Abstract
Real-time communication is a significant aspect of Internet of Things (IoT). IoT-enabled devices requires the immediate adoption of the highly distributed and heterogeneous framework of collateral merits. Moreover, cloud-based streaming services for IoT have disadvantages such as the inability to provide low latency, mobility support, location-awareness, and real-time data handling, which makes ubiquitous connectivity between the IoT device and server. At the same time, the concept of dew computing modifies the current mechanism of cloud-based services for IoT. It minimizes the response time of comprehensive data, which was collected by nearby resources. However, speedy advancement in IoT directs the evolving security aspects to address emerging challenges. To address the security issues, a mutual authentication architecture has been introduced for dew computing, which ensures secure and authorized session establishment without the requirement of a trusted server. The main objective of the proposed framework is to avoid bottleneck situations without compromising efficiency and security in real-time communication to IoT users through dew computing. To ensure the correctness of protocol, proof of security and simulation using AVISPA are presented. Analysis of performance and comparative study is also conducted to show the advantage in efficiency.
Similar content being viewed by others
References
Guo Y, Mi Z, Yang Y, Ma H, Obaidat MS (2019) Efficient network resource preallocation on demand in multitenant cloud systems. IEEE Syst J 13:4027–4038
Sharma B, Obaidat MS (2019) Comparative analysis of iot based products, technology and integration of iot with cloud computing. IET Netw 9:43–47
Park D (2018) Future computing with iot and cloud computing. J Supercomput 74:6401–6407
Vora J, Kaneriya S, Tanwar S, Tyagi S, Kumar N, Obaidat M (2019) Tilaa: Tactile internet-based ambient assistant living in fog environment. Future Gener Comput Syst 98:635–649
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ACM, pp 13–16
Pradeepa MAM, Gomathi B (2017) Towards fog computing based cloud sensor integration for internet of things. Int J Comput Sci Eng Commun 5:1761–1773
Bhatia T, Verma A (2017) Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. J Supercomput 73:2558–2631
Modi C, Patel D, Borisaniya B, Patel A, Rajarajan M (2013) A survey on security issues and solutions at different layers of cloud computing. J Supercomput 63:561–592
Wang Y (2016) Definition and categorization of dew computing. Open J Cloud Comput (OJCC) 3:1–7
Tao D, Ma P, Obaidat MS (2019) Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks. Int J Commun Syst 32:e4099
Gupta DS, Islam SH, Obaidat MS (2019) A secure identity-based three-party authenticated key agreement protocol using bilinear pairings. In: International Conference on Innovative Data Communication Technologies and Application, Springer, pp 1–11
Wu T-Y, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen C-M (2020) An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access 8:28096–28108
Meshram C, Obaidat MS, Lee C-C, Meshram SG (2020) An efficient key authentication procedure for ind-cca2 secure paillier-based cryptosystem. Soft Comput 24:6531–6537
Pan Y, Thulasiraman P, Wang Y (2018) Overview of cloudlet, fog computing, edge computing, and dew computing. In: Proceedings of The 3rd International Workshop on Dew Computing, pp 20–23
Ristov S, Cvetkov K, Gusev M (2016) Implementation of a horizontal scalable balancer for dew computing services. Scalable Comput Practice Exp 17:79–90
Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, IEEE, pp 1–8
Wang Y (2015) Cloud-dew architecture. Int J Cloud Comput 4:199–210
Butun I, Erol-Kantarci M, Kantarci B, Song H (2016) Cloud-centric multi-level authentication as a service for secure public safety device networks. IEEE Commun Mag 54:47–53
Rindos A, Wang Y (2016) Dew computing: The complementary piece of cloud computing. In: 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom). IEEE, pp 15–20
Sojaat Z, Skalaa K (2017) The dawn of dew: Dew computing for advanced living environment. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, pp 347–352
Dolui K, Datta SK (2017) Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In: 2017 Global Internet of Things Summit (GIoTS). IEEE, pp 1–6
Gusev M (2017) A dew computing solution for iot streaming devices. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, pp 387–392
Gordienko Y, Stirenko S, Alienin O, Skala K, Sojat Z, Rojbi A, Benito JL, González EA, Lushchyk U, Sajn L et al. (2017) Augmented coaching ecosystem for non-obtrusive adaptive personalized elderly care on the basis of cloud-fog-dew computing paradigm. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, pp 359–364
Mane TS, Agrawal H (2017) Cloud-fog-dew architecture for refined driving assistance: The complete service computing ecosystem. In: 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB), IEEE, pp 1–7
Srinivas J, Das AK, Kumar N, Rodrigues J (2018) Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans Dependable Secure Comput 17:942–956
Guan Y, Shao J, Wei G, Xie M (2018) Data security and privacy in fog computing. IEEE Network 32(5):106–111. https://doi.org/10.1109/MNET.2018.1700250
Patel HM, Chaudhari RR, Prajapati KR, Patel AA (2018) The interdependent part of cloud computing: Dew computing. In: Intelligent communication and computational technologies, Springer, pp 345–355
Smart NP (2002) Identity-based authenticated key agreement protocol based on weil pairing. Electron lett 38:630–632
Chen L, Cheng Z, Smart NP (2007) Identity-based key agreement protocols from pairings. Int J Inf Secur 6:213–241
He D, Wang D (2015) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9:816–823
Ying B, Nayak A (2014) Efficient authentication protocol for secure vehicular communications. In: 2014 IEEE 79th Vehicular Technology Conference (VTC Spring). IEEE, pp 1–5
He D, Kumar N, Khan MK, Wang L, Shen J (2016) Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst J 12:1621–1631
Tsai J-L, Lo N-W (2015) A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 9:805–815
Chen C-M, Xiang B, Liu Y, Wang K-H (2019) A secure authentication protocol for internet of vehicles. IEEE Access 7:12047–12057
Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems 91:475–492
Botta A, Gallo L, Ventre G (2019) Cloud, fog, and dew robotics: architectures for next generation applications. In: 2019 7th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), IEEE, pp 16–23
Ray PP (2019) Minimizing dependency on internetwork: Is dew computing a solution? Trans Emerg Telecommun Technol 30:e3496
Longo M, Hirsch M, Mateos C, Zunino A (2019) Towards integrating mobile devices into dew computing: A model for hour-wise prediction of energy availability. Information 10:86
Viganò L (2006) Automated security protocol analysis with the avispa tool. Electron Notes Theor Comput Sci 155:61–86
Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 139–155
Jakobsson M, Pointcheval D (2001) Mutual authentication for low-power mobile devices. In: International Conference on Financial Cryptography, Springer, pp 178–195
Amin R, Islam SH, Biswas G, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener Comput Syst 80:483–495
Chandrakar P, Om H (2017) A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ecc. Comput Commun 110:26–34
Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Trans Dependable Secure Comput 17:1133–1146
Odelu V, Das AK, Wazid M, Conti M (2018) Provably secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid 9:1900–1910
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Rana, S., Obaidat, M.S., Mishra, D. et al. Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems. J Supercomput 78, 3696–3714 (2022). https://doi.org/10.1007/s11227-021-04003-z
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-04003-z