Dynamic authentication for intelligent sensor clouds in the Internet of Things

被引:0
|
作者
Al-Aqrabi, Hussain [1 ]
Manasrah, Ahmed M. [1 ,2 ]
Hill, Richard [3 ]
Shatnawi, Mohammed Q. [4 ]
Daoud, Mohammad Sh [5 ]
Alkhzaimi, Hoda [6 ,7 ]
机构
[1] Higher Coll Technol, Dept Comp Informat Sci, Sharjah, U Arab Emirates
[2] Yarmouk Univ, Comp Sci Dept, Irbid, Jordan
[3] Univ Huddersfield, Dept Comp Sci, Huddersfield, England
[4] Jordan Univ Sci & Technol, Fac Comp & Informat technol, Irbid, Jordan
[5] Al Ain Univ, Coll Engn, Abu Dhabi, U Arab Emirates
[6] New York Univ, Engn Dept, Abu Dhabi, U Arab Emirates
[7] New York Univ, Res Inst, Abu Dhabi, U Arab Emirates
关键词
Inter-cloud; Multi-cloud; Sensor cloud; Authentication; Cloud security; Internet of Things; Big data analytics; TRUST; MANAGEMENT; SECURITY; FUTURE;
D O I
10.1007/s10207-024-00829-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sensor clouds are formed by IP-enabled wireless sensors and Internet of Things devices that are used for sensing and actuation in commercial and industrial applications. Data collected by the sensors are consolidated by distributed cloud data consolidation (DCS) servers to be utilized as raw sensory information by applications running data analytics and actuation functions. Alternatively, DC servers may feed sensor data to the cloud-hosted Big Data Analytics (BDS) servers. Sensor clouds and their respective DCS servers, as well as BDS servers, may form different security realms. These security realms' ownership structures are complicated and differ from standard database servers, necessitating a dependable authentication technique to provide trusted access to DC and BDS servers. This paper proposes a new multiparty authentication framework to authenticate applications requesting access to the DCS and BDS servers without direct human or application access to the sensors and actuators. Only DC servers are permitted to communicate with sensors/actuators, and only applications certified by a Session Authority Cloud are granted access to DCS/BDS servers via an authentication protocol that includes many information and key exchanges. This solution may assure the reliable deployment of sensor clouds in different critical application domains (i.e., industry, commercial, national security, and defense, etc.) while reducing the potential of direct espionage of sensed/actuated systems. Linear Temporal Logic is used to explicitly analyze and establish the correctness of the presented framework. OPNET modeling and simulations are used to illustrate the protocol's design and operations. The results demonstrate that multiparty authentication is conceivable for Sensor cloud computing systems.
引用
收藏
页码:2003 / 2021
页数:19
相关论文
共 50 条
  • [21] Security authentication technology based on dynamic Bayesian network in Internet of Things
    Zhang, Qing
    Xu, Dilong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (02) : 573 - 580
  • [22] Analysis and Improvement on an Authentication Scheme for Wireless Sensor Networks in Internet of Things Environment
    LI Anqian
    KANG Baoyuan
    ZUO Xinyu
    HUO Yuyan
    NIU Shufang
    SUN Zhu
    WuhanUniversityJournalofNaturalSciences, 2023, 28 (06) : 541 - 552
  • [23] A Survey: Authentication Protocols for Wireless Sensor Network in the Internet of Things; Keys and Attacks
    Alrababah, Doaa
    Al-Shammari, Esraa
    Alsuht, Areej
    2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, : 270 - 276
  • [24] Towards an intelligent and automatic irrigation system based on internet of things with authentication feature in VANET
    Zhang, Huijing
    Li, Minbo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 88
  • [25] The Deployment of Sensor Nodes Based on the Internet of Things for Intelligent Agricultural Monitoring
    Mu, Zeping
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MODELLING, SIMULATION AND APPLIED MATHEMATICS (MSAM2017), 2017, 132 : 235 - 238
  • [26] Sensor Nodes and Communication Protocols of the Internet of Things Applied to Intelligent Agriculture
    Chuchico-Arcos, Cristian
    Rivas-Lalaleo, David
    Communications in Computer and Information Science, 2021, 1388 CCIS : 686 - 703
  • [27] Application of Internet of Things Sensor in Intelligent Art-Aided Design
    Xie, Yihuai
    Wang, Wei
    JOURNAL OF SENSORS, 2021, 2021
  • [28] A Lightweight Authentication Protocol for Internet of Things
    Lee, Jun-Ya
    Lin, Wei-Cheng
    Huang, Yu-Hung
    2014 INTERNATIONAL SYMPOSIUM ON NEXT-GENERATION ELECTRONICS (ISNE), 2014,
  • [29] Survey of Authentication and Authorization for the Internet of Things
    Trnka, Michal
    Cerny, Tomas
    Stickney, Nathaniel
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [30] Privacy, Discovery, and Authentication for the Internet of Things
    Wu, David J.
    Taly, Ankur
    Shankar, Asim
    Boneh, Dan
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 301 - 319