Toggle Main Menu Toggle Search

Open Access padlockePrints

A User-centric Security Solution for Internet of Things and Edge Convergence

Lookup NU author(s): Dr Deepak PuthalORCiD, Dr Zhenyu Wen, Professor Aad van Moorsel, Professor Raj Ranjan

Downloads

Full text for this publication is not currently held within this repository. Alternative links are provided below where available.


Abstract

© 2020 ACM.The Internet of Things (IoT) is becoming a backbone of sensing infrastructure to several mission-critical applications such as smart health, disaster management, and smart cities. Due to resource-constrained sensing devices, IoT infrastructures use Edge datacenters (EDCs) for real-time data processing. EDCs can be either static or mobile in nature, and this article considers both of these scenarios. Generally, EDCs communicate with IoT devices in emergency scenarios to evaluate data in real-time. Protecting data communications from malicious activity becomes a key factor, as all the communication flows through insecure channels. In such infrastructures, it is a challenging task for EDCs to ensure the trustworthiness of the data for emergency evaluations. The current communication security pattern of "communication before authentication" leaves a "black hole" for intruders to become part of communication processes without authentication. To overcome this issue and to develop security infrastructures for IoT and distributed Edge datacenters, this article proposes a user-centric security solution. The proposed security solution shifts from a network-centric approach to a user-centric security approach by authenticating users and devices before communication is established. A trusted controller is initialized to authenticate and establishes the secure channel between the devices before they start communication between themselves. The centralized controller draws a perimeter for secure communications within the boundary. Theoretical analysis and experimental evaluation of the proposed security model show that it not only secures the communication infrastructure but also improves the overall network performance.


Publication metadata

Author(s): Puthal D, Yang LT, Dustdar S, Wen Z, Jun S, Moorsel AV, Ranjan R

Publication type: Article

Publication status: Published

Journal: ACM Transactions on Cyber-Physical Systems

Year: 2020

Volume: 4

Issue: 3

Print publication date: 01/05/2020

Online publication date: 01/05/2020

Acceptance date: 01/07/2019

ISSN (print): 2378-962X

ISSN (electronic): 2378-9638

Publisher: Association for Computing Machinery

URL: https://doi.org/10.1145/3351882

DOI: 10.1145/3351882


Altmetrics

Altmetrics provided by Altmetric


Share