Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795307
Pietro Battistoni, M. Sebillo, G. Vitiello
The present paper outlines the framework design of an Application Agnostic Architecture for Fog and Mist Computing systems. An analysis explains how the proposed architecture satisfies the primary characteristics of a Fog and Mist computing paradigm by using low power and low-cost components. It also introduces an Indoor Navigation System and a Notification service as a use-case, to assess the proposed framework as a Fog-Computing architecture while demonstrating how it can address Mobile and IoT challenges.
{"title":"Experimenting with a Fog-computing Architecture for Indoor Navigation","authors":"Pietro Battistoni, M. Sebillo, G. Vitiello","doi":"10.1109/FMEC.2019.8795307","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795307","url":null,"abstract":"The present paper outlines the framework design of an Application Agnostic Architecture for Fog and Mist Computing systems. An analysis explains how the proposed architecture satisfies the primary characteristics of a Fog and Mist computing paradigm by using low power and low-cost components. It also introduces an Indoor Navigation System and a Notification service as a use-case, to assess the proposed framework as a Fog-Computing architecture while demonstrating how it can address Mobile and IoT challenges.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122421407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795315
Eric Gyamfi, J. A. Ansere, Lina Xu
The Security of the Internet of Things (IoT) has gained great attention recently due to the increased cyber-threats in those systems. IoT technologies have many use cases and real-life applications and the IoT devices have been widely produced by industries. However, the security issue of IoT devices has not been fully resolved, leaving those devices exposing to cyber-threats. IoT end devices are normally resource constraint, which makes the implementation of traditional security solutions extremely hard if not impossible. The emergence of IoT-Edge computing technologies can grant the IoT devices the ability to overcome the local resource constraint problem. The current industrial revolution (Industry 4.0) requires IoT devices to be secured in its data transmission, and protected from network Intrusions. Since many IoT devices reply on the unsecured Internet as a means for data transmission, there is an urgent need to provide a public key cryptographic technique to protect the end-to-end transmission between those IoT devices. In this paper, based on the Elliptic Curve Cryptographic (ECC) technique, we have proposed a lightweight asymmetric security solution to enhance secured transmission of data through utilising the IoT-Edge computing architecture. We also have successfully embedded our lightweight cryptography on the edge, and the IoT device. The experimental results has shown that the proposed lightweight ECC security system can provide better practice when implemented in the IoT-Edge environment.
{"title":"ECC Based Lightweight Cybersecurity Solution For IoT Networks Utilising Multi-Access Mobile Edge Computing","authors":"Eric Gyamfi, J. A. Ansere, Lina Xu","doi":"10.1109/FMEC.2019.8795315","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795315","url":null,"abstract":"The Security of the Internet of Things (IoT) has gained great attention recently due to the increased cyber-threats in those systems. IoT technologies have many use cases and real-life applications and the IoT devices have been widely produced by industries. However, the security issue of IoT devices has not been fully resolved, leaving those devices exposing to cyber-threats. IoT end devices are normally resource constraint, which makes the implementation of traditional security solutions extremely hard if not impossible. The emergence of IoT-Edge computing technologies can grant the IoT devices the ability to overcome the local resource constraint problem. The current industrial revolution (Industry 4.0) requires IoT devices to be secured in its data transmission, and protected from network Intrusions. Since many IoT devices reply on the unsecured Internet as a means for data transmission, there is an urgent need to provide a public key cryptographic technique to protect the end-to-end transmission between those IoT devices. In this paper, based on the Elliptic Curve Cryptographic (ECC) technique, we have proposed a lightweight asymmetric security solution to enhance secured transmission of data through utilising the IoT-Edge computing architecture. We also have successfully embedded our lightweight cryptography on the edge, and the IoT device. The experimental results has shown that the proposed lightweight ECC security system can provide better practice when implemented in the IoT-Edge environment.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129996565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795354
Muder Almiani, A. Razaque, Liu Yimu, M. J. Khan, Tang Minjie, Mohammed Alweshah, Saleh Atiewi
In recent years, the application of Bluetooth has always been the highly debated topic among the researches. Through the Bluetooth protocol, Bluetooth can implement the data switching in short distance between various devices. Nevertheless, BlueBorne Attack makes the seemingly stable Bluetooth protocols full of vulnerabilities. Our research will concentrate on predicting the BlueBorne Attack with the following directions: the working mechanism, the working methods and effective range of BlueBorne. Based on the comprehensive review of recent peer-reviewed researches, this project provides a new model based on application layer to solve the security problem of BlueBorne. The paper asserts that compared with the previous research, the unique model has better consequence with highly stability.
{"title":"Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending","authors":"Muder Almiani, A. Razaque, Liu Yimu, M. J. Khan, Tang Minjie, Mohammed Alweshah, Saleh Atiewi","doi":"10.1109/FMEC.2019.8795354","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795354","url":null,"abstract":"In recent years, the application of Bluetooth has always been the highly debated topic among the researches. Through the Bluetooth protocol, Bluetooth can implement the data switching in short distance between various devices. Nevertheless, BlueBorne Attack makes the seemingly stable Bluetooth protocols full of vulnerabilities. Our research will concentrate on predicting the BlueBorne Attack with the following directions: the working mechanism, the working methods and effective range of BlueBorne. Based on the comprehensive review of recent peer-reviewed researches, this project provides a new model based on application layer to solve the security problem of BlueBorne. The paper asserts that compared with the previous research, the unique model has better consequence with highly stability.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125854812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/fmec.2019.8795358
{"title":"FMEC 2019 Message from the General Chairs","authors":"","doi":"10.1109/fmec.2019.8795358","DOIUrl":"https://doi.org/10.1109/fmec.2019.8795358","url":null,"abstract":"","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"30 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129361684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795326
E. Effiok, E. Liu, Jon Hitchcock
IoT application in health care provides ways to monitor and collect health related biomarkers, in particular, lifestyle related data, by recording and analyzing long-term data, to provide insight to patients’ status. In order to make most use of this application, linking the collected patients’ data with a disease predictive model will generate a personalized disease progression and predictions. Various risk factors have been researched extensively to find the effect on the disease. However, risk factors are fragmented all over medical literature, and often each publication reports on one or a few risk factors, a combination of several of those factors, often from different research. In this paper, we propose an approach to explore the combination of risk factors. The outcome will form a base for a complete risk prediction model that can be used for many health applications.
{"title":"Lifestyle Risk Association Aggregation","authors":"E. Effiok, E. Liu, Jon Hitchcock","doi":"10.1109/FMEC.2019.8795326","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795326","url":null,"abstract":"IoT application in health care provides ways to monitor and collect health related biomarkers, in particular, lifestyle related data, by recording and analyzing long-term data, to provide insight to patients’ status. In order to make most use of this application, linking the collected patients’ data with a disease predictive model will generate a personalized disease progression and predictions. Various risk factors have been researched extensively to find the effect on the disease. However, risk factors are fragmented all over medical literature, and often each publication reports on one or a few risk factors, a combination of several of those factors, often from different research. In this paper, we propose an approach to explore the combination of risk factors. The outcome will form a base for a complete risk prediction model that can be used for many health applications.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795333
Lylia Alouache, M. Maachaoui, M. Aliouat, Rachid Chelouah
The progress of wireless technologies in recent years has tipped the automotive industry towards the digital world with multiple communication systems forming Internet of Vehicles (IoV). These communication systems are subject to disturbances and alterations due to the wireless and dynamic characteristics of vehicles. IoV aims to integrate new information services, safety applications, and internet services, based on the benefits of cloud computing, It tries to improve safety and comfort on the road. The deployment of these services requires messages to be exchanged between the vehicles in a secure manner. Consequently, routing and security topics are crucial to provide a quality of services and to preserve the data integrity. The Software Defined Networking (SDN) architecture is the way that can guarantee these two issues. The purpose of this paper is, firstly, to present the impact of SDN architecture in a vehicular network. Besides, as the robustness of the routing protocols depends on the integrity and authenticity of the routing rules, an improvement of the HSDN-GRA vehicular routing protocol is also described. This improvement develops a distributed trust model and aims to secure the communication between the control plane and the data plane. The goal is to secure the southbound interface between the defined semi-centralized controller and the other vehicles, as well as the Vehicle to Vehicle (V2V) communication.
{"title":"Securing Southbound Interface of HSDN-GRA Vehicular Routing Protocol using a Distributed Trust","authors":"Lylia Alouache, M. Maachaoui, M. Aliouat, Rachid Chelouah","doi":"10.1109/FMEC.2019.8795333","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795333","url":null,"abstract":"The progress of wireless technologies in recent years has tipped the automotive industry towards the digital world with multiple communication systems forming Internet of Vehicles (IoV). These communication systems are subject to disturbances and alterations due to the wireless and dynamic characteristics of vehicles. IoV aims to integrate new information services, safety applications, and internet services, based on the benefits of cloud computing, It tries to improve safety and comfort on the road. The deployment of these services requires messages to be exchanged between the vehicles in a secure manner. Consequently, routing and security topics are crucial to provide a quality of services and to preserve the data integrity. The Software Defined Networking (SDN) architecture is the way that can guarantee these two issues. The purpose of this paper is, firstly, to present the impact of SDN architecture in a vehicular network. Besides, as the robustness of the routing protocols depends on the integrity and authenticity of the routing rules, an improvement of the HSDN-GRA vehicular routing protocol is also described. This improvement develops a distributed trust model and aims to secure the communication between the control plane and the data plane. The goal is to secure the southbound interface between the defined semi-centralized controller and the other vehicles, as well as the Vehicle to Vehicle (V2V) communication.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115296466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795310
G. Varkonyi, A. Kertész, Szilvia Varadi
Recent advances in Information and Communications Technology (ICT) are expanding the world of Internet services with smart applications running on interconnected smart devices. Cloud computing already started to dominate the Internet, and with the appearance of Internet of Things (IoT), and Fog and Edge computing IoT-Fog-Cloud systems are formed. Beside such architectural developments, Artificial Intelligence (AI) methods receive new interests by managing Big Data coming from these complex, heterogeneous systems. In May 2018, the General Data Protection Regulation (GDPR) came into force in the European Union (EU) to strengthen users’ influence on their personal data. Though the initiative of the regulation was known two years before, the 25th May, 2018 was a shock for many ICT actors. The privacy awareness of end-users of the Internet of Services is also wanting, and the emergence of new technologies in this field further complicates the identification of data protection responsibilities. In this paper summarize the GDPR novelties affecting the design and operation of IoT applications in fogs and clouds, we present the results of a recent survey on the GDPR awareness of international students on privacy issues related to the usage of IoT-Fog-Cloud systems and AI solutions. Based on the results of the survey, we also state our implications for safer utilization of these complex ICT systems in the future.
{"title":"Privacy-awareness of Users in our Cloudy Smart World","authors":"G. Varkonyi, A. Kertész, Szilvia Varadi","doi":"10.1109/FMEC.2019.8795310","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795310","url":null,"abstract":"Recent advances in Information and Communications Technology (ICT) are expanding the world of Internet services with smart applications running on interconnected smart devices. Cloud computing already started to dominate the Internet, and with the appearance of Internet of Things (IoT), and Fog and Edge computing IoT-Fog-Cloud systems are formed. Beside such architectural developments, Artificial Intelligence (AI) methods receive new interests by managing Big Data coming from these complex, heterogeneous systems. In May 2018, the General Data Protection Regulation (GDPR) came into force in the European Union (EU) to strengthen users’ influence on their personal data. Though the initiative of the regulation was known two years before, the 25th May, 2018 was a shock for many ICT actors. The privacy awareness of end-users of the Internet of Services is also wanting, and the emergence of new technologies in this field further complicates the identification of data protection responsibilities. In this paper summarize the GDPR novelties affecting the design and operation of IoT applications in fogs and clouds, we present the results of a recent survey on the GDPR awareness of international students on privacy issues related to the usage of IoT-Fog-Cloud systems and AI solutions. Based on the results of the survey, we also state our implications for safer utilization of these complex ICT systems in the future.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124772133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795356
Sarra Mehamel, S. Bouzefrane, K. Slimani, M. Daoui
Edge caching is one of the most emerging technologies recognized as a content retrieval solution in the edge of the network. It has been also considered as enabling technology of mobile edge computing (MEC) that presents an interesting opportunity to perform caching services. Particularly, the MEC servers are implemented directly at the base stations (BSs) which enable edge caching and ensure deployment in close-proximity to the mobile users. However, the integration of servers in mobile edge computing environment (base stations) complicates the energy saving issue because the power consumed by mobile edge computing servers (MECS) is costly especially when the load changes dynamically over time. Furthermore, users with mobile devices arise their demands, introducing the challenge of handling such mobile content requests beside the limited caching size. Thus, it is necessary and crucial for caching mechanisms to consider the mentioned factors, meanwhile most existing studies focus on cache allocation, content popularity and cache design. In this paper, we present an energy-efficient fuzzy caching strategy for edge devices that takes into consideration four influencing features of mobile environment, while introducing a hardware implementation using Field-Programmable Gate Array (FPGA) to cut the overall energy requirements.
{"title":"New Caching System Under Uncertainty for Mobile Edge Computing","authors":"Sarra Mehamel, S. Bouzefrane, K. Slimani, M. Daoui","doi":"10.1109/FMEC.2019.8795356","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795356","url":null,"abstract":"Edge caching is one of the most emerging technologies recognized as a content retrieval solution in the edge of the network. It has been also considered as enabling technology of mobile edge computing (MEC) that presents an interesting opportunity to perform caching services. Particularly, the MEC servers are implemented directly at the base stations (BSs) which enable edge caching and ensure deployment in close-proximity to the mobile users. However, the integration of servers in mobile edge computing environment (base stations) complicates the energy saving issue because the power consumed by mobile edge computing servers (MECS) is costly especially when the load changes dynamically over time. Furthermore, users with mobile devices arise their demands, introducing the challenge of handling such mobile content requests beside the limited caching size. Thus, it is necessary and crucial for caching mechanisms to consider the mentioned factors, meanwhile most existing studies focus on cache allocation, content popularity and cache design. In this paper, we present an energy-efficient fuzzy caching strategy for edge devices that takes into consideration four influencing features of mobile environment, while introducing a hardware implementation using Field-Programmable Gate Array (FPGA) to cut the overall energy requirements.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795342
F. Buccafurri, G. Lax, A. Russo
Fog computing is the answer to the emerging need of mobility support, mostly due to the deployment of the Internet of Things. In this paper, motivated by the many security and privacy issues found in handling device’s handover in Fog computing, we propose a new approach based on the possibilities offered by the recent EU regulation eIDAS, for improving the security in the identification of users, when they require data mobility.
{"title":"Exploiting Digital Identity for Mobility in Fog Computing","authors":"F. Buccafurri, G. Lax, A. Russo","doi":"10.1109/FMEC.2019.8795342","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795342","url":null,"abstract":"Fog computing is the answer to the emerging need of mobility support, mostly due to the deployment of the Internet of Things. In this paper, motivated by the many security and privacy issues found in handling device’s handover in Fog computing, we propose a new approach based on the possibilities offered by the recent EU regulation eIDAS, for improving the security in the identification of users, when they require data mobility.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128489740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795312
M. Rathore, Y. Jararweh, M. Raheel, Anand Paul
The smart city is established through continuous analytics of the city data that is harvested from various smart systems and IoT sensors deployed in the city such as, smart homes, buildings, and parking, smart pollution monitoring, transportation sensors, etc., which generates continuous streams of high-speed data. Lack of security and privacy in the smart city system while communicating with the central analysis building gives the control of the city to the cyber criminals. However, offering privacy and security for such a continuous high-speed communication requires an efficient security model without introducing any delay in the real-time communication of the smart city. Thus, to cater with these challenges, in this paper, we proposed an efficient authentication and key management model among the smart city entities such as, remote smart systems (RSS) (i.e., smart homes, smart parkings, smart health systems, environment control system, etc.), remote users (U), and central city analysis building. First, every remote system and citizen have to be registered with the system through secure registration phase. Later, the session keys are generated and shared among the smart city entities that are used in secure routine communication. Moreover, the protocol is enabled with an efficient secure communication mechanism with the ability of parallel processing that makes it possible to work in a real-time environment. Finally, the security of the proposed model is verified informally through mathematical analysis and formally by implementing it using AVISPA tool (Automated Validation of Internet Security Protocols and Applications). Also, the proposed protocol is evaluated in terms of its efficiency and capability to work in a real-time environment. The results show that the protocol is secure against known cyber-attacks, is efficient, and faster than the existing schemes.
{"title":"Securing High-Velocity Data: Authentication and Key Management Model for Smart City Communication","authors":"M. Rathore, Y. Jararweh, M. Raheel, Anand Paul","doi":"10.1109/FMEC.2019.8795312","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795312","url":null,"abstract":"The smart city is established through continuous analytics of the city data that is harvested from various smart systems and IoT sensors deployed in the city such as, smart homes, buildings, and parking, smart pollution monitoring, transportation sensors, etc., which generates continuous streams of high-speed data. Lack of security and privacy in the smart city system while communicating with the central analysis building gives the control of the city to the cyber criminals. However, offering privacy and security for such a continuous high-speed communication requires an efficient security model without introducing any delay in the real-time communication of the smart city. Thus, to cater with these challenges, in this paper, we proposed an efficient authentication and key management model among the smart city entities such as, remote smart systems (RSS) (i.e., smart homes, smart parkings, smart health systems, environment control system, etc.), remote users (U), and central city analysis building. First, every remote system and citizen have to be registered with the system through secure registration phase. Later, the session keys are generated and shared among the smart city entities that are used in secure routine communication. Moreover, the protocol is enabled with an efficient secure communication mechanism with the ability of parallel processing that makes it possible to work in a real-time environment. Finally, the security of the proposed model is verified informally through mathematical analysis and formally by implementing it using AVISPA tool (Automated Validation of Internet Security Protocols and Applications). Also, the proposed protocol is evaluated in terms of its efficiency and capability to work in a real-time environment. The results show that the protocol is secure against known cyber-attacks, is efficient, and faster than the existing schemes.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124335643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}