Dynamic authentication for intelligent sensor clouds in the Internet of Things

被引:0
|
作者
Al-Aqrabi, Hussain [1 ]
Manasrah, Ahmed M. [1 ,2 ]
Hill, Richard [3 ]
Shatnawi, Mohammed Q. [4 ]
Daoud, Mohammad Sh [5 ]
Alkhzaimi, Hoda [6 ,7 ]
机构
[1] Higher Coll Technol, Dept Comp Informat Sci, Sharjah, U Arab Emirates
[2] Yarmouk Univ, Comp Sci Dept, Irbid, Jordan
[3] Univ Huddersfield, Dept Comp Sci, Huddersfield, England
[4] Jordan Univ Sci & Technol, Fac Comp & Informat technol, Irbid, Jordan
[5] Al Ain Univ, Coll Engn, Abu Dhabi, U Arab Emirates
[6] New York Univ, Engn Dept, Abu Dhabi, U Arab Emirates
[7] New York Univ, Res Inst, Abu Dhabi, U Arab Emirates
关键词
Inter-cloud; Multi-cloud; Sensor cloud; Authentication; Cloud security; Internet of Things; Big data analytics; TRUST; MANAGEMENT; SECURITY; FUTURE;
D O I
10.1007/s10207-024-00829-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sensor clouds are formed by IP-enabled wireless sensors and Internet of Things devices that are used for sensing and actuation in commercial and industrial applications. Data collected by the sensors are consolidated by distributed cloud data consolidation (DCS) servers to be utilized as raw sensory information by applications running data analytics and actuation functions. Alternatively, DC servers may feed sensor data to the cloud-hosted Big Data Analytics (BDS) servers. Sensor clouds and their respective DCS servers, as well as BDS servers, may form different security realms. These security realms' ownership structures are complicated and differ from standard database servers, necessitating a dependable authentication technique to provide trusted access to DC and BDS servers. This paper proposes a new multiparty authentication framework to authenticate applications requesting access to the DCS and BDS servers without direct human or application access to the sensors and actuators. Only DC servers are permitted to communicate with sensors/actuators, and only applications certified by a Session Authority Cloud are granted access to DCS/BDS servers via an authentication protocol that includes many information and key exchanges. This solution may assure the reliable deployment of sensor clouds in different critical application domains (i.e., industry, commercial, national security, and defense, etc.) while reducing the potential of direct espionage of sensed/actuated systems. Linear Temporal Logic is used to explicitly analyze and establish the correctness of the presented framework. OPNET modeling and simulations are used to illustrate the protocol's design and operations. The results demonstrate that multiparty authentication is conceivable for Sensor cloud computing systems.
引用
收藏
页码:2003 / 2021
页数:19
相关论文
共 50 条
  • [31] Authentication Techniques for the Internet of Things: A Survey
    Saadeh, Maha
    Sleit, Azzam
    Qatawneh, Mohammed
    Almobaideen, Wesam
    2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 28 - 34
  • [32] Efficient Multicast Authentication in Internet of Things
    Bamasag, Omaimah
    Toumi, Kamal Youcef
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 429 - 435
  • [33] Research of authentication techniques for the Internet of things
    Yan H.
    Wang L.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (07): : 213 - 222
  • [34] A Survey on Authentication Techniques for the Internet of Things
    Atwady, Yahya
    Hammoudeh, Mohammad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [35] Continuous Authentication and Authorization for the Internet of Things
    Shahzad, Muhammad
    Singh, Munindar P.
    IEEE INTERNET COMPUTING, 2017, 21 (02) : 86 - 90
  • [36] A Survey on Authentication Techniques for the Internet of Things
    Albalawi, Afrah
    Almrshed, Amal
    Badhib, Arwa
    Alshehri, Suhair
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 271 - 275
  • [37] An Authentication Protocol for the Medical Internet of Things
    El-Meniawy, Nagwa
    Rizk, Mohamed R. M.
    Ahmed, Magdy A.
    Saleh, Mohamed
    SYMMETRY-BASEL, 2022, 14 (07):
  • [38] Authentication Protocol for Securing Internet of Things
    Maarof, Ahmed
    Senhadji, Mohamed
    Labbi, Zouheir
    Belkasmi, Mostafa
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [39] Lightweight Authentication Scheme for Internet of Things
    Haenel, Arie
    Haddad, Yoram
    Zhang, Zonghua
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [40] Internet of things' authentication and access control
    Liu, Jing
    Xiao, Yang
    Chen, C.L. Philip
    International Journal of Security and Networks, 2012, 7 (04) : 228 - 241