Skip to main content
Log in

RETRACTED ARTICLE: Lightweight multi-level authentication scheme for secured data transmission in IoT-Fog context

  • Published:
Journal of Combinatorial Optimization Aims and scope Submit manuscript

This article was retracted on 27 April 2024

This article has been updated

Abstract

The IoT-sensed data is normally processed by Cloud Servers (CSs), but to reduce the cloud load and to avert network bandwidth wastage, Fog Computing (FC) is used. FC storages are LAN-based and they are not permanent. To store the data permanently, FNs (Fog Node) and IoT devices are making use of CSs. In the current scenario, we have IoT devices, FNs, and CSs. To process IoT data more efficiently, Multi-level FC architecture is suggested where normally, different security schemes are used at different information levels. Sometimes, the middle layer device has two varying security schemes, one to process lower-level data, and another to communicate the results with higher-level devices. Having multiple security algorithms make it more difficult to deploy any application, while the high complexity because of the multiple security schemes makes the system more vulnerable. Here, one unique lightweight security scheme is suggested that can single-handedly satisfy all the levels of security with different security levels. The scheme is based on Logical operations and it is multi-keyed logic. The proposed scheme makes sure that it has a lower time and space complexity to support IoT devices. In addition to that, the scheme has varied key-length features, which makes it capable to secure higher-level data at higher-level devices like servers. In designing, different HMACs, Op_codes, and chaining logic are used. The proposed mechanism is also analogized with other existing techniques and it is discovered to be superior to the others. Furthermore, it is tested against various attacks to prevent any vulnerabilities from exploitations. The given security scheme is lightweight and it provides security assurance in data transmission in the IoT-Fog, Fog to multi-Fog, and Fog to Cloud end.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Availability of data and materials

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

Change history

References

  • Aazam M, Zeadally S, Harras KA (2018) Fog computing architecture, evaluation, and future research directions. IEEE Commun Mag 56(5):46–52. https://doi.org/10.1109/MCOM.2018.1700707

    Article  Google Scholar 

  • Abdullah W, Boudriga N, Kim D, An S (2015) An efficient and scalable key management mechanism for wireless sensor networks. In: 16th international conference on advanced communication technology 01–03 July 2015, Pyeong Chang, Korea (South), pp 480–493. https://doi.org/10.1109/ICACT.2015.7224913

  • Abed AA, Boyacı A (2020) A lightweight cryptography algorithm for secure smart cities and IOT. Electrica 20(2):168–176

    Article  Google Scholar 

  • Abou-Tair DED, Buchsenstein S, Khalifeh A (2020) A fog computing-based framework for privacy preserving IoT environments. Int Arab J Inf Technol 17(3):306–315

    Google Scholar 

  • Abu-Tair M, Djahel S, Perry P, Scotney B, Zia U, Carracedo JM (2020) Towards secure and privacy-preserving iot enabled smart home: architecture and experimental study. Sensors 20:6131. https://doi.org/10.3390/s20216131

    Article  Google Scholar 

  • Ali ZH, Ali HA, Badawy MM (2015) Article: Internet of Things (IoT): definitions, challenges and recent research directions. Int J Comput Appl 128(1):37–47

    Google Scholar 

  • Atlam HF, Walters RJ, Wills GB (2018) (2018) Fog computing and the internet of things: a review. Big Data Cogn Comput 2:10. https://doi.org/10.3390/bdcc2020010

    Article  Google Scholar 

  • Burt J (2010) Fog computing aims to reduce the processing burden of cloud systems. http://www.eweek.com/networking/fog-computing-aims-to-reduce-processing-burden-of-cloud-systems.html

  • Butun I, Sari A, Osterberg P (2019) Security implications of fog computing on the internet of things. In: IEEE international conference on consumer electronics (ICCE) 11–13 January 2019, Las Vegas, NV, USA, pp 1–5

  • Chalapathi GSS, Chamola V, Vaish A, Buyya R (2019) Industrial internet of things (IIoT) applications of edge and fog computing: a review and future directions. https://arxiv.org/abs/1912.00595 [cs. NI] 2019

  • Dhanda SS, Singh B, Jindal P (2020) Lightweight cryptography: a solution to secure IoT. Wirel Pers Commun 112:1947–1980. https://doi.org/10.1007/s11277-020-07134-3

    Article  Google Scholar 

  • Gia TN, Jiang M, Rahmani A-M, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet-of-things: a case Study on ECG feature extraction. In: IEEE international conference on computer and information technology (CIT) October, Liverpool, UK, pp 1–8. https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.51

  • Gope P (2019) LAAP: lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. Comput Secur 86: 223–237. ISSN 0167-4048. https://doi.org/10.1016/j.cose.2019.06.003

  • Habak K, Shi C, Zegura EW, Harras KA, Ammar MH (2017) Elastic mobile device clouds: leveraging mobile devices to provide cloud computing services at the edge. Fog for 5G and IoT, pp 159–163

  • Kanani P, Kaul V, Shah K (2014) Hybrid PKDS in 4G using secured DCC. In: International conference on signal propagation and computer technology (ICSPCT 2014) 12–13 July 2014, Ajmer, India, pp 323–328. https://doi.org/10.1109/ICSPCT.2014.6884983

  • Ketel M (2017) Fog-cloud services for IoT. Proc Southeast Conf Kennesaw GA USA 13–15:262–264

    Article  Google Scholar 

  • Khashan OA (2020) Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment. IEEE Access 8:66878–66887. https://doi.org/10.1109/ACCESS.2020.2984317

    Article  Google Scholar 

  • Krishna M, Doja M (2011) Symmetric key management and distribution techniques in Wireless ad-hoc Networks. In: International conference on computational intelligence and communication networks (CICN), 07–09 October, Gwalior, India, pp 727–731. https://doi.org/10.1109/CICN.2011.158

  • Musa Z, Vidyasankar K (2017) A fog computing framework for blackberry supply chain management. Procedia Comput Sci 113:178–185, ISSN 1877-0509. https://doi.org/10.1016/j.procs.2017.08.338

  • Prabhu CSR (2017) Overview - fog computing and internet-of-things (IoT). EAI Endors Trans Cloud Syst 3(10):1–23. https://doi.org/10.1109/CSCloud-EdgeCom52276.2021.00012

    Article  Google Scholar 

  • Shah K, Kaul V, Kanani P (2014) Logical cryptography in modern cryptosystem. Int J Emerg Trends Eng Dev 34:191–200

    Google Scholar 

  • Shah A, Engineer M (2019) A survey of lightweight cryptographic algorithms for IoT-based applications. In: Tiwari S, Trivedi M, Mishra K, Misra A, Kumar K (eds) Smart innovations in communication and computational sciences. Advances in intelligent systems and computing, 851. Springer, Singapore. https://doi.org/10.1007/978-981-13-2414-7_27

  • Shaikh E, Mohiuddin I, Manzoor A (2019) Internet of things (IoT): security and privacy threats. In: 2nd international conference on computer applications & information security (ICCAIS) 01–03 May 2019, Riyadh, Saudi Arabia, pp 1–6. https://doi.org/10.1109/CAIS.2019.8769539

  • Shantharajah SP, Duraiswamy K, Nawaz G (2006) Key Management and distribution for authenticating group communication. In: First international conference on industrial and information system, 08–11 August 2006, Tirtayasa, Indonesia, pp 133–137. https://doi.org/10.1109/ICIIS.2006.365651

  • Sonar K, Upadhyay H (2014) A survey DDoS attack on the internet of things. Int J Eng Res Dev 10(11):58–63. https://doi.org/10.37868/sei.v3i1.124

    Article  Google Scholar 

  • Usman M, Ahmed I, Imran Aslam M, Khan S, Ali Shah U (2017) SIT: a lightweight encryption algorithm for secure internet of things. Int J Adv Comput Sci Appl (ijacsa). https://doi.org/10.14569/IJACSA.2017.080151

    Article  Google Scholar 

  • Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y (2017) Comprehensive study of symmetric key and asymmetric key encryption algorithms. In: Proceedings of the 2017 international conference on engineering and technology (ICET), Antalya, Turkey, 21–23 August 2017, pp 1–7. https://doi.org/10.1109/ICEngTechnol.2017.8308215

  • Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: Xu K, Zhu H (eds) Wireless algorithms, systems, and applications. WASA 2015. Lecture Notes in Computer Science, 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_67

Download references

Acknowledgements

We thank the anonymous referees for their useful suggestions.

Funding

This work has no funding resource.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by PK, PV, KD, VG, AN, ND, MP. The manuscript was written and revised by all authors on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Pratik Kanani.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s10878-024-01171-5

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kanani, P., Vartak, P., Dabre, K. et al. RETRACTED ARTICLE: Lightweight multi-level authentication scheme for secured data transmission in IoT-Fog context. J Comb Optim 45, 59 (2023). https://doi.org/10.1007/s10878-023-00987-x

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10878-023-00987-x

Keywords

Navigation