Abstract
The IoT-sensed data is normally processed by Cloud Servers (CSs), but to reduce the cloud load and to avert network bandwidth wastage, Fog Computing (FC) is used. FC storages are LAN-based and they are not permanent. To store the data permanently, FNs (Fog Node) and IoT devices are making use of CSs. In the current scenario, we have IoT devices, FNs, and CSs. To process IoT data more efficiently, Multi-level FC architecture is suggested where normally, different security schemes are used at different information levels. Sometimes, the middle layer device has two varying security schemes, one to process lower-level data, and another to communicate the results with higher-level devices. Having multiple security algorithms make it more difficult to deploy any application, while the high complexity because of the multiple security schemes makes the system more vulnerable. Here, one unique lightweight security scheme is suggested that can single-handedly satisfy all the levels of security with different security levels. The scheme is based on Logical operations and it is multi-keyed logic. The proposed scheme makes sure that it has a lower time and space complexity to support IoT devices. In addition to that, the scheme has varied key-length features, which makes it capable to secure higher-level data at higher-level devices like servers. In designing, different HMACs, Op_codes, and chaining logic are used. The proposed mechanism is also analogized with other existing techniques and it is discovered to be superior to the others. Furthermore, it is tested against various attacks to prevent any vulnerabilities from exploitations. The given security scheme is lightweight and it provides security assurance in data transmission in the IoT-Fog, Fog to multi-Fog, and Fog to Cloud end.
Similar content being viewed by others
Availability of data and materials
Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
Change history
27 April 2024
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s10878-024-01171-5
References
Aazam M, Zeadally S, Harras KA (2018) Fog computing architecture, evaluation, and future research directions. IEEE Commun Mag 56(5):46–52. https://doi.org/10.1109/MCOM.2018.1700707
Abdullah W, Boudriga N, Kim D, An S (2015) An efficient and scalable key management mechanism for wireless sensor networks. In: 16th international conference on advanced communication technology 01–03 July 2015, Pyeong Chang, Korea (South), pp 480–493. https://doi.org/10.1109/ICACT.2015.7224913
Abed AA, Boyacı A (2020) A lightweight cryptography algorithm for secure smart cities and IOT. Electrica 20(2):168–176
Abou-Tair DED, Buchsenstein S, Khalifeh A (2020) A fog computing-based framework for privacy preserving IoT environments. Int Arab J Inf Technol 17(3):306–315
Abu-Tair M, Djahel S, Perry P, Scotney B, Zia U, Carracedo JM (2020) Towards secure and privacy-preserving iot enabled smart home: architecture and experimental study. Sensors 20:6131. https://doi.org/10.3390/s20216131
Ali ZH, Ali HA, Badawy MM (2015) Article: Internet of Things (IoT): definitions, challenges and recent research directions. Int J Comput Appl 128(1):37–47
Atlam HF, Walters RJ, Wills GB (2018) (2018) Fog computing and the internet of things: a review. Big Data Cogn Comput 2:10. https://doi.org/10.3390/bdcc2020010
Burt J (2010) Fog computing aims to reduce the processing burden of cloud systems. http://www.eweek.com/networking/fog-computing-aims-to-reduce-processing-burden-of-cloud-systems.html
Butun I, Sari A, Osterberg P (2019) Security implications of fog computing on the internet of things. In: IEEE international conference on consumer electronics (ICCE) 11–13 January 2019, Las Vegas, NV, USA, pp 1–5
Chalapathi GSS, Chamola V, Vaish A, Buyya R (2019) Industrial internet of things (IIoT) applications of edge and fog computing: a review and future directions. https://arxiv.org/abs/1912.00595 [cs. NI] 2019
Dhanda SS, Singh B, Jindal P (2020) Lightweight cryptography: a solution to secure IoT. Wirel Pers Commun 112:1947–1980. https://doi.org/10.1007/s11277-020-07134-3
Gia TN, Jiang M, Rahmani A-M, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet-of-things: a case Study on ECG feature extraction. In: IEEE international conference on computer and information technology (CIT) October, Liverpool, UK, pp 1–8. https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.51
Gope P (2019) LAAP: lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. Comput Secur 86: 223–237. ISSN 0167-4048. https://doi.org/10.1016/j.cose.2019.06.003
Habak K, Shi C, Zegura EW, Harras KA, Ammar MH (2017) Elastic mobile device clouds: leveraging mobile devices to provide cloud computing services at the edge. Fog for 5G and IoT, pp 159–163
Kanani P, Kaul V, Shah K (2014) Hybrid PKDS in 4G using secured DCC. In: International conference on signal propagation and computer technology (ICSPCT 2014) 12–13 July 2014, Ajmer, India, pp 323–328. https://doi.org/10.1109/ICSPCT.2014.6884983
Ketel M (2017) Fog-cloud services for IoT. Proc Southeast Conf Kennesaw GA USA 13–15:262–264
Khashan OA (2020) Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment. IEEE Access 8:66878–66887. https://doi.org/10.1109/ACCESS.2020.2984317
Krishna M, Doja M (2011) Symmetric key management and distribution techniques in Wireless ad-hoc Networks. In: International conference on computational intelligence and communication networks (CICN), 07–09 October, Gwalior, India, pp 727–731. https://doi.org/10.1109/CICN.2011.158
Musa Z, Vidyasankar K (2017) A fog computing framework for blackberry supply chain management. Procedia Comput Sci 113:178–185, ISSN 1877-0509. https://doi.org/10.1016/j.procs.2017.08.338
Prabhu CSR (2017) Overview - fog computing and internet-of-things (IoT). EAI Endors Trans Cloud Syst 3(10):1–23. https://doi.org/10.1109/CSCloud-EdgeCom52276.2021.00012
Shah K, Kaul V, Kanani P (2014) Logical cryptography in modern cryptosystem. Int J Emerg Trends Eng Dev 34:191–200
Shah A, Engineer M (2019) A survey of lightweight cryptographic algorithms for IoT-based applications. In: Tiwari S, Trivedi M, Mishra K, Misra A, Kumar K (eds) Smart innovations in communication and computational sciences. Advances in intelligent systems and computing, 851. Springer, Singapore. https://doi.org/10.1007/978-981-13-2414-7_27
Shaikh E, Mohiuddin I, Manzoor A (2019) Internet of things (IoT): security and privacy threats. In: 2nd international conference on computer applications & information security (ICCAIS) 01–03 May 2019, Riyadh, Saudi Arabia, pp 1–6. https://doi.org/10.1109/CAIS.2019.8769539
Shantharajah SP, Duraiswamy K, Nawaz G (2006) Key Management and distribution for authenticating group communication. In: First international conference on industrial and information system, 08–11 August 2006, Tirtayasa, Indonesia, pp 133–137. https://doi.org/10.1109/ICIIS.2006.365651
Sonar K, Upadhyay H (2014) A survey DDoS attack on the internet of things. Int J Eng Res Dev 10(11):58–63. https://doi.org/10.37868/sei.v3i1.124
Usman M, Ahmed I, Imran Aslam M, Khan S, Ali Shah U (2017) SIT: a lightweight encryption algorithm for secure internet of things. Int J Adv Comput Sci Appl (ijacsa). https://doi.org/10.14569/IJACSA.2017.080151
Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y (2017) Comprehensive study of symmetric key and asymmetric key encryption algorithms. In: Proceedings of the 2017 international conference on engineering and technology (ICET), Antalya, Turkey, 21–23 August 2017, pp 1–7. https://doi.org/10.1109/ICEngTechnol.2017.8308215
Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: Xu K, Zhu H (eds) Wireless algorithms, systems, and applications. WASA 2015. Lecture Notes in Computer Science, 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_67
Acknowledgements
We thank the anonymous referees for their useful suggestions.
Funding
This work has no funding resource.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by PK, PV, KD, VG, AN, ND, MP. The manuscript was written and revised by all authors on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s10878-024-01171-5
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kanani, P., Vartak, P., Dabre, K. et al. RETRACTED ARTICLE: Lightweight multi-level authentication scheme for secured data transmission in IoT-Fog context. J Comb Optim 45, 59 (2023). https://doi.org/10.1007/s10878-023-00987-x
Accepted:
Published:
DOI: https://doi.org/10.1007/s10878-023-00987-x