Secure transmission technique for data in IoT edge computing infrastructure

Nowadays, the utilization of IoT technology has been rapidly increased in various applications such as smart city, smart banking, smart transport, etc. The internet of things allows the user to collect the data easily using the different sensors installed at various locations in the open environment. The data collection process by the IoT sensors is giving access to the various services. However, due to the open communication medium, it is difficult to provide secure access to these services. In this paper, a data transmission technique has been proposed, which will provide secure communication in IoT infrastructure for smart city applications. In this method, each IoT sensor have to prove their legitimacy to the reader and the base station before the transmission of data. Hence, the IoT sensors can transmit the required data in a secure and efficient way. In the proposed technique, the proof of correction shows that the required information is not supposed to send through an online medium, it is obtained at the receiver using the Euclidean parameters shared by the IoT sensors. The proposed technique is compatible to provide the security against most of the attacks performed by the attackers. Two random variables and complex mathematical calculation are making the proposed technique more reliable than others. This technique will significantly improve the security of different data transmission services which will be helpful to improve the smart city infrastructure.


Introduction
The expansion of IoT services has developed a competitive environment by the introduction of new and innovative products launch for smart city applications. The frequently developed system imposed a new challenge towards system privacy and security [1]. Consequently, some of the products do not satisfy the privacy and security of the system which is the major concern of IoT as well as smart cities [2]. Most of the research work has been focusing on the possible applications and issues related to smart cities [3]. Earlier privacy and security are not taken as an important parameter until the ransomware threats have been developed like crypto wall [4], wannacry [5], crypto locker [6], etc. Due to these attacks, there is a sense of mistrust indulges for the IoT system. The system is criticized and said that it becomes the Internet of Vulnerabilities instead of the Internet of things [7]. There has been a wide wave of developing new applications for privacy and security within the IoT-based smart city implementation. There have been a variety of advertisements for secure products for smart cities [1]. In the proposed technique, three phases have been considered namely the Registration phase, Authentication phase, and Data transfer phase (Fig. 1). In the first phase, the IoT sensor has to perform the registration process by sending its Identity number along with the time stamp [(S iden )||T 1 ]. In the authentication phase, sensor has to share [λ i ∈(R g ||T 3 )] and [E cp ] to the receiver and in data transfer mode, the IoT sensor calculates the Euclidean parameter (x, y, z) and will send these parameters to the receiver. The operations of these three steps are elaborated in brief in the upcoming sections.
The important part of this research implies that it can give a deep understanding of cyberattacks so that the new policies can be made accordingly. The study posed an important question of the overall security of the system [8]. There have been various challenges in the non-technical implementa- Fig. 1 Considered phases in proposed technique tion of the system also, this is a major concern nowadays [9]. The reasons given by the study of "unsuccessful information technology projects" [10], for the failure of non-technical implementation are lack of support of top management, the business case is weak and project planning is poor. These kinds of problems are mostly possessed in the public sector. Several implications can be seen in the administrative history of the technological project in terms of technology adoption by government agencies [11]. Security is a tedious task in IoT, some of the concerns have arisen from the wireless sensor networks (WSNs) [12,13]. The practical limitation in implementing IoT-based services in the security mechanism of smart cities is related to the IoT characteristics [14]. Smart cities show a dynamic behavior as they have a continuously changing environment due to the trade-off between CPS devices and citizens. The other complications arise due to the diverse architectures present in the smart city. Smart cities are also facing several economic problems in recent years. The challenges related to financing include declination of budget [15], descending order of state aid [16], and enhance budget uncertainty [17,18]. In this paper, a secure data transmission technique has been introduced for IoT infrastructure. In this method, each IoT sensor (IOi) have to prove their legitimacy to the reader (Ri) and the base station (BSi) before the transmission of data. This technique will significantly improve the security of different data transmission services which will be helpful to improve the smart city infrastructure. The proposed technique resists many attacks such as Authentication attacks, User anonymity, forging attacks, and many more performed by the adversary.
The contribution of the paper is as follows: 1. A secure data transmission technique has been proposed, which includes three phases namely Registration, Authentication, and Data transfer. 2. Each IoT sensor (IOi) have to prove their legitimacy to the reader (Ri) and the base station (BSi) before the transmission of data. 3. The sensor node needs to send three Euclidean parameters to the receiver instead of recorded information. 4. The proposed technique resists many attacks such as Authentication attacks, User anonymity, forging attacks and many more attacks, which could be performed by the adversary.
In the first section, background related to smart cities and IoT security has been presented. The second section has the related literature and risks available in developing a smart city operation is described in the next section. The proposed secure data transmission technique has been discussed in the following section, also the analysis of the security has been investigated in the next section. The paper has been concluded in the next section with open issues.

Related works
It is necessary to authenticate as not to allow illegal participants into the network. There are so many conventional methods that are based on cryptography. The conventional method needs more time to process. One of the most common cryptography systems is RSA which requires a lot of time for its calculations. As there are so many limitations associated with conventional methods so, the researchers have proposed ECC (elliptic curve cryptosystem) for securing the network by doing the authentication [19]. The ECC is based on the Discrete Logarithm Problem (DLP) [20]. The proposed method is cost-effective but not secure as per individual users. The mobile users require a public key to access, it for authentication. There are several bilinear techniques propose to enhance the security level [21,22] based on the Id system, these systems do not require to save every one another public key, so that memory space can also have minimized and credentials of every individual are safe. The different variant of ID-based systems is the grid security system for verification of atmospheric conditions based on clouds [23][24][25]. The other methods are given based on the client-server technique which authenticates by bilinear pairing [26][27][28][29][30][31]. As compared to the ECC technique cloud computing technique is more compatible. In the ECC technique, the managing key has to be in a secret form otherwise if the attacker got the major managing key of the service provider then the privacy of data will be gone. To resolve this issue cloud-based technique is used in which users can access resources on, ondemand basis. Also, to improve the security in cloud-based techniques, the position and history of the user should be known prior so that the privacy of the user is secured. The privacy of the users is secured by the verification method of information for 'n' times, the value of 'n' changes based on intended time provided by the cloud network [32][33][34][35]. The authors propose the Merkle tree method which has four types of network initialization, cloud captivity, verification, and secure computing [31,36]. Recently, security policies and agreements are available for authentication like set up of the system, registration of the user, and authentication. These agreements provide security to all mobile users as they have a secret key that is only known to the individual user. The major weakness of this system is that an insider can take the master The authors identify that there is no security between user and system [37,38], the insider can identify the public key. In [39], the author proposes a collaborative task including security and energy-aware for D2D communication. This study measured the security workload by building a security model. The author has designed an authentication protocol using AI for real-time access to industrial medical. This authentication protocol can be overcome the various known attacks [40].
In the proposed method, each IoT sensor (IOi) have to prove their legitimacy to the reader (Ri) and the base station (BSi) before the transmission of data. This technique will significantly improve the security of different data transmission services which will be helpful to improve the smart city infrastructure. The proposed technique resists many attacks such as Authentication attacks, User anonymity, forging attacks, and many more performed by the adversary.

Inferences for safety and security for censorious infrastructure in smart cities
There are several risks while developing an efficient and reliable smart city operation. This section represents various risk factors related to smart cities (Fig. 2).

Risk of infrastructure in smart city
The lifeline of any city is the infrastructure of the system [41]. There are various risk factors associated with the concept of the infrastructure of the city. There are two types of concepts regarding the cybersecurity of smart cities. The first one shows a huge enhancement in computing capability that rapidly increases the attack on the network which should be defended at a level. All the smart devices such as televisions, refrigerators, cameras, routers can become a source of malicious activity as it uses different software's. Urban areas show more effectiveness as compare to rural ones [42]. The second concept shows the presence of actuators in the system that affects the infrastructure of the smart city (such as filters, heating elements, switches, and valves). These actua-tors control things but at the same, there is a risk of physical damage as well. Therefore, when both the things are combined sensors and actuators the theft of security increases more [43].

Operational security and information security
Recently, major threat is ransomware and malware that encrypts files. These kinds of ransomware ask for ransom from the owner to unlock the files. These individual threats brought pathetic situations for user's computers and organizational cyber cells [44]. There is a huge loss of data with crypto locker, wannacry, and Reventon-type ransomware [45]. Ransomware affects personal files, work files everything in personal and professional computers [46]. Some of the enterprises depend upon data operation where this ransomware damages the whole system and made it the worst case [47]. There is the various reported case also which are pending trials or pending appeals [48]. In the healthcare sector, there are series of cases, like the case of a presbyterian hospital in California affected by ransomware. The data of the hospital are crippled by ransomware [49]. The effects of wannacry ransomware have been seen in early 2017 at the sites of the British Health Service (NHS) [50][51][52]. The data operations performed at payment machine, the computer to tackle traffic data, public transportation system also affected by some ransomware sometimes [53]. The ransom asked for these attacks is in several dollars and bitcoins [54]. A case of a transport system shows an extreme example of a ransomware attack which frees the travel cost and lost revenue [55]. The other way to cope up with the situation is to clean up all files from the system.

Safety and functional impacts vs. monetary impacts
The cyber-attack has serious consequences concerning financial access and confidential data. These are basic conceptual changes including physical impacts are present in smart cities, IoT, and other operational embedded networks [56]. There are structures like water waste control systems, transportation networks, and grid systems that are also computercontrolled networks [64][65][66]. The real-time analysis and changes towards urban structures like parking systems to traffic lights, the connection between different portals and networks will make the smart city implementation more complex and insecure. The most important part for policymakers is to understand that 'smart' can be taken in many ways [67]. As the smart city contains different types of sensors and computers are embedded in the system that is prone to deceive, deviation, malicious nodes, and outside attack [68][69][70][71].

Proposed secure data transmission technique
In the proposed technique, it is considered that the receivers are directly connected with the base stations. The notations used for the proposed techniques are elaborated in Table 1. In this study, three major nodes have been taken into consideration for the proposed technique, which are IoT sensor (IOi), Receiver (Ri), and Base station (BSi). The IoT sensors are denoted by (IOi) {IO-IoT, i 1,..., n}, receivers are denoted by (Ri) {R Receiver, i 1,..., n}, and Base station are denoted by (BSi) {BS-Base station, i 1,..., n}. At sensor end, data are classified in two categories namely Primary data [P rd S r ||C d ||f rg ||I nf ] and secondary data [S cd N inf ||L att ||L ong ]. Here, the meaning of the primary data is the data that are linked to the secret information of the node, such as the node serial number, node capacity, frequency range, and real-time recorded information. The recorded information is the information that is being recorded by the IoT sensor for real-time event monitoring. On the other side, the meaning of the secondary data is the data that is not linked to secret information and which can be used publicly such as the longitude and latitude of the node. For this technique, only secondary data are utilizing as the part of transmission between sensor and receiver.
A brief structure of the proposed technique is shown in Fig. 3. The architecture is showing the three major steps of the proposed technique, which are registration, authentication, and data transfer. In the first phase, the IoT sensor has to perform the registration process by sending its Identity number along with the time stamp [(S iden )||T 1 ]. In response to this, the receiver will revert a private prime key P ri to the IoT sensor, which is useful in the upcoming steps at the sensor end. In parallel with P ri , the receiver provides P rb to the base station, where P ri and P ri contain the same prime values. In the authentication phase, the sensor has to share [λ i ∈(R g ||T 3 )] and [E cp ] to the receiver, and then, the receiver proceeds the λ r along with a different timestamp to the base station for the calculation of φ P r (x) S cd (x) . Base station has to reverts E cp to the receiver, which need to be matched with the E cp received from the IoT sensor. If the condition satisfies, then authentication will be completed. In data transfer mode, the IoT sensor calculates the Euclidean parameter (x, y, z) and will send these parameters to the receiver. The receiver will forward these parameters to the base station for further processing. The values of α will be calculated at the base station using the received Euclidean parameters and β . The operations of these steps are elaborated in brief in the upcoming sections.
Here, it is avoiding to transmit primary data as it contains secret information. It is also considered that various IoT sensors are connected with a receiver and these sensors can send [H e [P r ||r m ]] (hash function) Euclidean algorithm: Equation (2) represents the value of quotient of the division between two functions namely P r (x) and S cd (x). Equations (3) and (4) represent the values of encryption function and the Euclidean algorithm. α and β are the functions of recorded information and secondary information. X, Y , and Z are known as Euclidean parameters. The timestamp is included in all the messages processed by sensors or receivers. In the time stamp process, the transmitting message has to be framed along with the exact transmitting timing of the message. Timestamp will also be verified at both the end for avoiding the replay attack.

Registration phase
In the proposed technique, three phases have been considered namely the Registration phase, Authentication phase, and  In response of this, receiver will revert a private prime key P ri to the IoT sensor, which is useful in the upcoming steps at the sensor end. In parallel of P ri , receiver provides P rb to the base station, where P ri and P ri contains the same prime values.

Authentication phase
The authentication phase can be shown in Fig. 5. In the authentication phase, the IoT sensor has to prove its authenticity to the receiver. For this process, the sensor has to share [λ i ∈(R g ||T 3 )] and [E cp ] to the receiver, which is nothing but the authentication request along with a timestamp and encrypted data. Then, the receiver proceeds the λ r along with a different timestamp to the base station for the calculation of φ P r (x) S cd (x) . In response of this, base station reverts E cp to the receiver, which need to be matched with the E cp received from the IoT sensor. If condition satisfies, then authentication will be successfully completed .
The new sensor registration and authentication process are discussed in Algorithm 1, the algorithm for receiver and base station are also elaborated below.
Proof of the authentication procedure In this section, the proof of the authentication procedure is discussed. For the completion of authentication, the following condition should be verified- where E CP is encrypted function of Quotient, which is obtained after the division operation between two functions namely P r (x) and S cd (x) at IoT sensor. E cp is the encrypted function of Quotient, which is obtained after the division operation between two functions namely P r (x) and S cd (x) , and which is considered to be stored at the base station, where [H e [P r ||r m ]], P r and r m, both values are already sent to the base station by the receiver, therefore the same hash function can be applied at base station end.
If the outcome of the procedure is equal to zero, then the authentication will be completed, else the operation will be denied. The Hash function is used to provide the fixed size enciphered data and then that enciphered data will be used for further processing [72,73]. After the successful execution of the authentication process, a positive acknowledgment Pack will be transmitted to the IoT sensor from the receiver end.

Data transfer phase
The data transfer phase can be shown in Fig. 6. In data transfer mode, the IoT sensor calculates the Euclidean parameter (x, y, z) at their end and will send these parameters to the receiver. These parameters are calculated using the Euclidean Algo αx + βy z. Here, (x, y, z) parameters are not directly linked with the information part, so the transmission will take place without sharing the secret data. These parameters are calcu-lated using the Greatest Common Divisor operation between I nf and φ P r (x) S cd (x) . Receiver will forward these parameters to the base station for further processing. The values of α will be calculated at the base station using the received Euclidean parameters and β . Here, β is nothing but the Quotient, which is obtained after the division between two function namely P r (x) and S cd (x). β must be equal to β for retracting the correct information at the receiver side.

Fig. 6 Data transfer phase
Proof of the data transmission procedure At IOT sensor: The Euclidean parameters need to be calculated using Eq. (5).
where α and β are the functions of recorded information and secondary information.
The algo for processing the data at IoT sensor is as follows X, Y and Z are known as Euclidean parameters. The value of z has been calculated using Eq. (6).
apply the value of α and β in equation number (5), after the analysis, the value of x and y will be as follows in Eq.
IoT sensor calculate the Euclidean parameter (x, y, z) at their end and will send these parameters to the receiver. Here, (x, y, z) parameters are not directly linked with the information part, so the transmission will take place without sharing the secret data.
At the Receiver Receiver will forward these parameters to the base station for further processing. The algo for processing the data at receiver is as follows.
At the Base station The values of α will be calculated at the base station using the received Euclidean parameters and β . Here, β is nothing but the Quotient, which is obtained after the division between two functions namely P r (x) and S cd (x). β must be equal to β for retracting the correct information at the receiver side.
The value of x, y, z is: Put the value of x, y and z in Eq. (9): The value of α can be calculated using the above mathematical expression, the final value of α is as follows: Then, the final expression will as follows: The algo for processing the data at base station is as follows Where a and b are also the function of information I nf . Hence, it is verified that the communication can be confirmed between the IoT sensor and receiver without sharing secret information. In the proposed technique, the significance of the Euclidean theorem is to create complexity in the calculation of different parameters, and confusion in the way of the adversary or attacker. The proposed technique will be very useful in many applications of IoT such as smart city, smart banking and smart transport, etc.

The analysis of security
In this section, we have analyzed the security of the proposed technique with various features such as replay attack resistance, authentication attack and resistance to forging attack.  [57] Fuetal. [58] Chang et al. [59] Lietal. [60] Gui et al. [61] Min et al. [62] Ours Resistance to replay attack In the replay attack, an attacker can delay or repeat the transmission of the valid message [74].
In this attack, the attacker intercepts the data and retransmit it. The adversary cannot perform this attack in the proposed technique, because the time stamp Ti is included in all the messages processed by the sensor or receiver. The timestamp will be verified at both the end for avoiding the replay attack. The communication message can be dropped if the timestamp is not acceptable. Authentication attack In the proposed technique, the authentication procedure is very secured. Here, the IoT sensor sharing a secret message E cp to the receiver for performing the authentication. The secret message E cp is the function of two random variables which are P r (Prime number) and r m (random number) and these values are not fixed for each transaction. For the adversary, it is not possible to compute the exact value of E cp. Therefore , an attacker cannot perform an authentication attack.
Forging attack Forging is a dangerous attack performed by the attackers. In this attack, the adversary trying to forge the private key of the communication process [75]. In the proposed technique, IoT sensor sharing a secret message E cp to the receiver for performing the authentication. The secret message E cp is the function of two random variables which are P r (Prime number) and r m (random number) and these values are not fixed for each transaction. Therefore, it is not possible to find the exact values of P r and r m. A comparative analysis in terms of adversary attacks can be shown in Table 2 and Fig. 7. In Table 2, various attacks have been shown over which the proposed technique is compatible to overcome the adversary action.

Computational cost and comparative analysis
In this section, the efficiency of the proposed technique is computed in terms of computational cost and comparative analysis. Previously published approaches have been considered for performing the comparative analysis.

Computational cost analysis
In the proposed technique, the computational cost has been computed using the time taken to authenticate one user or n number of users. The studies considered for the comparative analysis are Sun's et al. [31] scheme, Dass et al. [57] scheme, Chang et al. [59]. scheme, Fu et al. [58] scheme, Chen et al. [63] scheme and Gui et al. [61] scheme. Following parameters have been considered for the analysis of computational cost T M : division operation, T D : division operation, T X : cost of XOR operation, T F : cost of flip operation, T S cost of circular shift operation, T P : cost of paring operation, T H : cost of hash function, T A : division operation and T R : cost of random number generation operation.
From Table 3, it can be seen that the computation cost of the proposed technique is comparatively very less. The computational cost of the proposed technique is 1T H , 2T P , and 1T D only. Hence, the proposed algo is computationally efficient than the previous techniques.
The proposed approach is compatible to provide security against most of the attacks performed by the attackers. Two random variables and complex mathematical calculations are making the proposed technique more reliable than others.

Conclusion
In this paper, a secure data transmission technique has been introduced for IoT infrastructure. Each IoT sensor (IOi) have to prove their legitimacy to the reader (Ri) and the base station (BSi) before the transmission of data. The proposed technique includes three phases namely registration, authentication, and data transfer phase to complete communication between sensor and receiver. For security enhancements, the sensor node needs to send three Euclidean parameters to the receiver instead of recorded information. The proof of correction shows that the required information is not supposed to send through an online medium, it is obtained at the receiver using the Euclidean parameters shared by the IoT Sensors. This technique will significantly improve the security of data transmission services, which will lead to improving the smart city infrastructure. Figure 5 shows that the proposed technique resists many attacks such as Authentication attacks, User anonymity, forging attacks, and many more performed by the adversary. The authentication execution time for the proposed technique is very less in comparison with other techniques. Furthermore, a practical overview is needed for the proposed technique, which will have less execution time.
An encrypted timestamp will be the next option to increase the complexity and confusion in the way of attackers. A more complex authentication approach for device-to-device communication in IoT infrastructure will be the next objective of this study.
Funding No funding.

Availability of data and materials Not applicable.
Code availability Not applicable.

Conflict of interest
There is no conflict of interest.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copy-right holder. To view a copy of this licence, visit http://creativecomm ons.org/licenses/by/4.0/.