Dynamic authentication for intelligent sensor clouds in the Internet of Things

被引:0
|
作者
Al-Aqrabi, Hussain [1 ]
Manasrah, Ahmed M. [1 ,2 ]
Hill, Richard [3 ]
Shatnawi, Mohammed Q. [4 ]
Daoud, Mohammad Sh [5 ]
Alkhzaimi, Hoda [6 ,7 ]
机构
[1] Higher Coll Technol, Dept Comp Informat Sci, Sharjah, U Arab Emirates
[2] Yarmouk Univ, Comp Sci Dept, Irbid, Jordan
[3] Univ Huddersfield, Dept Comp Sci, Huddersfield, England
[4] Jordan Univ Sci & Technol, Fac Comp & Informat technol, Irbid, Jordan
[5] Al Ain Univ, Coll Engn, Abu Dhabi, U Arab Emirates
[6] New York Univ, Engn Dept, Abu Dhabi, U Arab Emirates
[7] New York Univ, Res Inst, Abu Dhabi, U Arab Emirates
关键词
Inter-cloud; Multi-cloud; Sensor cloud; Authentication; Cloud security; Internet of Things; Big data analytics; TRUST; MANAGEMENT; SECURITY; FUTURE;
D O I
10.1007/s10207-024-00829-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sensor clouds are formed by IP-enabled wireless sensors and Internet of Things devices that are used for sensing and actuation in commercial and industrial applications. Data collected by the sensors are consolidated by distributed cloud data consolidation (DCS) servers to be utilized as raw sensory information by applications running data analytics and actuation functions. Alternatively, DC servers may feed sensor data to the cloud-hosted Big Data Analytics (BDS) servers. Sensor clouds and their respective DCS servers, as well as BDS servers, may form different security realms. These security realms' ownership structures are complicated and differ from standard database servers, necessitating a dependable authentication technique to provide trusted access to DC and BDS servers. This paper proposes a new multiparty authentication framework to authenticate applications requesting access to the DCS and BDS servers without direct human or application access to the sensors and actuators. Only DC servers are permitted to communicate with sensors/actuators, and only applications certified by a Session Authority Cloud are granted access to DCS/BDS servers via an authentication protocol that includes many information and key exchanges. This solution may assure the reliable deployment of sensor clouds in different critical application domains (i.e., industry, commercial, national security, and defense, etc.) while reducing the potential of direct espionage of sensed/actuated systems. Linear Temporal Logic is used to explicitly analyze and establish the correctness of the presented framework. OPNET modeling and simulations are used to illustrate the protocol's design and operations. The results demonstrate that multiparty authentication is conceivable for Sensor cloud computing systems.
引用
收藏
页码:2003 / 2021
页数:19
相关论文
共 50 条
  • [41] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [42] Multidomain security authentication for the Internet of things
    Zhang, Qikun
    Zhao, Kunyuan
    Kuang, Xiaohui
    Li, Yongjiao
    Zheng, Yuanpan
    Yuan, Junling
    Wang, Ruifang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16):
  • [43] Softwarization of networks, clouds, and internet of things
    De Turck, Filip
    Kang, Joon-Myung
    Choo, Hyunseung
    Kim, Myung-Sup
    Choi, Baek-Young
    Badonnel, Remi
    Hong, James Won-Ki
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2017, 27 (02)
  • [44] Intelligent acquisition algorithm of dynamic traffic data based on Internet of Things
    Jian Gao
    Honghai Li
    Sheng Yin
    Lin Wang
    Cluster Computing, 2019, 22 : 7657 - 7664
  • [45] Intelligent acquisition algorithm of dynamic traffic data based on Internet of Things
    Gao, Jian
    Li, Honghai
    Yin, Sheng
    Wang, Lin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7657 - S7664
  • [46] Intelligent Vehicle Engine Dynamic Test System Based on Internet of Things
    Wang, Wenbin
    Wu, Liyan
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [47] Dynamic neuromorphic architecture selection scheme for intelligent Internet of Things services
    Park, Kicheol
    Kim, Bongjae
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (16):
  • [48] Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
    A. Jabbari
    J. B. Mohasefi
    Wireless Personal Communications, 2021, 116 : 2565 - 2591
  • [49] Dynamic Clouds of People and Things
    Cochrane, Peter
    2014 16TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2014,
  • [50] Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
    Jabbari, A.
    Mohasefi, J. B.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 2565 - 2591