Key Pre-distribution Scheme in Fog Networks with Multi Clouds

Document Type : Research Paper

Authors

1 Department of Computer Engineering, Qom Branch, Islamic Azad University, Qom, Iran.

2 Department of Computer Engineering, Shahed University, Tehran, Iran.

3 Department of Computer Engineering, Shahed University, Tehran, Iran

4 Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran.

Abstract

Creating a secure communication channel in hierarchical networks is a very important issue and several algorithms have been proposed for it. Unfortunately, due to limited resources in fog networks, which are a special type of hierarchical networks, it is not possible to use conventional algorithms. In this article, we have presented an algorithm to create a secure communication channel on fog networks, which is based on key pre-distribution and is used for multi-cloud fog networks. In this method, by using the SBIBD, blocks are generated to be assigned to the cloud nodes, and by using the residual design on the SBIBD, classes and blocks are created to be assigned to the fog nodes and end devices. The results show that the proposed method increases scalability and reduces communication, memory and computing overheads. The probability of capturing the network in the proposed method is about 0 and its connectivity is about 1.

Keywords


  1. Asghari, A.M. Rahmani, and H.H.S. Javadi, “Privacy-aware cloud service composition based on QoS optimization in Internet of Things,” Journal of Ambient Intelligence and Humanized Computing, vol. 13, no. 11, pp. 5295-5320, Jan. 2020.
  2. Asghari, A.M. Rahmani, and H. Haj Seyyed Javadi, “A medical monitoring scheme and health‐medical service composition model in cloud‐based IoT platform,” Trans. Emerging Telecommunications Technologies, vol. 30, no. 6, p.e 3637, May 2019.
  3. Faraji Mehmandar, S. Jabbehdari, and H. Haj Seyyed Javadi, “A dynamic fog service provisioning approach for IoT applications,” International Journal of Communication Systems, vol. 33, no. 14, p.e 4541, July 2020.
  4. Ghobaei-Arani, A. Souri, and A.A. Rahmanian, “Resource management approaches in fog computing: a comprehensive review,” Journal of Grid Computing, vol. 18, no. 1, pp. 1-42, Sept. 2019.
  5. Etemadi, M. Ghobaei-Arani, and A. Shahidinejad, “Resource provisioning for IoT services in the fog computing environment: An autonomic approach,” Computer Communications, vol. 161, no. 1, pp. 109-131, Sept. 2020.
  6. Iorga, L. Feldman, R. Barton, M.J. Martin, N.S. Goren, and C. Mahmoudi, “Fog computing conceptual model,” National Institute of Standards and Technology, no. NIST Special Publication (SP), pp. 325-500, March 2018.
  7. Morshed Aski, H. Haj Seyyed Javadi and G.H. Shirdel, “A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network,” Wireless Personal Communications, vol. 114, no. 3, pp. 2079-2103, May 2020.
  8. Masaeli, H.H.S. Javadi and S.H. Erfani, “Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds,” Journal of Information Security and Applications, vol. 54, no. 1, pp. 1-12, Oct. 2020.
  9. Hegde, R.R. Rao and R. Bhat, “Design of an efficient and secure authentication scheme for cloud-fog-device framework using key agreement and management,” IEEE Access, vol. 12, no. 1, pp. 78173-78192, May 2024.
  10. Zhang, A. Ouda and R. Abu-Rukba, “Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks,” Future Internet, vol. 16, no. 6, pp.209-249, June 2024.
  11. C. Gowda, S.S. Manvi, A.B. Malakreddy and R. Buyya, “TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments,” The Journal of Supercomputing, vol. 80, no. 5, pp. 6855-6890, March 2024.
  12. Ali and I. Ahmed, “LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems,” Computers & Security, vol. 140, no. 1, pp.103770-103791, May 2024.
  13. C. Gowda, S.S. Manvi, B. Malakreddy and P. Lorenz, “BSKM-FC: Blockchain-based secured key management in a fog computing environment,” Future generation computer systems, vol. 142, no, 1, pp.276-291, May 2023.
  14. Zhang, J. Wang, H. Zhang, and C. Bu, “Security computing resource allocation based on deep reinforcement learning in serverless multi-cloud edge computing,” Future Generation Computer Systems, vol. 151, no. 1, pp. 152-161, Feb. 2024.
  15. S. Hashmi, A. A. Khan Mohammad, A. M. Abdul, C. Atheeq and M. K. Nizamuddin, “Enhancing Data Security in Multi-Cloud Environments: A Product Cipher-Based Distributed Steganography Approach,” International Journal of Safety & Security Engineering, vol. 14, no. 1, pp. 47-62, Feb. 2024.
  16. K. Nicholson, “Introduction to abstract algebra,” John Wiley & Sons, March 2012.
  17. Pattanayak and B. Majhi, “Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited,” Cryptology ePrint Archive, vol. 1, no. 1, p. 131, Jan. 2009.
  18. A. Camtepe and B. Yener, “Key distribution mechanisms for wireless sensor networks: a survey,” Rensselaer Polytechnic Institute, vol. 1, no. 1, pp. 05-07, March 2005.
  19. A. Camtepe and B. Yener, “Combinatorial design of key distribution mechanisms for wireless sensor networks,” IEEE/ACM Trans. Networking, vol. 15, no. 2, pp. 346-358, April 2007.
  20. Lee and D.R. Stinson, “On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs,” ACM Trans. Information and System Security (TISSEC), vol. 11, no. 2, pp. 1-35, May 2008.
  21. Ruj, A. Nayak and I. Stojmenovic, “Pairwise and triple key distribution in wireless sensor networks with applications,” IEEE Trans. Computers, vol. 62, no. 11, pp. 2224-2237, Nov. 2013.
  22. Bechkit, Y. Challal, A. Bouabdallah and V. Tarokh, “A highly scalable key pre-distribution scheme for wireless sensor networks,” IEEE Trans. Wireless Communications, vol. 12, no. 2, pp. 948-959, Feb. 2013.
  23. Du, J. Deng, Y.S. Han, S. Chen and P.K. Varshney. “A key management scheme for wireless sensor networks using deployment knowledge,” IEEE INFOCOM 2004, vol. 1, no. 1, pp. 586-597, March 2004.
  24. P. Chan, “A key management scheme in distributed sensor networks using attack probabilities,” IEEE GLOBECOM 2005, vol. 2, no. 1, pp. 1007-1011, Nov. 2005.
  25. Liu and X. Cheng, “LKE: a self-configuring scheme for location-aware key establishment in wireless sensor networks,” IEEE Trans. Wireless Communications, vol. 7, no. 1, pp. 224-232, Jan. 2008.
  26. Modiri, H.H.S. Javadi and M. Anzani, “A novel scalable key pre-distribution scheme for wireless sensor networks based on residual design,” Wireless Personal Communications, vol. 96, no. 2, pp. 2821-2841, Sept. 2017.
  27. Di Pietro, L.V. Mancini, A. Mei, A. Panconesi and J. Radhakrishnan, “Redoubtable sensor networks,” ACM Trans. Information and System Security (TISSEC), vol. 11, no. 3, pp. 1-22, March 2008.
  28. M. Vu, C. Williamson and R. Safavi-Naini, “Simulation modeling of secure wireless sensor networks,” Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, vol. 1, no. 1, pp. 1-10, May 2010.
  29. Eschenauer and V.D. Gligor, “A key-management scheme for distributed sensor networks,” 9th ACM Conference on Computer and Communications Security, vol. 1, no. 1, pp. 41-47, Nov. 2002.
  30. Javanbakht, H. Erfani, H.H.S. Javadi and P. Daneshjoo, “Key predistribution scheme for clustered hierarchical wireless sensor networks based on combinatorial designs,” Security and Communication Networks, vol. 7, no. 11, pp. 2003-2014, Nov. 2014.
  31. Lopez, R. Roman and C. Alcaraz, “Analysis of security threats, requirements, technologies and standards in wireless sensor networks,” Foundations of Security Analysis and Design V, vol. 1, no. 1, pp. 289-338, Sept. 2007.
  32. Riaz, A. Naureen, A. Akram, A.H. Akbar, K.H. Kim and H.F. Ahmed, “A unified security framework with three key management schemes for wireless sensor networks,” Computer Communications, vol. 31, no. 18, pp. 4269-4280, Dec. 2008.
  33. Azarderskhsh and A. Reyhani-Masoleh, “Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 1, no. 1, pp. 1-12, Dec. 2011.
  34. R. Brooks, S.S. Iyengar and R. Brooks, “Distributed sensor networks,” Chapman & Hall/CRC, December 2004.
  35. Conti, R. Di Pietro, L.V. Mancini and A. Mei, “Emergent properties: detection of the node-capture attack in mobile wireless sensor networks,” First ACM conference on Wireless network security, vol. 1, no. 1, pp. 214-219, March 2008.
  36. Karyakarte, A. Tavildar and R. Khanna, “Effect of Mobility Models on Performance of Mobile Wireless Sensor Networks,” International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC), vol. 3, no. 1, pp. 137-148, March 2013.