Protecting Edge Services for Upcoming Industrial IoT and Smart Healthcare Uses

Chinkal Arunkumar Parmar

Volume 4, Issue 2 2020

Page: 19-28

Abstract

Ensuring secure and intelligent environments is essential for advancing IoT applications like digital healthcare and Industry 4.0. These environments must support ubiquitous digital services for users while meeting critical security, privacy, and low latency requirements. This paper presents a summary of the dissertation [1], focusing on three main contributions: i) a lightweight biometrics-based user authentication mechanism tailored for innovative healthcare environments without the need for gadgets, ii) a conceptual three-tier approach for secure node bootstrapping and secure user access to digital services, and iii) a Blockchain and Edge computing-based network architecture designed for IIoT applications. This architecture addresses crucial needs such as low-latency communication, trust management, and enhanced security. Performance evaluations of the proposed frameworks provide valuable insights into enabling secure hyperconnected environments for diverse applications in the future.

Back Download



References

  • A. Kamilaris and A. Pitsillides, “Mobile phone computing and the internet of things: A survey,” IEEE Internet of Things Journal, vol. 3, no. 6, pp. 885–898, 2016.
  • M. M. Baig, H. GholamHosseini, and M. J. Connolly, “Mobile healthcare applications: system design review, critical issues and challenges,” Australasian physical & engineering sciences in medicine, vol. 38, no. 1, pp. 23–38, 2015.
  • H. Xu and X. Geng, “People-centric service intelligence for smart cities,” Smart Cities, vol. 2, no. 2, pp. 135–152, 2019.
  • I. Ahmad, S. Shahabuddin, T. Kumar, J. Okwuibe, A. Gurtov, and M. Ylianttila, “Security for 5g and beyond,” IEEE Communications Surveys Tutorials, vol. 21, no. 4, pp. 3682–3722, 2019.
  • T. Kumar, A. Braeken, M. Liyanage, and M. Ylianttila, “Identity privacy preserving biometric based authentication scheme for naked healthcare environment,” in 2017 IEEE International Conference on Communications (ICC), 2017, pp. 1–7.
  • T. Kumar, A. Braeken, A. D. Jurcut, M. Liyanage, and M. Ylianttila, “Age: authentication in gadget-free healthcare environments,” Information Technology and Management, pp. 1–20, 2019.
  • T. Kumar, P. Porambage, I. Ahmad, M. Liyanage, E. Harjula, and M. Ylianttila, “Securing gadget-free digital services,” Computer, vol. 51, no. 11, pp. 66–77, 2018.
  • I. Ahmad, T. Kumar, M. Liyanage, M. Ylianttila, T. Koskela, T. Braysy, A. Anttonen, V. Pentikinen, J.-P. Soininen, and J. Huusko, “Towards gadget-free internet services: A roadmap of the naked world,” Telematics and Informatics, vol. 35, no. 1, pp. 82–92, 2018.
  • T. Kumar, M. Liyanage, A. Braeken, I. Ahmad, and M. Ylianttila, “From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges,” in 2017 European Conference on Networks and Communications (EuCNC), 2017, pp. 1–6.
  • K. Halunen, J. H¨aiki¨o, and V. Vallivaara, “Evaluation of user authentication methods in the gadget-free world,” Pervasive and Mobile Computing, vol. 40, pp. 220–241, 2017.
  • N. Hassan, S. Gillani, E. Ahmed, I. Yaqoob, and M. Imran, “The role of edge computing in internet of things,” IEEE Communications Magazine, vol. 56, no. 11, pp. 110–115, 2018.
  • Y. Sahni, J. Cao, S. Zhang, and L. Yang, “Edge mesh: A new paradigm to enable distributed intelligence in internet of things,” IEEE Access, vol. 5, pp. 16 441–16 458, 2017.
  • M. Satyanarayanan, “The emergence of edge computing,” Computer, vol. 50, no. 1, pp. 30–39, 2017.
  • P. Porambage, J. Okwuibe, M. Liyanage, M. Ylianttila, and T. Taleb, “Survey on multi-access edge computing for internet of things realization,” IEEE Communications Surveys Tutorials, vol. 20, no. 4, pp. 2961–2991, 2018.
  • Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge computing: The communication perspective,” IEEE Communications Surveys Tutorials, vol. 19, no. 4, pp. 2322–2358, 2017.
  • T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, “Security services using blockchains: A state of the art survey,” IEEE Communications Surveys Tutorials, vol. 21, no. 1, pp. 858–880, 2019.
  • S. Guo, X. Hu, S. Guo, X. Qiu, and F. Qi, “Blockchain meets edge computing: A distributed and trusted authentication system,” IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1972–1983, 2019.
  • E. Harjula, P. Karhula, J. Islam, T. Lepp¨anen, A. Manzoor, M. Liyanage, J. Chauhan, T. Kumar, I. Ahmad, and M. Ylianttila, “Decentralized iot edge nanoservice architecture for future gadget-free computing,” IEEE Access, vol. 7, pp. 119 856–119 872, 2019.
  • E. Ahmed, I. Yaqoob, A. Gani, M. Imran, and M. Guizani, “Internet-ofthings- based smart environments: state of the art, taxonomy, and open research challenges,” IEEE Wireless Communications, vol. 23, no. 5, pp. 10–16, 2016.
  • M. Gusev and S. Dustdar, “Going back to the roots—the evolution of edge computing, an iot perspective,” IEEE Internet Computing, vol. 22, no. 2, pp. 5–15, 2018.
  • Y. Nikoloudakis, S. Panagiotakis, E. Markakis, E. Pallis, G. Mastorakis, C. X. Mavromoustakis, and C. Dobre, “A fog-based emergency system for smart enhanced living environments,” IEEE Cloud Computing, vol. 3, no. 6, pp. 54–62, 2016.
  • W. Yu, F. Liang, X. He, W. G. Hatcher, C. Lu, J. Lin, and X. Yang, “A survey on the edge computing for the internet of things,” IEEE Access, vol. 6, pp. 6900–6919, 2018.
  • T. Kumar, A. Braeken, V. Ramani, I. Ahmad, E. Harjula, and M. Ylianttila, “Sec-blockedge: Security threats in blockchain-edge based industrial iot networks,” in 2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM), 2019, pp. 1–7.
  • W. Li and P. Wang, “Two-factor authentication in industrial internet-ofthings: Attacks, evaluation and new construction,” Future Generation Computer Systems, vol. 101, pp. 694–708, 2019.
  • C.-L. Lei and Y.-H. Chuang, “Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme,” IEEE Access, vol. 7, pp. 186 480– 186 490, 2019.
  • Z. Yan, P. Zhang, and A. V. Vasilakos, “A survey on trust management for internet of things,” Journal of network and computer applications, vol. 42, pp. 120–134, 2014.
  • T. Kumar, M. Liyanage, I. Ahmad, A. Braeken, and M. Ylianttila, “User privacy, identity and trust in 5g,” A Comprehensive Guide to 5G Security, pp. 267–279, 2018.

Looking for Paper Publication??

Come to us.