Enhancing security mechanisms for robot-fog computing networks

Abdlehak Sakhi, Salah-Eddine Mansour, Abderrahim Sekkaki

Abstract


The evolution from conventional Internet usage to the internet of things (IoT) is reshaping communication norms significantly. Cloud computing, while prevalent, faces challenges like limited capacity, high latency, and network failures, especially when handling connected objects, leading to the emergence of fog computing as a more suitable approach for IoT. However, establishing secure connections among heterogeneous IoT entities is complex due to resource disparities and the unsuitability of existing security protocols for resource-constrained devices. This article explores fog computing's architecture, drawing comparisons with cloud computing while emphasizing its significance within the realm of IoT. Moreover, it delves into the practical application of fog computing within the context of the robot teacher project. Subsequently, our exploration introduces an advanced mutual authentication protocol, centered around hashed message authentication code (HMAC), aimed at enhancing the security infrastructure between the robot and the fog computing server.


Keywords


Cloud computing; Fog computing; Hash; HMAC; Internet of things

Full Text:

PDF


DOI: http://doi.org/10.11591/ijeecs.v33.i3.pp1660-1666

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).

shopify stats IJEECS visitor statistics