi-2AuPEP_CFfgks4cYDL7mp3ZndnxmhknQWETiiZUkL52XqqXWchTnOS09QSBZ_toUMqyjwrCa9GqWaiymgu-AEah7AmhBRFLg5RtzDLVXyFXcS1bXAA3XvAdR9XYKPRdTTO4qBX0AFuncdz94DTrVfnn7CqAzQ4zbe92piw-nz_CL0K2hu1Ay9x-mvbR2OXuHMNbI7QfltvAhz_5Al6vLl-uLrLFve386vLRaYZK2I2q6BktdAk6Sh5VVYlIUy1qa1EAUyzRiWEEpDrGShetQ1rCy6Aa-CgWckm6HTYu_XuuYcQ5dr13qaTMueE00rkdJZQ5wNKexeCh1ZqE7_1Rl-bjaRE7uyVaznYK3f2ysHeRC5-kbfedLV_-492MdAgyX8x4GXQBqyGxnjQUTbO_L3gC-wTm5w |
CitedBy_id | crossref_primary_10_3390_s23249692 crossref_primary_10_1109_TSC_2024_3382950 crossref_primary_10_1155_2022_9065768 crossref_primary_10_3390_s22062100 crossref_primary_10_1155_2022_7125491 crossref_primary_10_1155_2022_8750840 crossref_primary_10_69955_ajoeee_24_v4i2_62 crossref_primary_10_1002_spe_3392 crossref_primary_10_1007_s00607_023_01208_3 crossref_primary_10_1016_j_comnet_2023_109844 crossref_primary_10_1155_2022_3804553 crossref_primary_10_1109_TII_2022_3197201 crossref_primary_10_1109_ACCESS_2023_3290906 crossref_primary_10_32604_cmc_2025_060372 crossref_primary_10_3390_app14156407 crossref_primary_10_1016_j_jnca_2024_103922 crossref_primary_10_37391_IJEER_120115 crossref_primary_10_1155_2021_8567894 crossref_primary_10_1002_ett_4957 crossref_primary_10_1007_s12083_024_01843_3 crossref_primary_10_1155_2023_9731239 crossref_primary_10_1016_j_micpro_2024_105088 crossref_primary_10_1111_exsy_13603 crossref_primary_10_1049_cmu2_12301 crossref_primary_10_32604_cmc_2024_049017 crossref_primary_10_26599_TST_2024_9010005 crossref_primary_10_1016_j_measen_2024_101057 crossref_primary_10_3390_sym16020171 crossref_primary_10_1016_j_comcom_2023_07_012 crossref_primary_10_1155_2022_2650742 crossref_primary_10_1016_j_compeleceng_2023_108715 crossref_primary_10_3390_app122211650 crossref_primary_10_1109_TCE_2023_3332133 crossref_primary_10_1016_j_gltp_2022_04_015 crossref_primary_10_37391_10_37391_IJEER_120115 crossref_primary_10_1109_ACCESS_2024_3393567 crossref_primary_10_1016_j_comnet_2022_109354 crossref_primary_10_3390_app12147173 crossref_primary_10_1007_s10586_021_03461_7 crossref_primary_10_3390_en16052487 crossref_primary_10_1007_s10207_023_00762_3 crossref_primary_10_1049_cmu2_12315 crossref_primary_10_1049_cit2_12200 crossref_primary_10_3390_s22197391 |
Cites_doi | 10.1016/j.comnet.2010.05.010 10.1109/TII.2019.2963328 10.1109/ACCESS.2018.2844406 10.1109/SAHCN.2014.6990364 10.1016/j.procs.2018.04.064 10.1007/s10796-014-9492-7 10.1016/j.jpdc.2019.10.009 10.1145/2789116.2802650 10.1109/WTS.2016.7482039 10.3390/sym12101674 10.1109/ACCESS.2020.3030192 10.3390/fi11030066 10.17576/apjitm-2018-0702(02)-05 10.1109/ACCESS.2020.3024964 10.3390/s17091978 10.1109/COMSNETS.2019.8711402 10.1109/TSUSC.2017.2714959 10.3389/fphy.2020.00358 10.12720/jcm.15.1.14-30 10.1109/ACCESS.2017.2757844 10.1016/j.jpdc.2019.01.004 10.1109/JIOT.2020.2981005 10.1109/ACCESS.2020.3012121 10.1007/s13389-014-0090-x 10.1109/WF-IoT.2016.7845414 10.1155/2015/393754 10.1155/2020/8897098 10.1109/TrustCom.2014.31 10.1109/FTC.2016.7821693 10.3390/s18082660 10.1109/ICoAC48765.2019.246840 10.3390/su13010338 10.1109/ISC246665.2019.9071788 10.1016/j.future.2017.12.031 10.1109/ACCESS.2020.2983117 10.23919/DATE.2017.7927078 10.1016/j.iot.2020.100254 10.1007/s11227-020-03415-7 10.3390/s20236837 10.3390/en13215777 10.1109/MetroInd4.0IoT48571.2020.9138303 |
ContentType | Journal Article |
Copyright | 2021 Elsevier B.V. Copyright Elsevier Sequoia S.A. Nov 9, 2021 |
Copyright_xml | – notice: 2021 Elsevier B.V. – notice: Copyright Elsevier Sequoia S.A. Nov 9, 2021 |
DBID | AAYXX CITATION 7SC 8FD E3H F2A JQ2 L7M L~C L~D |
DOI | 10.1016/j.comnet.2021.108465 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Library and Information Science Abstracts (LISA) ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1872-7069 |
ExternalDocumentID | 10_1016_j_comnet_2021_108465 S1389128621004175 |
GrantInformation_xml | – fundername: Universiti Kebangsaan Malaysia (UKM) grantid: FRGS/1/2020/ICT03/UKM/02/6; GGPM-2017-021 funderid: http://dx.doi.org/10.13039/501100004515 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5GY 5VS 6OB 7-5 71M 77K 8P~ AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABMAC ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EO8 EO9 EP2 EP3 FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF IHE J1W JJJVA KOM M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. PQQKQ Q38 ROL RPZ RXW SDF SDG SDP SES SPC SPCBC SST SSV SSZ T5K TAE TN5 ZMT ~G- 29F 77I AATTM AAXKI AAYWO AAYXX ABFNM ABJNI ABXDB ACLOT ACNNM ACVFH ADCNI ADJOM AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS EJD F0J FGOYB HZ~ R2- SEW ZY4 ~HD 7SC 8FD AFXIZ AGCQF AGRNS BNPGV E3H F2A JQ2 L7M L~C L~D SSH |
ID | FETCH-LOGICAL-c334t-59e73a8c0465769797003bf59eb84e3c3db9e7b8e2c5eb69fd3f468e6ce6ec373 |
IEDL.DBID | .~1 |
ISSN | 1389-1286 |
IngestDate | Mon Jul 14 08:08:31 EDT 2025 Wed Oct 01 04:06:53 EDT 2025 Thu Apr 24 23:08:40 EDT 2025 Fri Feb 23 02:42:39 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Fog computing Lightweight authentication Internet of Things (IoT) Pre-shared keys Elliptic Curve Diffie–Hellman Ephemeral Security Perfect forward secrecy |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c334t-59e73a8c0465769797003bf59eb84e3c3db9e7b8e2c5eb69fd3f468e6ce6ec373 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-0575-2100 0000-0001-5736-3273 0000-0001-5511-0205 |
PQID | 2606198215 |
PQPubID | 47119 |
ParticipantIDs | proquest_journals_2606198215 crossref_citationtrail_10_1016_j_comnet_2021_108465 crossref_primary_10_1016_j_comnet_2021_108465 elsevier_sciencedirect_doi_10_1016_j_comnet_2021_108465 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-11-09 |
PublicationDateYYYYMMDD | 2021-11-09 |
PublicationDate_xml | – month: 11 year: 2021 text: 2021-11-09 day: 09 |
PublicationDecade | 2020 |
PublicationPlace | Amsterdam |
PublicationPlace_xml | – name: Amsterdam |
PublicationTitle | Computer networks (Amsterdam, Netherlands : 1999) |
PublicationYear | 2021 |
Publisher | Elsevier B.V Elsevier Sequoia S.A |
Publisher_xml | – name: Elsevier B.V – name: Elsevier Sequoia S.A |
References | Fabricio, Liang (b22) 2020; 8 Diro, Reda, Chilamkurti, A.Mahmood, Nam (b34) 2020; 8 Onumanyi, Abu-Mahfouz, Hancke (b3) 2020; 20 Mo, Liang, Xing, Liao, Liu (b7) 2020; 8 Alhaidari, Alqahtani (b14) 2020; 15 Suárez-Albela, Fernández-Caramés, Fraga-Lamas, Castedo (b31) 2017; 17 Udoo neo Subramanian, Tamilselvan (b47) 2020 Ubuntu mate 18.04: Linux for odroid board M.A. Jan, P. Nanda, X. He, Z. Tan, R.P. Liu, A robust authentication scheme for observing resources in the internet of things environment, in: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014, pp. 1294–1298. L. Bondi, L. Baroffio, M. Cesana, A.E. Redondi, M. Tagliasacchi, Open-source and flexible framework for visual sensor networks, in: Proceedings of the 9th International Conference on Distributed Smart Cameras, 2015, pp. 197–198. R. Hummen, H. Shafagh, S. Raza, T. Voig, K. Wehrle, Delegation-based authentication and authorization for the IP-based internet of things, in: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking(SECON), 2014, pp. 284–292. Patonico, Nguyen, Shabisha, Braeken, Steenhaut (b33) 2021; 77 Odroid-c1 L. Loffi, C.M. Westphall, L.D. Grüdtner, C.B. Westphall, Mutual authentication for IoT in the context of fog computing, in: 2019 11th International Conference on Communication Systems & Networks (COMSNETS), 2019, pp. 67–374. A. Erroutbi, A. El Hanjri, A. Sekkaki, Secure and lightweight HMAC mutual authentication protocol for communication between IoT devices and fog nodes, in: 2019 IEEE International Smart Cities Conference (ISC2), 2019, pp. 251–257. Kang, Park, Kwon, Jung (b63) 2015; 11 Raspbian pi os lite The intel edison module iot Hassan, Qamar, Hasan, Aman, Ahmed (b4) 2020; 12 Bonomi, Milito, Zhu, Addepalli (b9) 2012 Barken, Bermel, Eder, Fanady, Mee, Palumbo, Keobrick (b48) 2004 F. De Santis, A. Schauer, G. Sigl, ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications, in: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pp. 692–697. Jaloudi (b12) 2019; 11 S.J. Johnston, M. Apetroaie-Cristea, M. Scott, S.J. Cox, Applicability of commodity, low cost, single board computers for Internet of Things devices, in: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, pp. 141–146. Raspberry pi zero w Memon, Shaikh, Hasan, Hassan, Haq, Zainol (b6) 2020; 2020 Mukherjee, Wang, Lu, Neupane, Dunn, Ren, Su, Calyam (b26) 2018; 87 Kamil, Ayob, Sheikhabdullah, Ahmad (b25) 2018; 7 Mughal, Luo, Ullah, Ullah, Mahmood (b17) 2018; 6 R. Narayanan, S. Jayashree, N.D. Philips, A. Saranya, S.B. Prathiba, G. Raja, TLS cipher suite: Secure communication of 6LoWPAN devices, in: 2019 11th International Conference on Advanced Computing (ICoAC), 2019, pp. 197–203. S. Forsström, U. Jennehag, X. Guan, A plain low threshold IoT platform for enabling new IoT products from SMEs, in: 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2020, pp. 390–394. Turner (b52) 2015 Hasan, Islam, Sulaiman, Khan, Hashim, Habib, Islam, Alyahya, Ahmed, Kamil, Hassan (b19) 2021 Ahmed, Hasan, Saeed, Hassan, Islam, Mokhtar, Khan, Akhtaruzzaman (b8) 2020; 8 Ghazal, Hasan, Hassan, Islam, Abdullah, Afifi, Kalra (b20) 2020; 63 Nurelmadina, Hasan, Memon, Saeed, Zainol Ariffin, Ali, Mokhtar, Islam, Hossain, Hassan (b5) 2021; 13 Al Hamid, Rahman, Hossain, Almogren, Alamri (b27) 2017; 5 New generation of libelium product lines Amnalou, Bakar (b18) 2020; 11 A. Raza, A.A. Ikram, A. Amin, A.J. Ikram, A review of low cost and power efficient development boards for IoT applications, in: 2016 Future Technologies Conference (FTC), 2016, pp. 786–790. Haseeb, Din, Almogren, Jan, Abbas, Adnan (b23) 2020; 8 Polk, McKay, Chokhani (b54) 2014; 800 Hasan, Alvares, Ledoux, Pazat (b21) 2017; 2 Liang, Zhang, Leung (b15) 2020; 7 Veeramanikandan, Sankaranarayanan (b11) 2019; 127 Wang, Mei, Jia, Zheng, Wang, Xie (b10) 2020; 136 Cortex-a series family Moosavi, Nigussie, Levorato, Virtanen, Isoaho (b32) 2018; 130 Li, Da Xu, Zhao (b2) 2015; 17 H. Khemissa, D. Tandjaoui, A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things, in: 2016 Wireless Telecommunications Symposium (WTS), 2016, pp. 1–6. Gueron, Krasnov (b46) 2015; 5 Atzori, Iera, Morabito (b1) 2010; 54 Wang, Chen, Wu (b30) 2020; 13 Froiz-Míguez, Fernández-Caramés, Fraga-Lamas, Castedo (b13) 2018; 18 accessed on 10 2020. Bernstein (b51) 2005 Udoo x86 Yang, He, Tian, Zhou (b45) 2019; 16 Teltonika rut230 ap- router Nir, Langley (b49) 2015 Martino, Cilardo (b53) 2020; 11 Amlogic s805 datasheet Kodali, Budwal, Patel, Sarma (b16) 2013 10.1016/j.comnet.2021.108465_b55 10.1016/j.comnet.2021.108465_b56 Bernstein (10.1016/j.comnet.2021.108465_b51) 2005 10.1016/j.comnet.2021.108465_b57 10.1016/j.comnet.2021.108465_b58 Alhaidari (10.1016/j.comnet.2021.108465_b14) 2020; 15 Liang (10.1016/j.comnet.2021.108465_b15) 2020; 7 Li (10.1016/j.comnet.2021.108465_b2) 2015; 17 10.1016/j.comnet.2021.108465_b50 Memon (10.1016/j.comnet.2021.108465_b6) 2020; 2020 Yang (10.1016/j.comnet.2021.108465_b45) 2019; 16 Nir (10.1016/j.comnet.2021.108465_b49) 2015 Martino (10.1016/j.comnet.2021.108465_b53) 2020; 11 Veeramanikandan (10.1016/j.comnet.2021.108465_b11) 2019; 127 10.1016/j.comnet.2021.108465_b62 Onumanyi (10.1016/j.comnet.2021.108465_b3) 2020; 20 Amnalou (10.1016/j.comnet.2021.108465_b18) 2020; 11 10.1016/j.comnet.2021.108465_b24 Bonomi (10.1016/j.comnet.2021.108465_b9) 2012 Wang (10.1016/j.comnet.2021.108465_b30) 2020; 13 Fabricio (10.1016/j.comnet.2021.108465_b22) 2020; 8 Hassan (10.1016/j.comnet.2021.108465_b4) 2020; 12 10.1016/j.comnet.2021.108465_b60 10.1016/j.comnet.2021.108465_b61 Turner (10.1016/j.comnet.2021.108465_b52) 2015 10.1016/j.comnet.2021.108465_b59 Polk (10.1016/j.comnet.2021.108465_b54) 2014; 800 Ghazal (10.1016/j.comnet.2021.108465_b20) 2020; 63 Atzori (10.1016/j.comnet.2021.108465_b1) 2010; 54 Mughal (10.1016/j.comnet.2021.108465_b17) 2018; 6 10.1016/j.comnet.2021.108465_b35 Haseeb (10.1016/j.comnet.2021.108465_b23) 2020; 8 10.1016/j.comnet.2021.108465_b36 Kodali (10.1016/j.comnet.2021.108465_b16) 2013 Gueron (10.1016/j.comnet.2021.108465_b46) 2015; 5 Kamil (10.1016/j.comnet.2021.108465_b25) 2018; 7 Mo (10.1016/j.comnet.2021.108465_b7) 2020; 8 Jaloudi (10.1016/j.comnet.2021.108465_b12) 2019; 11 Ahmed (10.1016/j.comnet.2021.108465_b8) 2020; 8 Hasan (10.1016/j.comnet.2021.108465_b21) 2017; 2 10.1016/j.comnet.2021.108465_b28 10.1016/j.comnet.2021.108465_b29 10.1016/j.comnet.2021.108465_b40 10.1016/j.comnet.2021.108465_b41 10.1016/j.comnet.2021.108465_b42 Kang (10.1016/j.comnet.2021.108465_b63) 2015; 11 10.1016/j.comnet.2021.108465_b43 10.1016/j.comnet.2021.108465_b44 Froiz-Míguez (10.1016/j.comnet.2021.108465_b13) 2018; 18 Suárez-Albela (10.1016/j.comnet.2021.108465_b31) 2017; 17 Al Hamid (10.1016/j.comnet.2021.108465_b27) 2017; 5 Subramanian (10.1016/j.comnet.2021.108465_b47) 2020 Wang (10.1016/j.comnet.2021.108465_b10) 2020; 136 Mukherjee (10.1016/j.comnet.2021.108465_b26) 2018; 87 Nurelmadina (10.1016/j.comnet.2021.108465_b5) 2021; 13 10.1016/j.comnet.2021.108465_b37 10.1016/j.comnet.2021.108465_b38 Hasan (10.1016/j.comnet.2021.108465_b19) 2021 10.1016/j.comnet.2021.108465_b39 Patonico (10.1016/j.comnet.2021.108465_b33) 2021; 77 Diro (10.1016/j.comnet.2021.108465_b34) 2020; 8 Barken (10.1016/j.comnet.2021.108465_b48) 2004 Moosavi (10.1016/j.comnet.2021.108465_b32) 2018; 130 |
References_xml | – volume: 12 start-page: 1674 year: 2020 ident: b4 article-title: Internet of things and its applications: A comprehensive survey publication-title: Symmetry – reference: R. Hummen, H. Shafagh, S. Raza, T. Voig, K. Wehrle, Delegation-based authentication and authorization for the IP-based internet of things, in: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking(SECON), 2014, pp. 284–292. – start-page: 352 year: 2013 end-page: 356 ident: b16 article-title: Fuzzy controlled scalar multiplication for ECC publication-title: IEEE 2013 Tencon-Spring – volume: 15 start-page: 14 year: 2020 end-page: 30 ident: b14 article-title: Securing communication between fog computing and iot using constrained application protocol (coap): A survey publication-title: J. Commun. – volume: 11 start-page: 66 year: 2019 ident: b12 article-title: Communication protocols of an industrial internet of things environment: A comparative study publication-title: Future Internet – volume: 11 start-page: 202 year: 2020 end-page: 207 ident: b18 article-title: Lightweight security mechanism over MQTT protocol for IoT devices publication-title: Int. J. Adv. Comput. Sci. Appl. – volume: 17 start-page: 243 year: 2015 end-page: 259 ident: b2 article-title: The internet of things: a survey publication-title: Inf. Syst. Front. – volume: 5 start-page: 141 year: 2015 end-page: 151 ident: b46 article-title: Fast prime field elliptic-curve cryptography with 256-bit primes publication-title: J. Cryptogr. Eng. – reference: , accessed on 10 2020. – volume: 17 start-page: 1978 year: 2017 ident: b31 article-title: A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications publication-title: Sensors – volume: 2020 year: 2020 ident: b6 article-title: Protect mobile travelers information in sensitive region based on fuzzy logic in IoT technology publication-title: Secur. Commun. Netw. – volume: 136 start-page: 75 year: 2020 end-page: 85 ident: b10 article-title: Edge-based differential privacy computing for sensor–cloud systems publication-title: J. Parallel Distrib. Comput. – reference: Cortex-a series family, – volume: 20 start-page: 6837 year: 2020 ident: b3 article-title: Low Power Wide Area network, cognitive radio and the internet of things: Potentials for integration publication-title: Sensors – volume: 77 start-page: 4056 year: 2021 end-page: 4080 ident: b33 article-title: Toward the inclusion of end-to-end security in the OM2m platform publication-title: J. Supercomput. – volume: 8 start-page: 60539 year: 2020 end-page: 60551 ident: b34 article-title: Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication publication-title: IEEE Access – volume: 63 start-page: 2513 year: 2020 end-page: 2521 ident: b20 article-title: Security vulnerabilities, attacks, threats and the proposed countermeasures for the internet of things applications publication-title: Solid State Technol. – volume: 2 start-page: 113 year: 2017 end-page: 126 ident: b21 article-title: Investigating energy consumption and performance trade-off for interactive cloud application publication-title: IEEE Trans. Sustain. Comput. – volume: 130 start-page: 432 year: 2018 end-page: 439 ident: b32 article-title: Performance analysis of end-to-end security schemes in healthcare IoT publication-title: Procedia Comput. Sci. – reference: Teltonika rut230 ap- router, – year: 2021 ident: b19 article-title: Lightweight encryption technique to enhance medical image security on internet of medical things applications publication-title: IEEE Access – reference: H. Khemissa, D. Tandjaoui, A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things, in: 2016 Wireless Telecommunications Symposium (WTS), 2016, pp. 1–6. – volume: 87 start-page: 688 year: 2018 end-page: 703 ident: b26 article-title: Flexible IoT security middleware for end-to-end cloud–fog communication publication-title: Future Gener. Comput. Syst. – reference: The intel edison module iot, – reference: Udoo x86, – volume: 11 year: 2020 ident: b53 article-title: Designing a SHA-256 processor for blockchain-based IoT applications publication-title: Internet Things – volume: 127 start-page: 18 year: 2019 end-page: 27 ident: b11 article-title: Publish/subscribe based multi-tier edge computational model in internet of things for latency reduction publication-title: J. Parallel Distrib. Comput. – volume: 13 start-page: 5777 year: 2020 ident: b30 article-title: Client-aware negotiation for secure and efficient data transmission publication-title: Energies – volume: 800 start-page: 32 year: 2014 ident: b54 article-title: Guidelines for the selection, configuration, and use of transport layer security (TLS) implementations publication-title: NIST Special Publication – reference: A. Raza, A.A. Ikram, A. Amin, A.J. Ikram, A review of low cost and power efficient development boards for IoT applications, in: 2016 Future Technologies Conference (FTC), 2016, pp. 786–790. – reference: Ubuntu mate 18.04: Linux for odroid board, – reference: M.A. Jan, P. Nanda, X. He, Z. Tan, R.P. Liu, A robust authentication scheme for observing resources in the internet of things environment, in: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014, pp. 1294–1298. – reference: Udoo neo, – reference: Odroid-c1, – reference: Raspberry pi zero w, – start-page: 13 year: 2012 end-page: 16 ident: b9 article-title: Fog computing and its role in the internet of things publication-title: Eur. Phys. J. B – volume: 8 start-page: 185752 year: 2020 end-page: 185760 ident: b23 article-title: Ddr-esc: a distributed and data reliability model for mobile edge-based sensor-cloud publication-title: IEEE Access – volume: 13 start-page: 338 year: 2021 ident: b5 article-title: A systematic review on cognitive radio in low Power Wide Area network for industrial IoT applications publication-title: Sustainability – reference: S.J. Johnston, M. Apetroaie-Cristea, M. Scott, S.J. Cox, Applicability of commodity, low cost, single board computers for Internet of Things devices, in: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, pp. 141–146. – reference: F. De Santis, A. Schauer, G. Sigl, ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications, in: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pp. 692–697. – reference: L. Loffi, C.M. Westphall, L.D. Grüdtner, C.B. Westphall, Mutual authentication for IoT in the context of fog computing, in: 2019 11th International Conference on Communication Systems & Networks (COMSNETS), 2019, pp. 67–374. – volume: 8 year: 2020 ident: b8 article-title: Optimizing energy consumption for cloud internet of things publication-title: Front. Phys. – volume: 6 start-page: 31630 year: 2018 end-page: 31643 ident: b17 article-title: A lightweight digital signature based security scheme for human-centered Internet of Things publication-title: IEEE Access – volume: 7 start-page: 53 year: 2018 end-page: 62 ident: b25 article-title: Challenges in multi-layer data security for video steganography revisited publication-title: Asia-Pacific J. Inf. Technol. Multimed – start-page: 1 year: 2020 end-page: 11 ident: b47 article-title: Elliptic curve Diffie–Hellman cryptosystem in big data cloud security publication-title: Cluster Comput. – reference: R. Narayanan, S. Jayashree, N.D. Philips, A. Saranya, S.B. Prathiba, G. Raja, TLS cipher suite: Secure communication of 6LoWPAN devices, in: 2019 11th International Conference on Advanced Computing (ICoAC), 2019, pp. 197–203. – reference: Amlogic s805 datasheet, – volume: 11 year: 2015 ident: b63 article-title: ESSE: efficient secure session establishment for internet-integrated wireless sensor networks publication-title: Int. J. Distrib. Sens. Netw. – volume: 5 start-page: 22313 year: 2017 end-page: 22328 ident: b27 article-title: A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography publication-title: IEEE Access – reference: A. Erroutbi, A. El Hanjri, A. Sekkaki, Secure and lightweight HMAC mutual authentication protocol for communication between IoT devices and fog nodes, in: 2019 IEEE International Smart Cities Conference (ISC2), 2019, pp. 251–257. – volume: 54 start-page: 2787 year: 2010 end-page: 2805 ident: b1 article-title: The internet of things: A survey publication-title: Comput. Netw. – reference: Raspbian pi os lite, – reference: New generation of libelium product lines, – year: 2004 ident: b48 article-title: Wireless Hacking – year: 2015 ident: b49 article-title: ChaCha20 and poly1305 for IETF protocols – year: 2005 ident: b51 article-title: The poly1305-AES message-authentication code – reference: L. Bondi, L. Baroffio, M. Cesana, A.E. Redondi, M. Tagliasacchi, Open-source and flexible framework for visual sensor networks, in: Proceedings of the 9th International Conference on Distributed Smart Cameras, 2015, pp. 197–198. – volume: 8 start-page: 177206 year: 2020 end-page: 177218 ident: b7 article-title: Network simplification and K-terminal reliability evaluation of sensor-cloud systems publication-title: IEEE Access – volume: 16 start-page: 6584 year: 2019 end-page: 6596 ident: b45 article-title: Faster authenticated key agreement with perfect forward secrecy for industrial Internet-of-Things publication-title: IEEE Trans. Ind. Inf. – volume: 7 start-page: 5481 year: 2020 end-page: 5490 ident: b15 article-title: A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud publication-title: IEEE Internet Things J. – volume: 18 start-page: 2660 year: 2018 ident: b13 article-title: Design, implementation and practical evaluation of an IoT home automation system for fog computing applications based on MQTT and ZigBee-WiFi sensor nodes publication-title: Sensors – reference: S. Forsström, U. Jennehag, X. Guan, A plain low threshold IoT platform for enabling new IoT products from SMEs, in: 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT, 2020, pp. 390–394. – year: 2015 ident: b52 article-title: Using SHA2 algorithms with cryptographic message syntax – volume: 8 start-page: 139244 year: 2020 end-page: 139254 ident: b22 article-title: A secure and reliable device access control scheme for IoT based sensor cloud systems publication-title: IEEE Access – volume: 54 start-page: 2787 year: 2010 ident: 10.1016/j.comnet.2021.108465_b1 article-title: The internet of things: A survey publication-title: Comput. Netw. doi: 10.1016/j.comnet.2010.05.010 – volume: 16 start-page: 6584 year: 2019 ident: 10.1016/j.comnet.2021.108465_b45 article-title: Faster authenticated key agreement with perfect forward secrecy for industrial Internet-of-Things publication-title: IEEE Trans. Ind. Inf. doi: 10.1109/TII.2019.2963328 – volume: 6 start-page: 31630 year: 2018 ident: 10.1016/j.comnet.2021.108465_b17 article-title: A lightweight digital signature based security scheme for human-centered Internet of Things publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2844406 – ident: 10.1016/j.comnet.2021.108465_b62 doi: 10.1109/SAHCN.2014.6990364 – start-page: 352 year: 2013 ident: 10.1016/j.comnet.2021.108465_b16 article-title: Fuzzy controlled scalar multiplication for ECC – volume: 130 start-page: 432 year: 2018 ident: 10.1016/j.comnet.2021.108465_b32 article-title: Performance analysis of end-to-end security schemes in healthcare IoT publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2018.04.064 – volume: 17 start-page: 243 year: 2015 ident: 10.1016/j.comnet.2021.108465_b2 article-title: The internet of things: a survey publication-title: Inf. Syst. Front. doi: 10.1007/s10796-014-9492-7 – volume: 136 start-page: 75 year: 2020 ident: 10.1016/j.comnet.2021.108465_b10 article-title: Edge-based differential privacy computing for sensor–cloud systems publication-title: J. Parallel Distrib. Comput. doi: 10.1016/j.jpdc.2019.10.009 – ident: 10.1016/j.comnet.2021.108465_b43 doi: 10.1145/2789116.2802650 – volume: 800 start-page: 32 year: 2014 ident: 10.1016/j.comnet.2021.108465_b54 article-title: Guidelines for the selection, configuration, and use of transport layer security (TLS) implementations – ident: 10.1016/j.comnet.2021.108465_b35 doi: 10.1109/WTS.2016.7482039 – volume: 12 start-page: 1674 year: 2020 ident: 10.1016/j.comnet.2021.108465_b4 article-title: Internet of things and its applications: A comprehensive survey publication-title: Symmetry doi: 10.3390/sym12101674 – ident: 10.1016/j.comnet.2021.108465_b58 – volume: 8 start-page: 185752 year: 2020 ident: 10.1016/j.comnet.2021.108465_b23 article-title: Ddr-esc: a distributed and data reliability model for mobile edge-based sensor-cloud publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3030192 – volume: 11 start-page: 66 year: 2019 ident: 10.1016/j.comnet.2021.108465_b12 article-title: Communication protocols of an industrial internet of things environment: A comparative study publication-title: Future Internet doi: 10.3390/fi11030066 – ident: 10.1016/j.comnet.2021.108465_b44 – year: 2015 ident: 10.1016/j.comnet.2021.108465_b49 – volume: 7 start-page: 53 year: 2018 ident: 10.1016/j.comnet.2021.108465_b25 article-title: Challenges in multi-layer data security for video steganography revisited publication-title: Asia-Pacific J. Inf. Technol. Multimed doi: 10.17576/apjitm-2018-0702(02)-05 – volume: 8 start-page: 177206 year: 2020 ident: 10.1016/j.comnet.2021.108465_b7 article-title: Network simplification and K-terminal reliability evaluation of sensor-cloud systems publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3024964 – volume: 17 start-page: 1978 year: 2017 ident: 10.1016/j.comnet.2021.108465_b31 article-title: A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications publication-title: Sensors doi: 10.3390/s17091978 – ident: 10.1016/j.comnet.2021.108465_b39 – volume: 11 start-page: 202 year: 2020 ident: 10.1016/j.comnet.2021.108465_b18 article-title: Lightweight security mechanism over MQTT protocol for IoT devices publication-title: Int. J. Adv. Comput. Sci. Appl. – ident: 10.1016/j.comnet.2021.108465_b24 doi: 10.1109/COMSNETS.2019.8711402 – ident: 10.1016/j.comnet.2021.108465_b55 – volume: 2 start-page: 113 year: 2017 ident: 10.1016/j.comnet.2021.108465_b21 article-title: Investigating energy consumption and performance trade-off for interactive cloud application publication-title: IEEE Trans. Sustain. Comput. doi: 10.1109/TSUSC.2017.2714959 – ident: 10.1016/j.comnet.2021.108465_b59 – ident: 10.1016/j.comnet.2021.108465_b41 – year: 2004 ident: 10.1016/j.comnet.2021.108465_b48 – start-page: 13 year: 2012 ident: 10.1016/j.comnet.2021.108465_b9 article-title: Fog computing and its role in the internet of things publication-title: Eur. Phys. J. B – volume: 8 year: 2020 ident: 10.1016/j.comnet.2021.108465_b8 article-title: Optimizing energy consumption for cloud internet of things publication-title: Front. Phys. doi: 10.3389/fphy.2020.00358 – volume: 15 start-page: 14 year: 2020 ident: 10.1016/j.comnet.2021.108465_b14 article-title: Securing communication between fog computing and iot using constrained application protocol (coap): A survey publication-title: J. Commun. doi: 10.12720/jcm.15.1.14-30 – volume: 5 start-page: 22313 year: 2017 ident: 10.1016/j.comnet.2021.108465_b27 article-title: A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2757844 – year: 2021 ident: 10.1016/j.comnet.2021.108465_b19 article-title: Lightweight encryption technique to enhance medical image security on internet of medical things applications publication-title: IEEE Access – year: 2005 ident: 10.1016/j.comnet.2021.108465_b51 – volume: 127 start-page: 18 year: 2019 ident: 10.1016/j.comnet.2021.108465_b11 article-title: Publish/subscribe based multi-tier edge computational model in internet of things for latency reduction publication-title: J. Parallel Distrib. Comput. doi: 10.1016/j.jpdc.2019.01.004 – volume: 7 start-page: 5481 year: 2020 ident: 10.1016/j.comnet.2021.108465_b15 article-title: A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.2981005 – volume: 8 start-page: 139244 year: 2020 ident: 10.1016/j.comnet.2021.108465_b22 article-title: A secure and reliable device access control scheme for IoT based sensor cloud systems publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3012121 – volume: 5 start-page: 141 year: 2015 ident: 10.1016/j.comnet.2021.108465_b46 article-title: Fast prime field elliptic-curve cryptography with 256-bit primes publication-title: J. Cryptogr. Eng. doi: 10.1007/s13389-014-0090-x – ident: 10.1016/j.comnet.2021.108465_b40 doi: 10.1109/WF-IoT.2016.7845414 – ident: 10.1016/j.comnet.2021.108465_b56 – volume: 11 year: 2015 ident: 10.1016/j.comnet.2021.108465_b63 article-title: ESSE: efficient secure session establishment for internet-integrated wireless sensor networks publication-title: Int. J. Distrib. Sens. Netw. doi: 10.1155/2015/393754 – volume: 2020 year: 2020 ident: 10.1016/j.comnet.2021.108465_b6 article-title: Protect mobile travelers information in sensitive region based on fuzzy logic in IoT technology publication-title: Secur. Commun. Netw. doi: 10.1155/2020/8897098 – ident: 10.1016/j.comnet.2021.108465_b28 doi: 10.1109/TrustCom.2014.31 – ident: 10.1016/j.comnet.2021.108465_b38 doi: 10.1109/FTC.2016.7821693 – volume: 18 start-page: 2660 year: 2018 ident: 10.1016/j.comnet.2021.108465_b13 article-title: Design, implementation and practical evaluation of an IoT home automation system for fog computing applications based on MQTT and ZigBee-WiFi sensor nodes publication-title: Sensors doi: 10.3390/s18082660 – ident: 10.1016/j.comnet.2021.108465_b37 doi: 10.1109/ICoAC48765.2019.246840 – ident: 10.1016/j.comnet.2021.108465_b42 – ident: 10.1016/j.comnet.2021.108465_b61 – volume: 13 start-page: 338 year: 2021 ident: 10.1016/j.comnet.2021.108465_b5 article-title: A systematic review on cognitive radio in low Power Wide Area network for industrial IoT applications publication-title: Sustainability doi: 10.3390/su13010338 – ident: 10.1016/j.comnet.2021.108465_b29 doi: 10.1109/ISC246665.2019.9071788 – volume: 87 start-page: 688 year: 2018 ident: 10.1016/j.comnet.2021.108465_b26 article-title: Flexible IoT security middleware for end-to-end cloud–fog communication publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.12.031 – volume: 8 start-page: 60539 year: 2020 ident: 10.1016/j.comnet.2021.108465_b34 article-title: Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2983117 – ident: 10.1016/j.comnet.2021.108465_b57 – ident: 10.1016/j.comnet.2021.108465_b50 doi: 10.23919/DATE.2017.7927078 – volume: 63 start-page: 2513 year: 2020 ident: 10.1016/j.comnet.2021.108465_b20 article-title: Security vulnerabilities, attacks, threats and the proposed countermeasures for the internet of things applications publication-title: Solid State Technol. – volume: 11 year: 2020 ident: 10.1016/j.comnet.2021.108465_b53 article-title: Designing a SHA-256 processor for blockchain-based IoT applications publication-title: Internet Things doi: 10.1016/j.iot.2020.100254 – year: 2015 ident: 10.1016/j.comnet.2021.108465_b52 – volume: 77 start-page: 4056 year: 2021 ident: 10.1016/j.comnet.2021.108465_b33 article-title: Toward the inclusion of end-to-end security in the OM2m platform publication-title: J. Supercomput. doi: 10.1007/s11227-020-03415-7 – start-page: 1 year: 2020 ident: 10.1016/j.comnet.2021.108465_b47 article-title: Elliptic curve Diffie–Hellman cryptosystem in big data cloud security publication-title: Cluster Comput. – volume: 20 start-page: 6837 year: 2020 ident: 10.1016/j.comnet.2021.108465_b3 article-title: Low Power Wide Area network, cognitive radio and the internet of things: Potentials for integration publication-title: Sensors doi: 10.3390/s20236837 – volume: 13 start-page: 5777 year: 2020 ident: 10.1016/j.comnet.2021.108465_b30 article-title: Client-aware negotiation for secure and efficient data transmission publication-title: Energies doi: 10.3390/en13215777 – ident: 10.1016/j.comnet.2021.108465_b36 doi: 10.1109/MetroInd4.0IoT48571.2020.9138303 – ident: 10.1016/j.comnet.2021.108465_b60 |
SSID | ssj0004428 |
Score | 2.5442717 |
Snippet | The Internet of Things (IoT) has converged with Cloud computing to provide comprehensive services to users in different places. However, with the exponential... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 108465 |
SubjectTerms | Algorithms Authentication Cloud computing Computer architecture Computer networks Curves Cybersecurity Electronic devices Elliptic Curve Diffie–Hellman Ephemeral Fog computing Gateways Internet of Things Internet of Things (IoT) Lightweight Lightweight authentication Network latency Perfect forward secrecy Performance evaluation Pre-shared keys Response time (computers) Secrecy aspects Security Telemetry |
Title | Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model |
URI | https://dx.doi.org/10.1016/j.comnet.2021.108465 https://www.proquest.com/docview/2606198215 |
Volume | 199 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1872-7069 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004428 issn: 1389-1286 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] customDbUrl: eissn: 1872-7069 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004428 issn: 1389-1286 databaseCode: ACRLP dateStart: 19990114 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection customDbUrl: eissn: 1872-7069 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004428 issn: 1389-1286 databaseCode: .~1 dateStart: 19990114 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals [SCFCJ] customDbUrl: eissn: 1872-7069 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004428 issn: 1389-1286 databaseCode: AIKHN dateStart: 19990114 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1872-7069 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004428 issn: 1389-1286 databaseCode: AKRWK dateStart: 19990114 isFulltext: true providerName: Library Specific Holdings |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZQWWBAPEV5yQOrqVo7djIiRNVSYIBWsFm246AiGioaxIb4D_xDfgl3TsJLSEgMURTn4kRn-175zkfIvjHWtZWxzEVRxkQaRyzOZMqUSBMD-tdziwH9s3PZG4mT6-h6jhzVuTAIq6xkfynTg7SuWloVN1vT8bh1GX6xdcAix03PQAtiBruQCOs7eP6EeQgR6qsiMUPqOn0uYLyg79wjorLTRrCdQBXzu3r6IaiD9ukuk6XKbKSH5ZetkDmfr5LFL5sJrpHJKfrZTyHUSU2e0hmG0j01iGHPiyo2R8Gb9RNPwVal_fshzUsYOEVtllK4Py3jUm8vr7NSplgkvqEulH-AN9FQPGedjLrHw6Meq4opMMe5KFiUeMVN7MAfBhcjUYmC9WwzaLYxjIjjqQUKG_uOi7yVSZbyTMjYS-eld1zxDdLI73O_SWjKhfVcGZHBYlaRhEE1WQxHxmXbSt8kvOahdtVO41jw4k7XkLJbXXJeI-d1yfkmYR9PTcudNv6gV_Xw6G8zRoMy-OPJnXo0dbViZxr8OvAlY7CAtv7d8TZZwKuQqpjskEbx8Oh3wWYp7F6YlHtk_rA_6J3jeXBxNXgHgX3wzg |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR27TsMw8ARlAAbEU7zxwGpVrR07GVFF1ULpQpHYLNtxEAjSihax8g_8IV_C2XF4CQmJIYt9dqI7-165B8Cx1sa2pDbUJklBeZ4mNC1ETiXPM43y1zHjHfoXQ9G74mfXyfUcdOpcGB9WGXl_xdMDt44jzYjN5uT2tnkZfrG1USP3Rc9QCs7DAk-QJzdg4aR_3ht-pkfy0GLVw1O_oM6gC2FeuH3pfFBlu-Xj7biXMr9LqB-8Ogig7iqsRM2RnFQftwZzrlyH5S_1BDfgYeBN7efg7SS6zMnUe9Md0T6MvZxF9xxBg9Y9OILqKumPR6SsIsGJF2g5wflJ5Zp6e3mdVmzFeOAbYkMHCHwTCf1zNuGqezrq9Gjsp0AtY3xGk8xJplOLJjFaGZnMJF5pU-CwSZEoluUGIUzq2jZxRmRFzgouUiesE84yybagUY5Ltw0kZ9w4JjUv8D7LRCBddZHiUzDRMsLtAKtxqGwsNu57XtyrOqrsTlWYVx7zqsL8DtCPVZOq2MYf8LImj_p2aBTKgz9W7tfUVPHSThWadmhOpqgE7f574yNY7I0uBmrQH57vwZKfCZmL2T40Zo9P7gBVmJk5jEf0HSAg8dY |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Lightweight+and+secure+authentication+scheme+for+IoT+network+based+on+publish%E2%80%93subscribe+fog+computing+model&rft.jtitle=Computer+networks+%28Amsterdam%2C+Netherlands+%3A+1999%29&rft.au=Amanlou%2C+Sanaz&rft.au=Hasan%2C+Mohammad+Kamrul&rft.au=Bakar%2C+Khairul+Azmi+Abu&rft.date=2021-11-09&rft.pub=Elsevier+Sequoia+S.A&rft.issn=1389-1286&rft.eissn=1872-7069&rft.volume=199&rft.spage=1&rft_id=info:doi/10.1016%2Fj.comnet.2021.108465&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1389-1286&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1389-1286&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1389-1286&client=summon |