Abstract
The new era of the Internet of Everything (IoE) applications demands low latency along with security into the networks. The cloud-based architecture alone cannot provide low response time to the users or mobile devices (like phone, laptop, sensors device, etc.). Therefore between mobile devices and cloud, edge devices (known as Fog device) are introduced as middleware device. From the edge devices, users can get information from local devices without interacting with the cloud via the Internet or radio. In such complicated networks, security preservation in communications becomes a challenging task. The security protocols for critical communication in such applications (e-medical, e-banking) are based on the architecture of the networks which can be centralized or distributed or hybrid (a mixture of centralized and distributed). This book chapter discusses the different security protocols in communications for the aforementioned architectures which can be designed for Mobile Edge Computing (MEC) based IoE applications. Moreover, this chapter covers (a) architectures and their security threats, (b) necessity of security model in such applications, (c) different secure communication protocols for those applications, (d) challenges to design security protocols to reduce response time, and latency (e) the future direction of this research domain which can be explored more.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bradley, J., Barbier, J., Handler, D.: Embracing the Internet of Everything To Capture Your Share of $14.4 Trillion. published by cisco (2013). https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoE_Economy.pdf
Cisco IoT. http://www.cisco.com/web/solutions/trends/iot/overview.html
Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., Lv, W.: Edge Computing Security: State of the Art and Challenges. in Proceedings of the IEEE. vol. 107. no. 8 (2019) 1608–1631.
Antonakakis et al.: Understanding the Mirai botnet. in Proc. of 26th USENIX Secur. Symp. Vancouver, BC, Canada: USENIX Association (2017) 1093–1110.
Dutta, J., Roy, S., C. Chowdhury, C.: Unified framework for IoT and smartphone based different smart city related applications. Microsyst Technol. Vol. 25. (2019) 83–96.
Maitra, T., Giri, D.,: An Efficient Biometric and Password-Based Remote User Authentication using Smart Card for Telecare Medical Information Systems in Multi-Server Environment. Journal of Medical Systems. Vol. 38. no. 12, article no. 142, (2014) 1–19.
Giri, D., Maitra, T., Amin, R., Srivastava, P. D.: An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems. Journal of Medical Systems. Vol. 39. article no. 145, 2015.
Hu, L., Ni, Q.: IoT-Driven Automated Object Detection Algorithm for Urban Surveillance Systems in Smart Cities. IEEE Internet of Things Journal. Vol. 5, no. 2, (2018) 747–754.
Dutta, J., Wang, Y., Maitra, T., Islam, SK. H., Rawal, B. S., Giri, D.: ES3B: Enhanced Security System for Smart Building using IoT. in Proc. of The 3rd IEEE International Conference on Smart Cloud (SmartCloud 2018). New York, USA, (2018) 158–165.
Ou, Q., Zhen, Y., Li, X., Zhang, Y., Zeng, L.: Application of Internet of Things in Smart Grid Power Transmission. in the proc. of 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing. Vancouver, BC, (2012) 96–100.
Kong, L., Khan, M. K., Wu, F., Chen, G., Zeng, P.: Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges. IEEE Communications Magazine. Vol. 55. no. 1. (2017) 62–68.
Hsu, R., Lee, J., Quek, T. Q. S., Chen, J.: Reconfigurable Security: Edge-Computing-Based Framework for IoT, IEEE Network. Vol. 32. no. 5. (2018) 92–99.
Giri, D., Obaidat, M. S., Maitra, T.: SecHealth: An Efficient Fog based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System. in Proc. of IEEE GLOBECOM 2017. Singapore, (2017) 1–6.
Maitra, T., Obaidat, M. S., Islam, SK, H., Giri, D., Amin, R.: Security analysis and design of an efficient ecc-based two-factor password authentication scheme. Security and Communication Networks. Vol. 9. no. 17. (2016) 4166–4181.
Kaur, K., Garg, S., Kaddoum, G., Guizani, M., Jayakody, D. N. K.: A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing. in Proc. of IEEE GLOBECOM 2019. Waikoloa, HI, USA, (2019) 1–6.
Omala, A.A, Kibiwott, K.P., Li, F.: An efficient remote authentication scheme for wireless body area network. Journal of Medical Systems. Vol. 41. no. 2. (2016) 1–9.
Cheng, Q., Zhang, X., and Ma, J.: Icasme: An improved cloud-based authentication scheme for medical environment. Journal of Medical Systems, Vol. 41. no. 3 (2017) 1–14.
He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, Vol. 11. no. 4, (2016) 1–12.
Maitra, T., Roy, S.: Secpms: An efficient and secure communication protocol for continuous patient monitoring system using body sensors. in proc. of 9th International Conference on Communication Systems and Networks (COMSNETS 2017), Bangalore, India, (2017) 322–329.
Mahmood, K., Li, X., Chaudhry, S.A., Naqvi, H., Kumari, S., Sangaiah, A.K., Rodrigues, J.J.P.C.: Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Future Generation Computer Systems. Vol. 88. (2018) 491–500.
Wang, Z.: A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity. Future Generation Computer Systems, Vol. 82. (2018) 342–348.
Shamir, A.: How to Share a Secret. Com. ACM, Vol. 22. no. 11. (1979) 612–613.
Pang, H.H., and K. Tan, K.: Authenticating query results in edge computing. in proc. of 20th International Conference on Data Engineering. Boston, MA, USA, (2004) 560–571.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Maitra, T., Giri, D., Sarkar, A. (2021). Security in Critical Communication for Mobile Edge Computing Based IoE Applications. In: Mukherjee, A., De, D., Ghosh, S.K., Buyya, R. (eds) Mobile Edge Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-69893-5_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-69893-5_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69892-8
Online ISBN: 978-3-030-69893-5
eBook Packages: Computer ScienceComputer Science (R0)