Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WIRELESS GRID RESOURCE SHARING PROTOCOL

google+
Views: 115                 

Author :  Tyson Brooks

Affiliation :  Syracuse University

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  13, 1/2, April, 2022

Abstract :


The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing and wireless grids has resulted in the widespread deployment of relatively immature technology. These technologies, which will primarily use 5G wireless communication networks, are becoming popular because they can be deployed quickly with little infrastructure and lends themselves to environments utilizing numerous internet connected devices (ICD). There are, however, many significant challenges faced by security designers, engineers and implementers of these networks in ensuring that the level of security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected by a robust security architecture due to these technologies being plagued with security problems. The authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new information system platforms. This article identifies an authentication process required for these ICDs, which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud network through a wireless grid authentication process. The purpose of this article is to begin to hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and mobile edge computing clouds to create this new IoT architecture. An authentication process developed from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors depending on their capability to handle five primary functions: management of identification [ID] and presence, permissions management, data transferability, application-programming interface [API] and security.

Keyword :  Wireless grids, authentication, fog computing, internet of things, mobile edge computing

Journal/ Proceedings Name :  International Journal of Ubiquitous Computing (IJU)

URL :  https://aircconline.com/iju/V13N2/13222iju01.pdf

User Name : jessy
Posted 09-05-2022 on 20:24:19 AEDT



Related Research Work

  • Understanding The Worldwide Paths Towards The Creation Of True Intelligence For Machines
  • An Advantageous And User-friendly Mobile Program To Benefit Students In Seeking Their Suitable Colleges Through The Use Of Web Scraping, Machine Learning, And Frontend Design
  • An Overview Of Copy Move Forgery Detection Approaches
  • Scaled Quantization For The Vision Transformer

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals