Trust Based Security Model for IoT and Fog based Applications.
-
2018-03-18 https://doi.org/10.14419/ijet.v7i2.7.10924 -
Authentication, IoT, Fog, Lightweight Cryptography, Security, Trust based Security. -
Abstract
Wireless sensor networks (WSN’s) are becoming increasingly popular in the current Era. WSN and Smart Devices are key enablers for the Internet of things (IoT) and Fog Computing based applications and it brings IoT applications with enhanced capabilities for sensing and actuation. IOT is a very growing area and having wide scope for research. Integration of WSNs into IoT is today’s need. Adoptions to cloud computing, increasing use of automation of tools, Integration of internet into most activities of human had reached to the stage where Internet of Things based applications are becoming more popular today. Many new applications are now being developed in the field of IoT. The broad areas of application are Home automation, Smart cities, Retail, Agriculture, Manufacturing, Healthcare, Habitat Monitoring, Security and Surveillance etc. With this wide scope the applications are prone to many security threats. Providing Security for IoT and Fog computing-based applications is a Research Challenge. This paper tries to discuss with the common security attacks, Reasons, their counter measures and research directions. We are also proposing a Trust based Security model for implementing application layer level security in IoT and fog.
Â
Â
-
References
[1] Davar PISHVA, “Internet of Things: Security and Privacy Issues and Possible Solutionâ€, ICACT Transactions on Advanced Communications Technology (TACT) Vol. 5, Issue 2, March 2016.
[2] Rwan Mahmoud, Tasneem Yousuf, Fadi Aloul, Imran Zualkernan, “Internet of Things (IoT) Security: Current Status, Challenges and Prospective Measuresâ€International Conference for Internet Technology and Secured Transactions (ICITST-2015), IEEE 2015.
[3] Salim ELBOUANANI, My Ahmed EL KIRAM, Omar ACHBAROU, “Introduction to The Internet Of Things Security Standardization and research challengesâ€, IEEE 2015.
[4] Zeeshan Ali Khan and Peter Herrmann, A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things, IEEE 31st International Conference on Advanced Information Networking and Applications, 2017 IEEE
[5] D. Jamuna Rani, S. Emalda Roslin, Light Weight Cryptographic Algorithms for Medical Internet of Things (IoT) - A Review, Online International Conference on Green Engineering and Technologies (IC-GET), 2016
[6] KrishnaKanth Gupta, Sapna Shukla, Internet of Things: Security Challenges for Next Generation Networks International Conference on Innovation and Challenges in Cyber Security (ICICCS 2016)
[7] Mouza Bani Shemaili, Chan Yeob Yeun, Khalid Mubarak, Mohamed Jamal Zemerly, “A New Lightweight Hybrid Cryptographic Algorithm for The Internet of Things†The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012)
[8] Elisa Bertino, “Botnets and Internet of Things Securityâ€Purdue University Nayeem Islam, Qualcomm.
[9] Shehnaz T. Patel, Nita H. Mistry, A Survey: Lightweight Cryptography in WSN
[10] Xiong Li, Zhou Xuan, Liu Wen “Research on the Architecture of Trusted Security System Based on the Internet of Things†2011 Fourth International Conference on Intelligent Computation Technology and Automation.
[11] Zhen Ling_, Junzhou Luo et. Al. “Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System†IEEE Internet of Things Journal, 2017.
[12] Yassine Chahid, Mohamed Benabdellah, Abdelmalek Azizi, Mohammed “Internet of Things Security†IEEE, 2017.
[13] Arwa Alrawais, Abdulrahman Alhothaily, Chunqiang Hu, and Xiuzhen Cheng “Fog Computing for the Internet of Things: Security and Privacy Issues†George Washington University
[14] Vera Suryani, Selo, Widyawan, “A Survey on Trust in Internet of Thingsâ€, 8’th International conference on Information Technology and Electrical Engineering (ICITEE) Yogyakarta, Indonesia.
[15] John A. Stankovic, “Research Directions for the Internet of Thingsâ€, IEEE Internet of Things Journal, Vol. 1, No. 1, February 2014.
[16] Mung Chiang, Fellow, IEEE, and Tao Zhang, “Fog and IoT: An Overview of Research Opportunitiesâ€, IEEE Internet of Things Journal, Vol. 3, No. 6, December 2016
[17] Hokeun Kim and Edward A. Lee, University of California, Berkeley, “Authentication and Authorization for the Internet of Thingsâ€, IEEE Computer Society 2017.
[18] Hamed Hellaoui, Abdelmadjid Bouabdallah, Moloud Kouldil “TAS-IoT Trust-Based Adaptive Security in the IoT†IEEE conference on Local Computer Networks 2016.
[19] Li Ma, Guangjie Liu, A Hierarchical Trust Model for Cluster-based Wireless Sensor Network, IEEE ICCAIS, Ocotber 2015.
[20] Ioannis Kouneils, Gianmarco Baldini et. Al. “Building Trust in the Human-Internet of Things Relationship.†IEEE technology and Society Magazine. 2014.
[21] S. Sicari, A.Rizzardi, L.A. Grieco, A.Coen-Porisini, “Security. Privacy and Trust in Internet of Things: The Road Aheadâ€, Elsevier, 2015
[22] Ing-Ray Chen, Jia Guo and Fenye Bao, “Trust Management for SOA-Based IoT and Its Application to Service Composition†IEEE Transactions on Services Computing Vo 9, No. 3, May/June 2016
[23] Kai Kang, Zhibo Pang et. Al. “An Interactive Trust Model for Application Market of the internet of Things†IEEE Transactions on Industrial Informatics Vol 10, No. 2 May 2014.
[24] Jorge Granjal, Edmundo Monterio, JorgeSa Silva, “Security of Internet of Things: A Survey of Existing Protocols and Open Research Issues.†IEEE Communication Surveys & Tutorials, Vol. 17, No. 3 2015.
[25] Kanghayo Lee, Donghyun Kimet. Al. “On Security and Privacy Issues of Fog Computing Supported Internet of Things Environmentâ€, 6th International Conference on the Network of the Future (NOF), IEEE 2015.
[26] Junshe Wang, Han Wang, Hongbin Zhang, Ning Cao, “Trust and Atribute-Based Dynamic Access Control for Internet of Thingsâ€, International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, IEEE 2017.
[27] Aafaf OUADDAH, Hajar MOUSANNIF, Anas ABOU ELKALAM, Abdellah AIT OUAHMAN, “Access Control in IoT: Survey & State of the Artâ€, 5th International Conference on Multimedia Computing and Systems (ICMCS), 2016
[28] Dina Hussein, Emmanuel Bertin and Vincent Frey, “Access control in IoT: from requirements to a candidate visionâ€, 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), 2017.
-
Downloads
-
How to Cite
Abhijit J, P., & G. Syam Prasad, D. (2018). Trust Based Security Model for IoT and Fog based Applications. International Journal of Engineering & Technology, 7(2.7), 691-695. https://doi.org/10.14419/ijet.v7i2.7.10924Received date: 2018-04-02
Accepted date: 2018-04-02
Published date: 2018-03-18