Autenticação mútua de nós sensores com nós intermediários para IoT no contexto de Fog Computing
Abstract
Several paradigm evolutions have been proposed in recent years. Fog Computing is an area of Computer Science that is under constant development and evolution, and in conjunction with information security, the paradigm becomes more reliable and secure for edge IoT platforms. Security issues are difficult to reach in environments with limited resources. This work aimed to improve an authentication model, taking into account IoT devices in the context of Fog Computing. Finally, validation through the implementation of a mutual authentication system has produced the result of confidentiality, integrity and authenticity, allied with embedded devices used in the Fog Computing paradigm.
References
Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. (2012). Fog computing and its role in the internet of things. In Proceedings of the rst edition of the MCC workshop on Mobile cloud computing, pages 13–16. ACM.
Jan, M. A., Nanda, P., He, X., Tan, Z., and Liu, R. P. (2014). A robust authentication In Trust, Sescheme for observing resources in the internet of things environment. curity and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on, pages 205–211. IEEE.
Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., and Carle, G. (2013). Dtls based security and two-way authentication for the internet of things. Ad Hoc Networks, 11(8):2710– 2723.
Liu, J., Xiao, Y., and Chen, C. P. (2012). Authentication and access control in the internet of things. In Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, pages 588–592. IEEE.
Rewagad, P. and Pawar, Y. (2013). Use of digital signature with dife hellman key exchange and aes encryption algorithm to enhance data security in cloud computing. In Communication Systems and Network Technologies (CSNT), 2013 International Conference on, pages 437–439. IEEE.
Schneier, B. (1995). Applied Cryptography (2Nd Ed.): Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York, NY, USA.
Xia, F., Yang, L. T., Wang, L., and Vinel, A. (2012). Internet of things. International Journal of Communication Systems, 25(9):1101.
Yi, S., Li, C., and Li, Q. (2015). A survey of fog computing: concepts, applications and issues. In Proceedings of the 2015 Workshop on Mobile Big Data, pages 37–42. ACM.
