Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Free access
Just Accepted

A Novel Multi-Party Authentication Scheme for FCN-based MIoT Systems in Natural Language Processing Environment

Online AM: 11 May 2023 Publication History

Abstract

Natural language processing (NLP) assists to increase the efficiency of human and Multimedia Internet of Things (MIoT) interaction. Notably, large-scale NLP tasks can be offloaded from a cloud server to fog nodes closer to a mobile terminal device for lower response latency. But communication security is ongoing issues that need to be addressed. Effective mutual authentication among multiple entities is essential to ensure the security of MIoT systems based on a dynamic Fog Computing Network (FCN). However, the existing schemes are unsuitable for the dynamic FCN due to the security vulnerabilities such as the linkable sessions. To solve this problem, an Anonymous Multi-Party Authentication (AMPA) scheme is proposed to address the challenges of secure FCN-based MIoT communications in this paper. The proposed scheme uses a bilinear pairing operation to realize the authentication between the fog nodes and cloud server and to establish the group key. Besides, the scheme allows cloud-authenticated terminal devices to be added to the FCN and reduces the need for the resource-limited terminal device to perform many authentication protocols. The security analysis is carried out to demonstrate that AMPA scheme can meet various safety requirements. Performance evaluations shown that the proposed AMPA scheme achieves satisfactory performance.

References

[1]
Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu. 2016. Edge computing: Vision and challenges. IEEE Internet of Things Journal. IEEE Internet of Things Journal 3, 5 (2016), 637–646.
[2]
Meikang Qiu, Laurence T. Yang, Zili Shao, and Edwin H.M. Sha. 2009. Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 18, 3(2009), 501–504.
[3]
Gang Xu, Edith C.H. Ngai, and Jiangchuan Liu. 2017. Ubiquitous transmission of multimedia sensor data in Internet of Things. Future Generation Computer Systems 5, 1 (2017), 684–700.
[4]
Qingqing Wu, Wen Chen, Derrick Wing Kwan Ng, and Robert Schober. 2018. Spectral and energy-efficient wireless powered IoT networks: NOMA or TDMA?IEEE Transactions on Vehicular Technology 67, 7 (2018), 6663–6667.
[5]
Wei Liang, Jing Long, Kuan-Ching Li, Jianbo Xu, Nanjun Ma, and Xia Lei. 2021. A fast defogging image recognition algorithm based on bilateral hybrid filtering. ACM transactions on multimedia computing 17, 2 (2021), 1–16.
[6]
Xiong Li, Maged Hamada Ibrahim, Saru Kumari, and Rahul Kumar. 2018. Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors. Telecommunication Systems 67, 2 (2018), 323–348.
[7]
Kashif Naseer Qureshi, Sadia Din, Gwanggil Jeon, and Francesco Piccialli. 2020. 2020. Internet of vehicles: Key technologies, network model, solutions and challenges with future aspects. IEEE Transactions on Intelligent Transportation Systems 22, 3(2020), 1777–1786.
[8]
Xiaoyan Chen, Wei Liang, Jianbo Xu, Chong Wang, Kuan-Ching Li, and Meikang Qiu. 2021. An efficient service recommendation algorithm for cyber-physical-social systems. IEEE Transactions on Network Science and Engineering 9, 6(2021), 3847–3859.
[9]
Daniel W, Otter, Julian R. Medina, and Jugal K. Kalita. 2020. A survey of the usages of deep learning for natural language processing. IEEE transactions on neural networks and learning systems 32, 2(2020), 604–624.
[10]
Bengio Y, Ducharme R, and Vincent P. 2003. A neural probabilistic language model. Advances in neural information processing systems 3, 2 (2003), 1137–1155.
[11]
Wei Liang, Yuhui Li, Kun Xie, Dafang Zhang, Kuan-Ching Li, Alireza Souri, and Keqin Li. 2022. Spatial-temporal aware inductive graph neural network for C-ITS data recovery. IEEE Transactions on Intelligent Transportation Systems (2022). https://doi.org/10.1109/TITS.2022.3156266.
[12]
Tom Young, Devamanyu Hazarika, Soujanya Poria, and Erik Cambria. 2018. Recent trends in deep learning based natural language processing. IEEE Computational intelligenCe magazine 13, 3 (2018), 55–75.
[13]
Ali Nauman, Yazdan Ahmad Qadri, Muhammad Amjad, Yousaf Bin Zikria, Muhammad Khalil Afzal, and Sung Won Kim. 2020. Multimedia Internet of Things: A comprehensive survey. IEEE Access 8(2020), 8202–8250.
[14]
Pradip Kumar Sharma and Jong Hyuk Park. 2020. Blockchain-based secure mist computing network architecture for intelligent transportation systems. IEEE Transactions on Intelligent Transportation Systems 22, 3(2020), 5168–51771.
[15]
Meikang Qiu, Chun Xue, Zili Shao, and Edwin Sha. 2007. Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. IEEE/ACM Design Automation and Test in Europe (DATE) 16-20 (2007).
[16]
Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and M. Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems 29, 7 (2013), 1645–1660.
[17]
Meikang Qiu, Zhi Chen, Zong Ming, Xiao Qin, and Jianwei Niu. 2014. Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Systems Journal 11, 2 (2014), 813–822.
[18]
Xianfu Chen, Celimuge Wu, Zhi Liu, Ning Zhang, and Yusheng Ji. 2021. Computation offloading in beyond 5G networks: A distributed learning framework and applications. IEEE Wireless Communications 28, 2 (2021), 56–62.
[19]
Pavel Mach and Zdenek Becvar. 2017. Mobile edge computing: A survey on architecture and computation offloading. IEEE Communications Surveys and Tutorials 19, 3 (2017), 1628–1656.
[20]
Arijit Karati, SK Hafizul Islam, and Marimuthu Karuppiah. 2018. Provably secure and lightweight certificateless signature scheme for IIoT environments. IEEE Transactions on Industrial Informatics 14, 8(2018), 3701–3711.
[21]
Zisang Xu, Wei Liang, Kuan-Ching Li, Jianbo Xu, Albert Y. Zomaya, and Jixin Zhang. 2022. A time-sensitive token-based anonymous authentication and dynamic group key agreement scheme for industry 5.0. IEEE Transactions on Industrial Informatics 18, 10(2022), 7118–7127.
[22]
Hany F. Atlam, Ahmed Alenezi, Abdulrahman Alharthi, Robert J. Walters, and Gary B. Wills. 2017. Integration of cloud computing with internet of things: challenges and open issues. In 2017 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData) 670-675 (2017).
[23]
Ying Zuo, Fei Tao, and A. Y. C. Nee. 2018. An Internet of things and cloud-based approach for energy consumption evaluation and analysis for a product. International Journal of Computer Integrated Manufacturing 32, 4(2018), 337–348.
[24]
Mingjun Wang and Zheng Yan. 2017. Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Transactions on Industrial Informatics 14, 8(2017), 3637–3647.
[25]
Yicheng Yu, Liang Hu, and Jianfeng Chu. 2020. A secure authentication and key agreement scheme for IoT-based cloud computing environment. Symmetry 12, 1 (2020), 150–166.
[26]
Aiqing Zhang, Lei Wang, Xinrong Ye, and Xiaodong Lin. 2016. Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems. IEEE Transactions on Information Forensics and Security 12, 3(2016), 662–675.
[27]
Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, and Gianluca Setti. 2017. Low-cost security of IoT sensor nodes with rakeness-based compressed sensing: Statistical and known-plaintext attacks. IEEE Transactions on Information Forensics and Security 13, 2(2017), 327–340.
[28]
Venkatasamy Sureshkumar, Ruhul Amin, and R. Anitha. 2018. A robust mutual authentication scheme for session initiation protocol with key establishment. Peer-to-Peer Networking and Applications 11, 5 (2018), 900–916.
[29]
Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, and Neeraj Kumar. 2020. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. IEEE Transactions on Wireless Communications 74, 12(2020), 6428–6453.
[30]
Mahdi Nikooghadam and Haleh Amintoosi. 2023. Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme. International Journal of Communication Systems 36, 1 (2023), e4332.
[31]
Kuljeet Kaur, Sahil Garg, Georges Kaddoum, Mohsen Guizani, and Dushantha Nalin K. JayakodyR. 2019. A lightweight and privacy-preserving authentication protocol for mobile edge computing. In 2019 IEEE Global Communications Conference (GLOBECOM) (2019). https://doi.org/10.1109/GLOBECOM38437.2019.9013856.
[32]
Samad Rostampour, Masoumeh Safkhani, Ygal Bendavid, and Nasour Bagheri. 2020. ECCbAP: A secure ECC-based authentication protocol for IoT edge devices. Pervasive and Mobile Computing 67, 3 (2020), 101194–101208.
[33]
Cheng-Chi Lee, Tsung-Hung Lin, and Chwei-Shyong Tsai. 2009. A new authenticated group key agreement in a mobile environment. Annals of Telecommunications-Annales Des Télécommunications 64, 11(2009), 735–744.
[34]
Lianhai Liu, Yujue Wang, Jingwei Zhang, and Qing Yang. 2019. A secure and efficient group key agreement scheme for VANET. Sensors 19, 3 (2019), 482.
[35]
Zhihua Cui, Fei Xue, Shiqiang Zhang, Shiqiang Zhang, Yang Cao, Wensheng Zhang, and Jinjun Chen. 2020. A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transactions on Services Computing 13, 2 (2020), 241–251.
[36]
Qikun Zhang, Bingli Wang, Xiaosong Zhang, Junling Yuan, and Ruifang Wang. 2020. Blockchain-based dynamic group key agreement protocol for Ad Hoc network. Chinese Journal of Electronics 29, 3 (2020), 447–454.
[37]
Evangelos K. Markakis, Kimon Karras, Nikolaos Zotos, Anargyros Sideris, Theoharris Moysiadis, Angelo Corsaro, George Alexiou, Charalabos Skianis, George Mastorakis, Constandinos X. Mavromoustakis, and Evangelos Pallis. 2017. EXEGESIS: Extreme edge resource harvesting for a virtualized fog environment. IEEE Communications Magazine 55, 7 (2017), 173–179.
[38]
Mohsen Nader Tehrani, Murat Uysal, and Halim Yanikomeroglu. 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine 52, 5 (2014), 86–92.
[39]
Meikang Qiu, Zhiping Jia, Chun Xue, Zili Shao, and Edwin H.-M. Sha. 2007. Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. The Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology 46, 1 (2007), 55–73.
[40]
Jiayin Li, Zhong Ming, Meikang Qiu, Gang Quan, Xiao Qin, and Tianzhou Chen. 2011. Resource allocation robustness in multi-core embedded systems with inaccurate information. Journal of Systems Architecture 57, 9 (2011), 840–849.
[41]
D. Dolev and A. Yao. 1983. On the security of public key protocols. IEEE Transactions on information theory 29, 2 (1983), 198–208.
[42]
Wei Liang, Yang Yang, Ce Yang, Yonghua Hu, Songyou Xie, Kuan-Ching Li, and Jiannong Cao. 2022. PDPChain: A consortium blockchain-based privacy protection scheme for personal data. IEEE Transactions on Reliability(2022). https://
[43]
Shruti Nathani, B. P. Tripathi, and Shaheena Khatoon. 2019. A dynamic ID based authenticated group key agreement protocol from pairing. International Journal of Network Security 21, 4 (2019), 582–591.
[44]
Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun, and Yang Xiang. 2017. Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing 16, 6(2017), 996–1010.
[45]
Chunyan Diao, Dafang Zhang, Wei Liang, Kuan-Ching Li, Yujie Hong, and Jean-Luc Gaudiot. 2022. A novel spatial-temporal multi-scale alignment graph neural network security model for vehicles prediction. IEEE Transactions on Intelligent Transportation Systems (2022). https://

Cited By

View all
  • (2024)ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of ThingsSensors10.3390/s2404124324:4(1243)Online publication date: 15-Feb-2024

Index Terms

  1. A Novel Multi-Party Authentication Scheme for FCN-based MIoT Systems in Natural Language Processing Environment

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Asian and Low-Resource Language Information Processing
    ACM Transactions on Asian and Low-Resource Language Information Processing Just Accepted
    EISSN:2375-4702
    Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Online AM: 11 May 2023
    Accepted: 14 March 2023
    Revised: 26 January 2023
    Received: 26 August 2022

    Check for updates

    Author Tags

    1. Multimedia Internet of Things
    2. natural language processing
    3. fog computing network
    4. authentication protocol

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)137
    • Downloads (Last 6 weeks)33
    Reflects downloads up to 19 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of ThingsSensors10.3390/s2404124324:4(1243)Online publication date: 15-Feb-2024

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media