0% found this document useful (0 votes)
35 views24 pages

Smart

The document provides an overview of authentication and data security issues in edge computing based smart applications. It introduces edge computing and related architectures, describes typical smart applications using edge computing, and analyzes security protection requirements. It also reviews current works and discusses applicability and future work on authentication and data security in edge computing environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views24 pages

Smart

The document provides an overview of authentication and data security issues in edge computing based smart applications. It introduces edge computing and related architectures, describes typical smart applications using edge computing, and analyzes security protection requirements. It also reviews current works and discusses applicability and future work on authentication and data security in edge computing environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO.

6, MARCH 15, 2021 4063

Smart Applications in Edge Computing: Overview


on Authentication and Data Security
Xinghua Li, Member, IEEE, Ting Chen, Qingfeng Cheng , Siqi Ma, and Jianfeng Ma, Member, IEEE

Abstract—As a new computing paradigm, edge computing has


appeared in the public field of vision recently. Owing to its cannot provide real-time response for users. In addition, the
advan- tages of low delay and fast response, edge computing has long-distance transmission and centralized storage of data are
become an important assistant of cloud computing and has more vulnerable to the threat of privacy disclosure. However,
brought new opportunities for diverse smart applications like the traditional cloud computing fails to satisfy the higher require-
smart grid, the smart home, and the smart transportation. ments of user experience. To offset the weaknesses of cloud
However, the accompanying security issues, which have always
been the focus of users’ concern, still cannot be ignored. computing in the context of IoT, edge computing emerges as
Therefore, we focus on the security issues in this overview. We the time requires [2], [3]. Its wide application is an inevitable
first introduce some related definitions of edge computing and trend in the era of larger data. Recently, the Guide to the Edge
present the architecture for edge computing-based smart Computing Market of the Industrial IoT, released by Gartner,
applications. After illustrating the smart applications, from the predicted that more than 50% data generated by enterprises
perspective of identity authen- tication and data security, we
analyze the security protection requirements of these smart would be produced and processed outside the data center or
applications in the edge comput- ing environment. Next, we cloud by 2022 [4]. Edge computing, which provides capabili-
review some state-of-the-art works on them. Furthermore, we ties of computing and other services near the edge network, is
present the extended discussions on the applicability of these just like a new tentacle of cloud computing extending to the
current works in the edge comput- ing environment. Finally,
edge.
we briefly discuss the future work on authentication and data
security of edge computing-based smart applications. Presently, various smart applications based on IoT are
applying edge computing to achieve better utility, such as
Index Terms—Data security, edge computing, identity authen-
the smart grid [5], the smart home [6], and the smart trans-
tication, smart grid, smart home, smart transportation.
portation [7]. These smart applications bring convenience to
our life, but there also exist some security issues that cannot
be ignored. For example, the smart grid relies too much on
I. I NTRODUCTION
the network infrastructure. Once the network exhibits weak-

W ITH the continuous advancement in the 5G technology


and Internet of Things (IoT), more and more users join
in the life of Internet. According to the 44th Statistical Report
nesses, the attacker is likely to damage the stability of the
smart grid by manipulating system parameters or instrument
measurement information [8]. Edge computing, a new
on the Development of Internet in China, the Internet users comput- ing paradigm, does bring new opportunities for these
and Internet penetration rate of China are on the rise. They smart applications, but it is undeniable that its characteristics
have reached 854 million and 61.2% by June 2019, respec- of distributed deployment and complex service mode may also
tively, [1]. Besides, network edge devices and the data are bring some new security issues to the smart applications (brief
also growing explosively, which puts forward higher explanations are presented in Section III-B). Moreover, there
requirements to the cloud for data processing and storage. exist security issues in edge computing itself [9], [10]. For
First, transmitting mass of data is a great pressure to the instance, Caprolu et al. [10] especially discussed some related
transmission bandwidth. Second, the centralized processing scenario-driven attack identification. Consequently, the tech-
of a large amount of data nologies originally used to solve the security issues of these
smart applications cannot be directly applied in the edge
Manuscript received March 31, 2020; revised July 16, 2020; accepted
August 19, 2020. Date of publication August 25, 2020; date of current version computing environment. That is, they fail to consider the
March 5, 2021. This work was supported by the National Natural Science features of edge computing. By taking identity authentica-
Foundation of China under Grant U1708262, Grant U1736203, and Grant tion for illustration, the trust model in the edge computing
61872449. (Corresponding author: Qingfeng Cheng.)
Xinghua Li, Ting Chen, and Jianfeng Ma are with the State Key may be different from the assumed ones in some original
Laboratory of Integrated Services Networks and School of Cyber schemes. For example in the smart home, terminals have trust
Engineering, Xidian University, Xi’an 710071, China (e-mail: relationship with the home gateway (edge node), as well as
[email protected]; [email protected];
[email protected]). with the backend server (cloud), while there does not exist
Qingfeng Cheng is with the State Key Laboratory of Mathematical trust relationship between the edge node and cloud. This trust
Engineering and Advanced Computing, Strategic Support Force model is different from the 802.1X, where the authentication
Information Engineering University, Zhengzhou 450001, China (e-mail:
[email protected]). server has trust relationships with the access point and termi-
Siqi Ma is with the School of Information Technology and Electrical nals. Therefore, the authentication schemes suitable for
Engineering, University of Queensland, Brisbane, QLD 4072, Australia (e- 802.1X cannot be directly used in the edge computing
mail: [email protected]).
Digital Object Identifier 10.1109/JIOT.2020.3019297 environment.
2327-4662
2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
Ⓧc
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4064 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021

TABLE I
COMPARISON OF EXISTING OVERVIEWS WITH THEIR PRIMARY FOCUS

Consequently, the original schemes need improving based on and related architectures of edge computing, we
the features of edge computing before they are applied to exhibit the edge computing-based architecture for smart
these edge computing-based systems. applications.
Currently, there have existed some overviews on smart 2) We describe three typical smart applications and briefly
applications or edge computing, such as [7], [8], [11]–[18]. illustrate how edge computing works in them. Then,
Among them, Khan et al. [11] surveyed on edge computing we briefly summarize some security risks of them and
driven smart city and highlighted the role that edge computing present a security protection framework by taking iden-
played in smart city, but it did not focus on the security of tity authentication and data preserving for illustration.
specific applications in smart city. Although Zhang et al. [12] 3) Based on the proposed security protection framework,
and Xiao et al. [15] highlighted the security in edge com- we overview and analyze the current related works,
puting, but they did not combine specific smart applications. including briefly discussing their applicability after the
As [13] and [14], they only surveyed on edge computing, participation of edge computing.
neither combining smart applications nor focusing on secu- 4) After summaries, analysis, and discussions, we briefly
rity. Tan et al. [8] and Kuyucu et al. [16] put emphasis present the future security researches on authentication
on the security discussion in the smart grid and the smart and data security of the edge computing-based smart
home, respectively, but they did not take edge computing applications.
into account. Li et al. [7] surveyed on edge computing- The remaining of this article is sketched as follows. We
based smart transportation, but their focus is not security. briefly introduce the definitions of edge computing and
Caropreso et al. [17] and Ghosal and Conti [18] summarized exhibit the architecture of smart applications based on edge
the security issues and technologies related to smart metering computing in Section II. Section III introduces three typical
facilities in the smart grid. Concretely, Caropreso et al. [17] smart applica- tions, analyzes the security protection
put forward an open-source framework of smart meters from requirements from the perspective of identity authentication
the perspective of communication security and data security, and data security, and puts forward the security protection
and realized the multiframe communication between the client framework of these smart applications in the edge
and the server by TCP/IP protocol via wireless networks. computing environment. Based on the proposed framework,
Ghosal and Conti [18] emphasized the important role that some recent research reviews and corresponding analysis of
key management system played in the advanced measurement the smart grid, the smart home, and the smart transportation
infrastructure of the smart grid, and observed that its secu- are given in Sections IV–VI in order. Section VII presents
rity was still a challenge. Although Caropreso et al. [17] and brief extension that is interesting. Section VIII concludes this
Ghosal and Conti [18] have made contributions to survey on article. The last section presents the possible research works
the security of the smart grid, they still failed to consider edge in the future.
computing. To indicate the difference between our article and
the aforementioned overviews, the comparison of our
overview with [7], [8], [11]–[18] is given in Table I. From the II. EDGE COMPUTING: DEFINITION AND A RCHITECTURE
compar- ison, it is obvious that our overview is the first one to
As [19] described, the requirement of edge computing were
discuss the security of edge computing-based smart
pushed from three aspects, i.e., cloud services, IoT, and data
applications and the corresponding applicability in edge
consumer to producer. Specifically, when various edge
computing. Since the legality of entity and data security are
devices produce massive data that needs efficient processing
two basic points to guar- antee the better function of the
in a network area, it is a challenge for the cloud to meet the
system, we take the two aspects to discuss. Our main
high efficiency with limited resources. Moreover, in the IoT
contributions are listed as follows.
era, billions of devices participate in the data production. All
1) We introduce the definition of edge computing from dif-
the data transmitted to the cloud puts great pressure on the
ferent research works. Associating with the definitions
network bandwidth. To some extent, processing data on the
edge of the
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4065

Fig. 1. Edge computing-based architecture for smart applications.

network can protect users’ privacy better. Thus, the the edge gateway focuses on network protocol processing and
emergence of edge computing is inevitable, which plays a conversion, the edge controller focuses on supporting real-
nonnegligible role in addressing the aforementioned issues. time closed-loop control business, and the edge sensor mainly
The definitions of edge computing are various on ver- collects and processes low-power information. Specifically,
sions. Specifically, Shi et al. [19] claimed that it referred to when these smart applications upload data to the cloud center
a technology, where the computing was permitted to be exe- and interact with it, edge computing layer plays a significant
cuted on the edge network. Moreover, the downstream and role in data processing and storage, service delivery, the IoT
the upstream data represent cloud service and IoT services, management, privacy protection, and computing offloading by
respectively. The word “edge” can refer to any network and decreasing the time delay and lightening the pressure of the
computing service existing from the data source to the cloud cloud center.
center. Edge computing consortium (ECC) also defined it in As Fig. 1 displays, cloud computing and edge computing
the white paper of Edge Computing Reference Architecture are complementary and cooperative. They have their own
3.0. Concretely, edge computing, a distributed architecture, advan- tages, but they are not separate. Otherwise, the
inte- grates the computing, network, and other core system will not achieve the expected effect. As for cloud
capabilities on the edge network. Close to the objects or data computing, it possesses a larger storage resource, while the
sources, it provides smart services nearby and satisfies some storage resource of edge computing is limited. However,
key require- ments, such as the industry digitalization in agile compared with cloud computing, edge computing closes to the
connection, real-time business, application intelligence, etc. data producer and costs shorter time to respond users. If the
Besides, it serves as a bridge that connects the physical and user requires a real- time response, then edge computing
digital world, enabling smart assets, smart gateways, and functioned as the data processor can satisfy the user by
smart services [20]. Associating with the aforementioned reducing the delay. In addi- tion, to well make use of the
definitions, based on our understanding of edge computing storage of cloud computing, the edge node can also return
and related descriptions in [21]–[23], we put forward an edge the data result to the cloud if the user approves. In this case,
computing-based archi- tecture for smart applications, seen in if the edge node misses some data that the user requires,
Fig. 1. The architecture consists of three layers, i.e., the cloud he/she can obtain them from the cloud. To exhibit a more
center, edge computing, and the smart applications. Edge comprehensive display of the differences and relations
computing, which interacts with both the cloud center and between cloud computing and edge computing, we summarize
the smart applications, is in the middle layer, docking with them in Table II.
the cloud upward and connect- ing with various smart
devices downward. Edge computing is mainly composed of
various hardware entity edge nodes. As described in [20], III. TYPICAL SMART APPLICATIONS AND
according to different hardware char- acteristics and C ORRESPONDING SECURITY R EQUIREMENTS
business focus, edge nodes can be classified into edge
Three typical smart applications, i.e., the smart grid, the
gateway, edge controller, edge sensor, etc., where
smart home, and the smart transportation, are introduced in
this
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4066 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021

TABLE II
DIFFERENCE AND RELATION BETWEEN CLOUD COMPUTING 2) Smart Home: Except for the smart grid, the smart home,
AND EDGE COMPUTING
which aims to improve the living environment of res-
idents and remotely or automatically control different
smart home appliances through computer and commu-
nication technologies, is also a hot application under
the development of IoT. In the smart home scene, there
are security monitoring devices, such as smart webcam
that can identify hazards. Undoubtedly, smart appli-
ances are indispensable in the smart home. They can
implement some automatic functions for hosts’ conve-
nience. Moreover, smart energy and lighting are in great
demand, such as smart doors and windows. One of the
most important thing to realize smart home is sensing
and speech recognition, which produce the amount of
sensitive data locally. To better analyze and decide on
these data in real time as well as preserving the privacy,
edge node plays an essential role. In some proposed
smart home edge computing architecture [26], there
have introduced edge analysis engines like local speech
section, including illustrating how edge computing is recog- nition. Such engines, which are used to
deployed in them at current research. Furthermore, we will temporarily store sensitive data and further analyze
summarize some security risks and security requirements of them, are deployed on the edge and close to data
them in terms of authentication and data security. The details resource.
are shown as follows. 3) Smart Transportation: The smart transportation can
help solve the issues of urban residents’ travel path. It
inte- grates several technologies like information and
A. Brief Introduction of Typical Smart Applications com- munication technology, and applies them to the
1) Smart Grid: As one of the IoT applications, the smart trans- portation, the vehicle manufacturing, and service
grid is a network physical system covering various control, realizing the improvement on the traffic
smart devices. It perfectly combines modern environment and efficiency. Information collection,
information tech- nology with traditional grid, and information analysis, and information release are three
transmits not only current but also the data of advanced significant components of the smart transportation. For
monitoring appli- cations. It highly integrates flows of instance, if a vehi- cle accident happens somewhere,
power, information, and business and improves the nearby monitors can collect such information, analyze
efficiency of power sup- ply. Smart grid relies on some causes of such acci- dent, and release the accident
advanced technologies, such as data analysis, sensing, information in the system to inform other vehicles and
and measurement, to realize its efficient function with users. However, numer- ous vehicles and monitoring
security and relia- bility. A variety of monitoring equipment are included in the system. Since the
devices and measur- ing equipment are deployed in bandwidth is limited and the data resource is far from
the smart grid system. In the earlier stage, it applies the data center, some urgent information may not be
cloud computing for data processing and storage to released in real time, result- ing in serious
guarantee efficiency. A related illustration can refer to consequence. To address such problem, researchers
[24]. In response to the high requirement of real time have tried to apply edge computing and realize cloud-
and meeting the challenges in communication and edge collaboration. The edge nodes are deployed close
storage, researchers have introduced edge computing to roadside infrastructure and vehicles, such as edge
into the smart grid. Concretely, analyze and process the servers and edge sensors. In this way, the related
data collected by smart meters and other monitoring information can be sent to the edge nodes close to the
equipment on the edge or power devices terminal. There data source for analysis and processing in some
have already existed such cases in application. For emergency cases.
instance, Tencent Cloud and Pengmai Energy
Technology took edge com- puting into account and
B. Summary of Security Requirements
released the overall architecture of energy IoT solution
in 2018 [25]. In the released Pengmai smart grid No matter the smart grid, the smart home, or the smart
solution, the edge server acts as the core component. It transportation, the complexity of their own structure and the
connects with numerous monitoring devices and diversity of their participants will lead to many security
measuring equipment deployed in the smart grid, threats. Edge computing also risks various security issues. For
collects power information and analyzes them in real a clear display of the security problems existing in both edge
time. com- puting and the described three smart applications, we
briefly summarize and list them in Table III. There is no
deny- ing that the participation of edge computing will make
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4066 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
them

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4067

TABLE III
BRIEF SUMMARY OF SECURITY WEAKNESSES EXISTING IN EDGE defense line and the most significant basis. Identity authenti-
COMPUTING AND THOSE SMART APPLICATIONS
cation technology can confirm the validity of communication
participants, preventing the attacker from impersonating as the
legitimate users to spoof the server and consuming the com-
puting, storage, and network sources of the server. Similarly,
this technology prevents the attacker from impersonating as
the legitimate servers to obtain the privacy information of
users. In the edge computing environment, multiple trust
domains coexist, and multiple user entities in the smart grid,
the smart home, and the smart transportation participate in
communica- tion and interaction. Therefore, realizing the
authentication of the application system is very necessary.
Additionally, any system will produce various data and the
data plays an important part in these systems. The data is
usually generated from the user terminal and there exists
user’s sensitive privacy in these data. Moreover, the data
produced in the systems are encouraged to be shared and
aggregated for better function of the systems, but the
security needs to be guaranteed in these data operations.
Thus, data security is another essential basis to guarantee the
normal and even better functions of these systems. That is,
apart from identity authentication, data security protection is
also a top priority.
Similar to the smart grid, the smart home, and smart trans-
portation, after edge computing is applied to them, although
there involve threats of both edge computing and smart
applications, the identity authentication of entities and data
security are common issues. Besides, there exists a
relationship between identity authentication and data security.
By authen- tication, the user’s legality is verified and then
he/she can be authorized to access certain data. Moreover, in
some proposed authentication schemes, after authentication,
become more complex, and the characteristics of edge legal users can further negotiate a session key that can be
comput- ing also add new security threats to these smart utilized to pro- tect the data transmitted between the entities,
applications. For instance, various edge nodes are distributed realizing data protection to a certain extent.
in the system, such as edge server and edge controller, so they Different scenarios possess different architecture character-
are easier to become the target of attackers. Concretely, the istics and the authentication objects are also not the same.
attacker can disguise malicious edge nodes as legitimate edge Accordingly, the requirements of authentication and data
nodes and then induce users to access them by giving some secu- rity protection are naturally different. Consequently,
benefits. In this case, some important information of user there is no such common identity authentication scheme and
may be leaked to the attacker, such as the account and data security protection mechanism for these smart application
password of some soft- ware used by users. Furthermore, as scenarios. We present the differences between them and
Edge Computing Security White Paper released [27], there summarize their respective security requirements on
exist 12 security challenges in edge computing, mainly authentication and data preserving as follows.
reflecting in four aspects, i.e., edge network, edge dada, edge 1) First, according to the different security requirements
application, and edge infrastruc- ture. In terms of attacks, they and device characteristics of smart applications in these
may occur in edge access, edge server, and edge edge computing-based systems, it is necessary to design
management. For edge access, there exist insecure different authentication schemes, thus realizing the con-
communication protocols and malicious edge nodes. For edge fidentiality of the communication process. Generally,
server, it occurs problems, such as Distributed Denial of the authentication in the smart grid occurs at the smart
Service (DDoS), insecure systems and components, and lack meter and service provider and requires properties of
of data privacy preserving. For edge management, it anonymity, unlinkability, and lightweight. While in the
exhibits challenges like malicious administrators that are smart home, apart from the smart meter, there are other
difficult to supervise. Thus, if edge computing is applied in home devices that need to authenticate with users or
the smart application, it is inevitable to face these security home gateway. The authentication also requires rela-
problems. tively lightweight. In the smart transportation, we prefer
Currently, most Internet scenes are open to people, to discuss authentication in the Internet of Vehicles
including users and attackers. To guarantee the normal and (IoV), i.e., vehicle to vehicle and vehicle to roadside
secure func- tion of the Internet system, identity infrastructure. The authentication in such scene may
authentication is the first
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4068 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4068 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4068 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021

Fig. 2. Security protection framework of these smart applications in edge computing.

involve cross-domain authentication and need to realize IV. SMART G RID


real-time requirement.
2) Generally, data security protection includes The scenario of the smart grid in the edge computing envi-
confidential- ity, integrity, availability, and so on. The ronment is presented in Fig. 3 [5], [24], [28]. After applying
data produced by different system varies in contents edge computing to the smart grid, part of the data can be
and usage. In the smart grid, the data is related directly processed on the edge nodes, and the smart meter
with power and its consumption, and data interaction and control center can communicate through the edge cloud.
occurs between smart meters and substations or However, the structure and communication environment of
substations and data center. While in the smart home, the smart grid are complex and vulnerable to various network
the data consists of information of user and home attacks, such as Denial-of-Service (DoS) attacks and eaves-
equipment. If the owned information of the smart home dropping attacks. In addition, a variety of smart devices
devices is tampered, they will make incorrect decisions, participate in the system and the system targets a wide range
further resulting in seri- ous consequence. In the smart of users. Meanwhile, users interact with the smart grid system
transportation system, the data involves information of frequently, which causes attackers to obtain the information
traffic and road. Perfect data analysis and decision will transmitted through the public smart grid network, thus
contribute to the improvement of the traffic. To leading to the leakage of user’s privacy.
facilitate data analysis, the data usu- ally needs to be
aggregated and shared. In such process, the security
requirements differ in smart applications for their A. Identity Authentication
different contents and usage. This article mainly
To check the validity of entities in the smart grid, espe-
discusses secure data sharing, aggregation, transmission,
cially realizing the authentication between the smart meter and
and storage.
service provider, there have proposed many related schemes.
Based on the above mentioned, we propose a security
Moreover, these schemes are developing and improving by
protection framework, shown in Fig. 2. As the framework
adopting different cryptography methods, such as elliptic
displays, for instance, in the smart home, we will discuss
curve and hash functions. In this section, to show the recent
the authentication between smart devices and home gate-
research in this field, we overview some works, including
ways and analyze the privacy processing and secure storage
some corresponding improvements.
of home data. After applying edge computing in the smart
During the authentication, the anonymity of smart meters
grid and smart home, edge server participates in communica-
can protect its privacy to a certain extent. To realize this fea-
tion and authentication between it and the smart devices like
ture, many related protocols have been presented [29]–[39].
smart meter should be taken into consideration. As for edge
Specifically, by adopting identity-based signature and encryp-
computing-based smart transportation, besides the authentica-
tion, Tsai and Lo [29] proposed a key distribution scheme
tions of vehicle to vehicle and vehicle to roadside facilities,
with anonymity in the smart grid environment, where the
considerations for the authentications of vehicle to edge node
smart meter could use a private key to access the service
and vehicle to edge vehicle are necessary.

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4069

Fig. 3. Scene of the smart grid in the edge computing environment.

provider anonymously without the participation of third par- key disclosure attacks in the Canetti–Krawczyk (CK) threat
ties in the authentication. Additionally, only a small amount of model. Based on these analyses, Abbasinezhad-Mood and
calculation operation is needed at the smart meter. However, Nikooghadam [35] mended the drawbacks. In 2019, based
Odelu et al. [30] found that the scheme in [29] suffered on TinySet, Afianti et al. [36] designed a multiuser authen-
from server impersonation attacks and failed to provide secure tication scheme to improve efficiency and resist DoS attacks.
mutual authentication. Besides, when the ephemeral secret Their scheme used RC5 encryption, partial recovery principle,
was inadvertently disclosed, Tsai et al.’s scheme could not and elliptic curve digital signature, which greatly increased
guar- antee the session key security and user certificate the complexity of attack. Additionally, TinySet is regularized
privacy. Consequently, Odelu et al. put forward an to simplify the administrator’s task to setup initialization
improvement and enhanced the security. However, both the param- eters. For the computing limitation of the smart
protocols designed by Tsai et al. and Odelu et al. need high measuring device, Abbasinezhad-Mood et al. [37]
computation and communication costs, which cannot meet the specifically designed a security protocol, which not only
resource con- straints of smart meters. In 2018, Mahmood et overcame the weakness of power service providers
al. [31] and Abbasinezhad-Mood and Nikooghadam [32] participating in the key protocol but also greatly reduced the
designed authen- tication protocols for smart grid based on communication cost. To over- come the weaknesses existing
bilinear pairing operation and elliptic curve cryptosystem, in the IEC 62351 standard, Moghadam et al. [38] used
respectively, meet- ing the anonymity of smart meters. private key and hash function and proposed a secure
However, compared with Abbasinezhad-Mood et al.’s protocol. By pointing out the failure of previous
scheme, Mahmood et al.’s scheme costs more calculation and anonymous authentication schemes in identify- ing
does not realize key escrow. Moreover, Chen et al. [33] malicious users, Kong et al. [39] designed a group blind
pointed out that Mahmood et al.’s scheme failed to provide signature scheme, realizing conditional anonymity.
perfect forward security, suffered from impersonation attack No matter what the application scenario, key agreement
and potentially vulnerable to ephemeral key compromise protocols to realize identity authentication usually use some
attack. common cryptography methods, such as elliptic curve, bilin-
For the complexity and time delay sensitivity of the smart ear pairing, public-key encryption and symmetric encryption,
grid, Mahmood et al. [34] proposed a lightweight authen- etc. Thus, here we only take smart grid as an example to
tication scheme using the elliptic curve. After the effective compare the involved protocols on the security and com-
session key is shared between the communication partic- putation cost to present the advantages and disadvantages
ipants, the identity authentication is completed. However, of these key agreement schemes. The compared literature
Abbasinezhad-Mood et al.’s protocol [35] observed that their involve [29]–[35], [37], [38], shown in Table IV. In the
scheme still exhibited some drawbacks, such as the inabil- table, S1–S7 means user anonymity, perfect forward security,
ity to provide forward security and resistance to ephemeral mutual authentication, anti-impersonation attack, anti-replay

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4070 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021

TABLE IV
COMPARISON ON THE SECURITY AND COMPUTATION COST OF RELATED SCHEMES

attack, resistance to man-in-the-middle attack, and session key adopted to propose an authoritative proof consensus protocol,
security. Additionally, the symbols Tm, Tb, Te, Th, and Ts which aimed to get the credit score, so as to solve the existing
denote time for performing scalar multiplication, bilinear pair- computing problem of Ethereum blockchain.
ing, modular exponentiation, hash function, and symmetric Smart grid, the next power grid generation, can effectively
encryption in order. As the table shows, the key agreement monitor, control, and predict the production and consumption
schemes for the smart grid are improving. Besides, security of the energy, but the transmission of power data fails to keep
and performance are relative, that is, high security requires a confidential. Besides, the fine-grained measurement data may
certain performance as a cost. The issue on how to balance leak the privacy of users. Therefore, Li et al. [42] designed a
the security and performance is a challenge. power data transmission protection scheme based on quantum
cryptography combining with the one-time key mechanism.
Additionally, they used quantum to generate random numbers,
B. Data Security which fixed the weaknesses of the traditional generator, and
There are entities, such as substations, smart appliances, put forward a key distribution scheme. For another thing, the
and control centers in the smart grid. Smart meter is used research on secure data aggregation has been developing and
to help exchange information between the smart appliances improving [43]–[49], including various public-key-based data
and substations and transmit customer’s requirements to the aggregation protocols, but the public-key technology is not
substation. Then, the substation forwards these requests to the recommended in this scenario due to the high costs of main-
corresponding control center, which further responds to taining public-key infrastructure (PKI). Thus, by adopting the
incom- ing requests. Thus, there must exist data interaction identity-based encryption and signature, Wang [43] proposed
among the above-mentioned entities. They are confidential a protocol of data aggregation, which was suitable for the
information and need security protecting. According to the appli- cation in the smart grid. It can avoid fine-grained
summarized security requirements, from the perspective of analysis as well as unauthorized reading, and resist
secure shar- ing, transmission, and aggregation of the power unexpected faults and malicious tampering of message.
data, this subsection reviews some works and analyzes them. In 2018, Gope and Sikdar [44] put forward an effective
Under the era of the IoT, smart meters in the smart grid will data aggregation scheme, which avoided high computation
generate massive data. Users, however, are generally cost and overcame the weakness of fixed price for the whole
unwilling to share the data that they own because the privacy day (or even the whole month). Their scheme used symmet-
of their data cannot be guaranteed to be not leaked. To balance ric key encryption primitives for privacy-aware and secure
the personal privacy and the beneficial use of data in the smart billing system, and promoted the generation of power and
grid, Yassine et al. [40] proposed a mechanism that could the requirement balance in the smart grid, relatively decreas-
determine the value of privacy risk. Once a user decided to ing the computation cost and the time for data aggregation.
share data with a third-party service provider, this mechanism Thus, it was suitable for smart grid devices with constrained
will function to determine the benefits of users. Moreover, resource. Liu et al. [45] proposed a practical scheme with pri-
Yassine et al.’s scheme used a negotiation mechanism based vacy preserving used for data aggregation. In the scheme, a
on game theory to study the fairness among entities involv- virtual aggregation region consisting of users with a certain
ing a third party, consumers, and data aggregators, where degree of trust is constructed to hide single user’s data, where
the entities in the game aimed to maximize their own util- the aggregation results have little impact on the data practica-
ity. Concretely, the consumers wanted to get the maximum bility of large-scale applications. Liu et al. [45] depended little
return for allowance to access their data, the data aggregators on the third party, promoted the performance, and improved
wished to get more money from the third party by providing the practicability. In 2020, Gope and Sikdar [47] proposed
the consumers with less rewards, and the third party wanted a privacy-friendly scheme of data aggregation to prevent fine-
to spend less money for the data. For the sake of encourag- grained data from being collected by smart meters and
ing users to share data, based on blockchain and differential massive measurement results from being used to reconstruct
privacy technology, Samuel et al. [41] proposed a mechanism the behav- ior of consumers. Aiming at the data integrity
of access control to fairly compensate users’ contribution in attacks for smart grid, Mohammadpourfard et al. [49]
sharing data. Meanwhile, in [41], PageRank mechanism was recommended to find the critical line outage contingencies.

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4071

TABLE V
KEY WORDS, ANALYSIS, AND THE APPLYING OF EDGE COMPUTING IN THE SMART GRID

C. Applicability in Edge Computing Environment researches should not only learn from the existing
For the sake of clearly presenting the consideration of technologies, such
edge computing in the smart grid, we summarize some lit-
erature mentioned above in Table V. Obviously, the table
shows that a few schemes take edge computing into account
when discussing the security in the smart grid. Among them,
only [31] applies edge computing. However, [31] only intro-
duces edge computing as a background, but it does not reflect
in the authentication scheme. Edge nodes exhibits the char-
acteristics of distributed deployment. Such deployment brings
more threats to the secure communication of the smart grid,
such as the DDoS attack, so the requirement of resistance to
such attack should be taken into consideration when design-
ing authentication protocols. Moreover, in the edge computing
environment, massive smart devices are connected; thus, the
efficiency of authentication is another challenge that can-
not be ignored. These authentication protocols should realize
lightweight and improve the performance. In addition, if the
edge node is malicious or forcibly manipulated by the
attacker, the data information it stores will also be disclosed.
As far as the data sharing and aggregation are concerned, to
ensure the data security or even the data privacy, the future
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4071

TABLE V
as attribute encryption and homomorphic encryption but
also shorten the time delay, being able to correctly and
timely han- dle the data transmission among the smart grid
devices, edge computing nodes, and the cloud centers.

V. SMART H OME
In the smart home system, the data collected by the
sensor is transmitted to the decision-making unit, which
calculates the appropriate control signals to achieve the
predetermined goal [50]. The research works of
deploying cloud comput- ing, fog computing, and edge
computing to the smart home have been put forward
successively [51]–[54]. The scenario of the smart home in
the edge computing environment is presented in Fig. 4 [55],
[56]. Users can locally control kinds of smart home
devices through Bluetooth, Wi-Fi, home LAN, etc.
Additionally, users can also remotely operate home devices
through Internet services provided by the edge com- puting
layer. Therefore, the smart home system is also the
intrusion target of hackers and other attackers. For
instance, an attacker can launch a botnet attack [57] to
control vari- ous smart home device, so as to achieve a
large-scale DDoS attack.

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4072 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021

Fig. 4. Scene of the smart home in the edge computing environment.

A. Identity Authentication layer to establish encryption key for smart home devices.
As the summarized security requirements of the smart home However, the rate of key generation in most advanced
describe, it is necessary to realize the authentication of user schemes is low. To overcome this challenge and improve the
and smart home equipment. The entities in the smart home are key gen- eration rate, by using the received signal strength
able to use Bluetooth and other channels for communication, (RSS), Zhao et al. [60] presented an adaptive key
and these channels have their own unique parameters and fea- establishment scheme, where the two devices in the smart
tures. The designed schemes will prefer to use physical-layer home were able to quantify the RSS measurements adaptively
information for authentication. Such reviewing are illustrated and got the key. Furthermore, to demonstrate the
as follows. practicability, they car- ried out experimental implementation
From the perspective of identity authentication in the smart based on the Ralink Wi-Fi card of RT2870 chipset and
home, there have been many related works available for evaluated the random- ness of the key generation through the
reference [58]–[65]. The smart home enables individuals to test experiment of NIST randomness. In some cases, devices
control smart devices in their homes through the Internet. used in the smart home are made by various factories, so it
Internet services like IFTTT integrate different kinds of smart is a big challenge to use the secret loaded in advance by
home devices, which allow users to customize smart home different factories to securely establish the communication
configuration through IFTTT. In view of the challenge that key. In this case, Zhang et al. [61] presented a key
distributed malware based on features can harm users’ IFTTT agreement protocol suit- able for the smart home. Their
accounts, Baruah and Dhal [58] put forward a secure IFTTT- scheme adopted the problem of secret mismatch existing in
based framework for the smart home. It combined a one- the schemes of secret extraction on the physical layer. That is,
time password authentication scheme using verification code. two smart home devices used mismatched bitstreams to
Adopting one-time password makes it resist to replay attack. generate highly correlated blocks and then used these blocks
Chifor et al. [59] presented an authorization stack that was to mask the transmitted message between the devices in the
lightweight in the cloud environment to provide digital smart home, so as to guarantee the secure establishment of
identity for users and smart devices, where the cloud joint the communication key between them. Although this key
authentica- tion for the smart home through the fast identity protocol can address some issues existing in some related
online (FIDO) authentication message was realized. In works, it also increases some extra communication cost.
addition, they used a keep-alive online protocol for security, Considering the group communication, Mughal et al. [63]
which was executed every time when a user requested for the presented a mobile management scheme using logical tree,
authentication of FIDO. Additionally, to ensure the near real- which could effectively solve the problem of frequent key
time constraints, Chifor et al. implemented experiments based updates. Based on transaction history and physi- cal context
on the Kaa IoT cloud and further measured the delay time. awareness, Fakroon et al. [65] proposed a scheme for
To ensure the security of home LAN, it is necessary to authenticating the user remotely, which avoided the prob-
implement a lightweight key extraction scheme on the lems of clock synchronization and maintaining a verification
physical table.

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4073

B. Data Security C. Applicability in Edge Computing Environment


Similar to the smart grid, this subsection overviews related The smart home deploys various networking devices, con-
work in terms of the security protection on data sharing, data trollers, and wireless sensors to every corner. The data storage
aggregation, and data uploading. However, the designing is and processing of the smart home gateway or cloud alone
different from the smart grid and they are suitable for the may fail to achieve better experience effect. The emergence
environment of the smart home. of edge computing provides a solution to some extent. Variety
There is no doubt that numerous devices are connected in of devices in the smart home need to apply different proto-
the smart home, thereby massive data is generated simulta- cols for communication, such as Bluetooth, LAN, Wi-Fi, etc.
neously. Data sharing can promote the optimization of the Therefore, the identity authentication of the smart home in the
system, but the generated data usually contains the privacy edge computing environment should not only be designed to
of home users. Therefore, to ensure the privacy protection be lightweight enough but also be combined with the charac-
of these shared data, the numbers of schemes in this field teristics of Bluetooth, Wi-Fi and other network environments
have been proposed. For instance, Mollah et al. [66] used where the device is located, as well as the application char-
edge computing and presented a secure scheme of data shar- acteristics of edge computing. Additionally, to preserve the
ing at the edge of smart devices connected to the IoT by security and privacy of the home data transmission, process-
cloud. Their scheme adopted encryption technologies like ing sensitive data within the home is expected to realize, such
public-key encryption. Moreover, all the security executions as using the edge home gateway to process some data. To
are transferred to operate in edge servers nearby, which have better present those involved literature, we summarize several
greatly reduced the smart devices’ burdens on processing. In aforementioned literature in Table VI. However, we observe
2019, Yang et al. [67] put forward a random access memory that these schemes all fail to consider edge computing in the
architecture, which realized efficiency and security, achiev- smart home.
ing preserving data privacy and saving server resource when
sharing data. Their scheme combined the double chain circu-
lar information table with obfuscation operation and used the VI. SMART TRANSPORTATION
technology of proxy re-encryption to realize the secure The scene of the smart transportation in edge comput-
sharing of data among multiple users. ing is presented in Fig. 5 [72]–[75], where the edge nodes
In the process of data aggregation and upload, data secu- can be deployed to the roadside monitor, traffic lights, road-
rity needs to be considered as well. Therefore, based on side servers, etc. Similar to other smart applications, the
blockchain, Guan et al. [68] put forward an efficient scheme smart transportation system also faces various privacy disclo-
of data aggregation with privacy preserving. In their scheme, sure and security attack issues, which can refer to Table III
users were divided into different groups, where the mem- and [76]–[78]. For example, during the process of collect-
ber data was recorded by a private blockchain in the group. ing road state information, the system may inadvertently
Moreover, they used pseudonyms to hide the real identity collect the users’ private information and further disclose
of users, so as to preserve users’ privacy. The users were them. Attackers can attack the sensors or monitoring cameras
allowed to generate multiple pseudonyms, which were used installed on the roadside for information collection, result-
to associate with their data. For issues in some existing home ing in the destruction of the correct operation of the smart
LAN data protection schemes, such as the absolute monitor- transportation system.
ing and modification of the data by the home gateway and
the cloud’s inability to check the uploaded data’s integrity, A. Identity Authentication
Shen et al. [69] presented a secure data upload scheme
As mentioned in Section III-B, we prefer to research on
that addressed these mentioned issues. In the scheme, they
the authentication of the IoV. As an important research of the
designed a tag for verifying data’s integrity using a hash tree,
smart transportation, the IoV also faces many security threats.
where the tag allowed the service provider to possess the
In the IoV, vehicles possess the capability of broadcasting
function of data integrity checking. Additionally, through the
some special message like traffic accidents and emergencies.
structure of hash tree, partial local computing can be offloaded
To achieve the communication security, vehicles need to be
to the home gateway. Considering the authentication and the
certified to verify the legality of them and researchers have
secure data storage and query of the smart home system,
presented lots of works in this field [79]–[86].
Poh et al. [70] presented a scheme with privacy protection for
Specifically, based on the tamper-proof device (TPD) and
the smart home. Their scheme provided data confidentiality
roadside unit (RSU), Pournaghi et al. [79] proposed an
and authentication of entities to prevent external person mod-
authen- tication scheme, where the TPD of RSU was
ifying and learning the communication data among devices,
responsible to store the main system parameters and the keys.
gateways, service providers, and users. Besides, Poh et al.’s
Since there exists a secure and fast communication channel
scheme provided queries that preserved privacy, realizing
between the registration center and RSU, it is much more
that both gateways and service providers failed to know
effective to insert TPD into RSU. Moreover, their scheme
the specific data. Liu et al. [71] used the physical-layer
needed a rel- atively low cost because it did not need to
method to design a protocol that ensured the security of data
establish online RSU on the whole road. However, there are
exchange.
many vehi- cles in the IoV, so the efficiency of single
authentication

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4074 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021

TABLE VI
KEY WORDS, ANALYSIS, AND THE APPLYING OF EDGE COMPUTING IN THE SMART HOME

is not very high. Meanwhile, it is necessary to ensure the authentication scheme using blockchain. Their scheme
anonymity of the vehicle, so as to prevent the vehicle from authen- ticated servers and users anonymously, solving a
being tracked by the attacker and preserve the privacy of the single point of failure problems and realizing privacy
owner. In 2018, for some problems existing in the related preserving. Through the mutual authentication and distributed
works, such as the high cost of initial authentication may lead agreement mech- anism, Li et al.’s scheme exhibits high
to serious DoS attacks, Liu et al. [80] put forward a cooper- fault tolerance and can well handle the attacked servers. To
ative authentication scheme applied in VANET. Their scheme overcome the weak- nesses of the low performance and the
designs a computing problem using the real-time information strong hypothesis of ideal TPD, Zhong et al. [83] proposed a
like the expected receiver and location, so as to reduce DoS completely con- verged privacy-preserving authentication
attacks against anonymous authentication. Additionally, the scheme in vehicle ad hoc network. They used the
trust cluster was constructed by adopting the trust relation- aggregation signature with- out certificate, realizing the
ships among vehicles and the connected component theory secure communication of vehicle to infrastructure and greatly
that effectively helped construct the trust cluster. After estab- saving the resources of comput- ing and bandwidth.
lishing the trust clusters among the legal vehicles, they can Furthermore, they adopted pseudonyms, conditionally
conduct authentications through the trust cluster to improve achieving privacy protection, and when neces- sary, the
the efficiency. tracking agencies were able to identify the vehicle’s real
Furthermore, vehicles in the IoV come from different identity. Since the length is constant in the aggrega- tion
domains and the mobility of vehicles is high. Therefore, in signature, the overhead of storage and communication are
addition to the authentication of vehicles in the single domain, reduced. Based on bilinear pairing and one-way hash
cross-domain authentication of vehicles is also needed con- operation, Ali and Li [84] presented an efficient signature
sideration. In 2019, Li et al. [81] presented a cross-domain scheme called ID-CPPA, which was used for the communi-
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4074 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
cation between vehicles and infrastructure and was allowed
to

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4075

Fig. 5. Scene of the smart transportation in the edge computing environment.

authenticate massive traffic-related messages. Facing the when they transmit and store data, and allocate rewards to the
appli- cation of cloud-assisted autonomous vehicles, Jiang et vehicles participating in data sharing. Based on blockchain,
al. [86] presented a three-factor authentication scheme, Fan et al. [90] presented a scheme of data sharing that realized
involving smart card, biometrics and password. Their one to many, where the blockchain was responsible for
scheme pro- vides privacy preserving, especially user’s record- ing the access policy to achieve the cloud
biometric privacy preserving. nonrepudiation and user self-certification.
The rapid advancement in the IoT technology contributes to
massive smart devices with specific perception ability access-
B. Data Security
ing to the network and getting data. To guarantee the security
Various privacy data will be generated in the smart trans- and privacy of data aggregation, Li et al. [91] put forward
portation system, such as the location data produced by a scheme of data aggregation for IoT applications assisted
vehicle users, road information data collected by surveillance by mobile-edge computing in 2018. In their scheme, Boneh–
cameras, etc. To enjoy better service, some personal data is Goh–Nissim cryptosystem is adopted to ensure user privacy.
encouraged to share in the system. For better deciding on the Through edge computing, the public cloud center can use
data, some- times they need aggregating. All these data the sensing function of the IoT terminal equipment (TE) to
operation should be secure and even privacy preserving. To obtain specific parameters and the data collected by TE is
realize the above mentioned, researchers have presented summarized by the edge server. In 2019, based on fog
plenty of schemes and some of them [87]–[93] are illustrated comput- ing, Guan et al. [92] designed a device-oriented
as follows. scheme with privacy protection, which provided security for
Zhang and Chen [87] proposed a new scheme to ensure the the data aggre- gation application. It supported multiauthority
privacy protection of real-time location data. In this scheme, management of local smart devices and fog nodes. Moreover,
a vehicle can dynamically generate virtual location accord- Guan et al. used pseudonym and the corresponding
ing to the surroundings and provide misleading information pseudonym certificate to ensure the validity and anonymity
of driving route, so as to achieve the privacy preserving. Also, for the devices and deployed the local certification authority
based on the alliance chain, Zhang et al. [88] put forward a to transfer the management of pseudonyms to the professional
secure system of data storage and data sharing. The technol- edge fog network, so as to offer real-time services for the
ogy of digital signature adopted in [88] follows the elliptic registration and correspond- ing update of devices. Besides,
curve’s feature of bilinear pairing, which guarantees the relia- they used Paillier algorithm to ensure the data confidentiality
bility and integrity of data transmission. Besides, the adopted in the process of data aggre- gation. Based on the feature of
blockchain provides a decentralized database that is reliable message recovery signature (MRS), Shen et al. [93] proposed
and secure. In addition, the smart contracts are utilized to be a secure scheme of traffic data aggregation with real-time
the constraint triggering conditions of the preselected nodes service for vehicle cloud in

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4076 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021

TABLE VII
KEY WORDS, ANALYSIS, AND THE APPLYING OF EDGE COMPUTING IN THE SMART TRANSPORTATION

of the literature discussed above,


vehicle ad hoc network. The scheme first verified the valid-
ity of the signature of vehicles and then extracted the original
data of traffic from it. Because of the advantages of MRS,
Shen et al.’s scheme owns the common data security
attributes, such as the confidentiality, privacy protection, and
anti-replay attacks.

C. Applicability in Edge Computing Environment


The smart transportation system consists of vehicles, var-
ious roadside infrastructure, monitoring cameras, etc. There
exist interactions between not only vehicles and the road-
side infrastructure but also the edge node and the roadside
infrastructure, as well as the cloud and the edge nodes; thus,
different authentication protocols need to be designed to adapt
to the corresponding communication entities. In addition,
vehi- cles and edge nodes are dynamic, and the mobility of
vehicles is high and fast. Therefore, in the designed
authentication protocols, the edge server or cloud should
be able to cope with the dynamic changes, ensure high
efficiency, and do not increase complex computing
operations. To show the consid- eration on edge computing
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4076 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021

we summarize some of them in Table VII. From the


table, we observe that the existing authentication protocols
and data protection schemes in the IoV still lacks of
consideration on edge computing scenario. For
authentication, the scheme in [94], which realizes
anonymous authentication for mobile- edge computing,
may be a good reference. Additionally, because of the
participation of the edge sensors, the format of the
generated data may be different. While realizing security
and privacy protection, how to well integrate these
multisource heterogeneous data should be paid more
attention, and the cor- responding processing strategy with
privacy preserving should be chosen according to the data
characteristics, so that they can be better used in the
analysis.

VII. E XTENSION
Most of the aforementioned authentication schemes are
high-layer protocols based on cryptography without using
the inherent properties of the wireless channel. They may
resist various attacks, but they commonly cost high com-
putation or communication overhead. In recent years, PHY-
layer authentication based on physical-layer channel
features

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4077

is a hot authentication technology. It enhances the secu- research direction for the security in the edge computing
rity of high-layer with the help of transmission features of environment.
the channel, such as spatiotemporal uniqueness. Due to its
advantages of low computation and communication cost, low
delay and power consumption, and unnecessary distribution FUTURE WORK
of secret keys, PHY-layer authentication is promising to serve Based on the aforementioned summaries and discussions,
as a complementary solution for the conventional high-layer we look forward to future researches in this field as follows.
authentication. 1) When designing the protocol for realizing the identity
There is no doubt that PHY-layer authentication can be authentication in the edge computing-based smart grid
applied in these smart applications, as described in the smart system, we should not only consider the anonymity of
home scenario, such as [60] and [61]. Moreover, in the smart devices but also consider the ability to resist
smart city scenario, by using tag embedding and verification, DDoS attacks under edge computing. When designing
Zhang et al. [95] presented a PHY-layer authentication frame- the data security protection scheme, we should not only
work that was lightweight. PHY-layer authentication is also a learn from the existing data security technology of the
useful aid in edge computing. For instance, Liao et al. [96] smart grid but also reduce the time delay and ensure the
used PHY-layer authentication to enhance the security of data availability.
mobile-edge computing. In their designed method, multiple 2) After edge computing is deployed in the smart home,
legal edge nodes can be distinguished from attackers and based on the existing authentication technology, we
mali- cious nodes. Recently, Liao et al. [97], Zhang et al. [98], need to combine with the network environment of the
and Zhang et al. [99] have also investigated on PHY-layer home equipments and the application characteristics of
authenti- cation. For edge computing-based smart application edge computing and design the lightweight
scenarios, PHY-layer authentication may also be a good boost authentication protocols with high security. For the data
in identity authentication and there has presented such work. security and privacy preserving, the existing task
For instance, to overcome rogue edge attacks in mobile-edge offloading technolo- gies need to be improved, enabling
computing- based VANETs, an important part of smart them to offload part or all of the sensitive data in the
transportation scenario, Lu et al. [100] proposed a PHY smart home to the edge for execution.
authentication scheme by exploiting mobile device’s serving 3) After the combination of smart transportation and edge
edge and the related channel information. Unfortunately, computing, it is necessary to design the correspond-
PHY-layer authen- tication may be not suitable for the mobile ing security protocols with low cost and high efficiency
communication system with fast mobility, and to achieve under the condition of knowing the characteristics of
higher efficiency, it needs to be combined with mutual authentication entities, as well as considering the
cryptography. In a word, apply- ing PHY-layer dynamic and mobility. Moreover, in the environment of
authentication in edge computing-based smart application edge computing, according to the multisource hetero-
scenarios will be an interesting research direction in the geneity of the data generated by the smart transportation
future. system, it is necessary to design secure aggregation and
sharing schemes with privacy preserving.
4) The smart grid and the smart home, the smart grid
VIII. C ONCLUSION
and the smart transportation are also closely related.
The trend of the large-scale deployment of edge comput- For example, the smart grid can provide power for the
ing is inevitable, especially in IoT-based smart applications. smart home, and electric vehicles in the smart
From the viewpoint of cybersecurity, this article especially transporta- tion can help the smart grid in case of power
investigates on the issues of authentication and data secu- shortage when they are idle. Therefore, how to design
rity existing in edge computing-based smart applications. To appro- priate security protection technologies while
provide a comprehensive understanding, we briefly describe ensuring mutual promotion among them is another
some definitions of edge computing in current works and possible future research direction.
compare it with cloud computing. From the comparison,
it can be seen that edge computing does have its obvious
advantages, such as fast response. Moreover, we introduce R EFERENCES
three typical applications that apply edge computing and [1] “The 44th China statistical report on Internet development,” in Office
analyze some security weaknesses existing in these smart of the Central Leading Group for Cyberspace Affairs, China Internet
applications as well as edge computing. We observe that Netw. Inf. Center, Beijing, China, 2019.
[2] W. Shi and S. Dustdar, “The promise of edge computing,” Computer,
their common challenge is to ensure the identity legality of vol. 49, no. 5, pp. 78–81, May 2016.
system entity, which is also the most basic problem to be [3] M. Satyanarayanan, “The emergence of edge computing,” Computer,
solved in ensuring system security. Besides, data protection is vol. 50, no. 1, pp. 30–39, Jan. 2017.
[4] (2018). Gartner Inc. [Online]. Available: https://www.gartner.com/
indispensable because it is an important component of these technology/home.jsp
smart applications. Thus, based on authentication and data [5] K. Gai, Y. Wu, L. Zhu, L. Xu, and Y. Zhang, “Permissioned
security, we summarize some related works of these smart blockchain and edge computing empowered privacy-preserving smart
grid networks,” IEEE Internet Things J., vol. 6, no. 5, pp. 7992–8004,
applications and briefly illustrate the adaptability after edge Oct. 2019.
computing is introduced to them. Moreover, we give the
future
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4078 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021

[6] R. Trimananda, A. Younis, B. Wang, B. Xu, B. Demsky, and


[29] J.-L. Tsai and N.-W. Lo, “Secure anonymous key distribution scheme
G. Xu, “Vigilia: Securing smart home edge computing,” in Proc.
for smart grid,” IEEE Trans. Smart Grid, vol. 7, no. 2, pp. 906–914,
IEEE/ACM Symp. Edge Comput. (SEC), Seattle, WA, USA, 2018,
Mar. 2016.
pp. 74–89.
[7] Q. Li, P. Chen, and R. Wang, “Edge computing for intelligent trans- [30] V. Odelu, A. K. Das, S. Kumari, X. Huang, and M. Wazid, “Provably
portation system: A review,” in Cyberspace Data and Intelligence, secure authenticated key agreement scheme for distributed mobile
and Cyber-Living, Syndrome, and Health. Singapore: Springer, 2019, cloud computing services,” Future Gener. Comput. Syst., vol. 68,
pp. 130–137. pp. 74–88, Mar. 2017.
[8] S. Tan, D. De, W. Z. Song, J. Yang, and S. K. Das, “Survey of secu- [31] K. Mahmood et al., “Pairing based anonymous and secure key agree-
rity advances in smart grid: A data driven approach,” IEEE Commun. ment protocol for smart grid edge computing infrastructure,” Future
Surveys Tuts., vol. 19, no. 1, pp. 397–422, 1st Quart., 2017. Gener. Comput. Syst., vol. 88, pp. 491–500, Nov. 2018.
[9] D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, “A survey on secure [32] D. Abbasinezhad-Mood and M. Nikooghadam, “An anonymous ECC-
data analytics in edge computing,” IEEE Internet Things J., vol. 6, based self-certified key distribution scheme for the smart grid,” IEEE
no. 3, pp. 4946–4967, Jun. 2019. Trans. Ind. Electron., vol. 65, no. 10, pp. 7996–8004, Oct. 2018.
[10] M. Caprolu, R. Di Pietro, F. Lombardi, and S. Raponi, “Edge comput- [33] T. Chen, Q. Cheng, and X. Li, “An anonymous key agree-
ing perspectives: Architectures, technologies, and open security ment protocol with robust authentication for smart grid infras-
issues,” in Proc. IEEE Int. Conf. Edge Comput. (EDGE), Milan, tructure,” Sci. China Inf. Sci., early access. [Online]. Available:
Italy, 2019, pp. 116–123. http://engine.scichina.com/doi/10.1007/s11432-019-2736-5
[11] L. U. Khan, I. Yaqoob, N. H. Tran, S. Kazmi, T. N. Dang, and [34] K. Mahmood, S. A. Chaudhry, H. Naqvi, S. Kumari, X. Li, and
C. S. Hong, “Edge computing enabled smart cities: A comprehen- A. K. Sangaiah, “An elliptic curve cryptography based lightweight
sive survey,” IEEE Internet Things J., early access, Apr. 10, 2020, authentication scheme for smart grid communication,” Future Gener.
doi: 10.1109/JIOT.2020.2987070. Comput. Syst., vol. 81, pp. 557–565, Apr. 2018.
[12] J. Zhang, B. Chen, Y. Zhao, X. Cheng, and F. Hu, “Data security [35] D. Abbasinezhad-Mood and M. Nikooghadam, “Design and hard-
and privacy-preserving in edge computing paradigm: Survey and open ware implementation of a security-enhanced elliptic curve cryptography
issues,” IEEE Access, vol. 6, pp. 18209–18237, 2018. based lightweight authentication scheme for smart grid communica-
[13] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey tions,” Future Gener. Comput. Syst., vol. 84, pp. 47–57, Jul. 2018.
on mobile edge computing: The communication perspective,” IEEE [36] F. Afianti, T. Suryani, and I. Wirawan, “Lightweight and DoS resistant
Commun. Surveys Tuts., vol. 19, no. 4, pp. 2322–2358, 4th Quart., multiuser authentication in wireless sensor networks for smart grid
2017. environments,” IEEE Access, vol. 7, pp. 67107–67122, 2019.
[14] X. Wang, Y. Han, V. C. Leung, D. Niyato, X. Yan, and X. Chen, [37] D. Abbasinezhad-Mood, A. Ostad-Sharif, and M. Nikooghadam,
“Convergence of edge computing and deep learning: A comprehensive “Novel anonymous key establishment protocol for isolated smart
survey,” IEEE Commun. Surveys Tuts., vol. 22, no. 2, pp. 869–904, meters,” IEEE Trans. Ind. Electron., vol. 67, no. 4, pp. 2844–2851,
2nd Quart., 2020, doi: 10.1109/COMST.2020.2970550. Apr. 2020.
[15] Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu, and W. Lv, “Edge computing [38] M. F. Moghadam, M. Nikooghadam, A. H. Mohajerzadeh, and
security: State of the art and challenges,” Proc. IEEE, vol. 107, no. 8, B. Movali, “A lightweight key management protocol for secure com-
pp. 1608–1631, Aug. 2019. munication in smart grids,” Elect. Power Syst. Res., vol. 178, Jan.
[16] M. K. Kuyucu, S¸ . Bahtiyar, and G. ˙Ince, “Security and privacy 2020, Art. no. 106024.
in the smart home: A survey of issues and mitigation strategies,” in [39] W. Kong, J. Shen, P. Vijayakumar, Y. Cho, and V. Chang, “A practical
Proc. IEEE 4th Int. Conf. Comput. Sci. Eng. (UBMK), Samsun, group blind signature scheme for privacy protection in smart grid,” J.
Turkey, 2019, pp. 113–118. Parallel Distrib. Comput., vol. 136, pp. 29–39, Feb. 2020.
[17] R. D. T. Caropreso, R. A. Fernandes, D. P. Osorio, and I. N. Silva,
[40] A. Yassine, A. A. N. Shirehjini, and S. Shirmohammadi, “Smart
“An open-source framework for smart meters: Data communication
meters big data: Game theoretic model for fair data sharing in
and security traffic analysis,” IEEE Trans. Ind. Electron., vol. 66,
deregulated smart grids,” IEEE Access, vol. 3, pp. 2743–2754, 2015.
no. 2, pp. 1638–1647, Feb. 2019.
[18] A. Ghosal and M. Conti, “Key management systems for smart grid [41] O. Samuel, N. Javaid, M. Awais, Z. Ahmed, M. Imran, and M.
advanced metering infrastructure: A survey,” IEEE Commun. Surveys Guizani, “A blockchain model for fair data sharing in deregulated
Tuts., vol. 21, no. 3, pp. 2831–2848, 3rd Quart., 2019. smart grids,” in Proc. IEEE Global Commun. Conf. (GLOBCOM),
[19] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision Waikoloa, HI, USA, 2019, pp. 1–7.
and challenges,” IEEE Internet Things J., vol. 3, no. 5, pp. 637–646, [42] Y. Li, P. Zhang, and R. Huang, “Lightweight quantum encryption for
Oct. 2016. secure transmission of power data in smart grid,” IEEE Access, vol. 7,
[20] (2018). Edge Computing Consortium. [Online]. Available: pp. 36285–36293, 2019.
http://www.ecconsortium.org/Lists/show/id/334.html [43] Z. Wang, “An identity-based data aggregation protocol for the smart
[21] S. Raponi, M. Caprolu, and R. Di Pietro, “Intrusion detection at the grid,” IEEE Trans. Ind. Informat., vol. 13, no. 5, pp. 2428–2435,
network edge: Solutions, limitations, and future directions,” in Proc. Oct. 2017.
Int. Conf. Edge Comput., 2019, pp. 59–75. [44] P. Gope and B. Sikdar, “An efficient data aggregation scheme for
[22] T. M. Mengistu, A. Albuali, A. Alahmadi, and D. Che, “Volunteer privacy-friendly dynamic pricing-based billing and demand-response
cloud as an edge computing enabler,” in Proc. Int. Conf. Edge management in smart grids,” IEEE Internet Things J., vol. 5, no. 4,
Comput., 2019, pp. 76–84. pp. 3126–3135, Aug. 2018.
[23] T. Suganuma, T. Oide, S. Kitagami, K. Sugawara, and N. Shiratori, [45] Y. Liu, W. Guo, C. I. Fan, L. Chang, and C. Cheng, “A practical
“Multiagent-based flexible edge computing architecture for IoT,” IEEE privacy-preserving data aggregation (3PDA) scheme for smart grid,”
Netw., vol. 32, no. 1, pp. 16–23, Jan./Feb. 2018. IEEE Trans. Ind. Informat., vol. 15, no. 3, pp. 1767–1774, Mar. 2019.
[24] Z. Guan, J. Li, L. Wu, Y. Zhang, J. Wu, and X. Du, “Achieving efficient [46] J. Song, Y. Liu, J. Shao, and C. Tang, “A dynamic membership data
and secure data acquisition for cloud-supported Internet of Things in aggregation (DMDA) protocol for smart grid,” IEEE Syst. J., vol. 14,
smart grid,” IEEE Internet Things J., vol. 4, no. 6, pp. 1934–1944, no. 1, pp. 900–908, Mar. 2020, doi: 10.1109/JSYST.2019.2912415.
Dec. 2017. [47] P. Gope and B. Sikdar, “An efficient privacy-friendly hop-by-hop data
[25] (2018). Cloud Tencent and Energy IoT Pengmai. [Online]. Available: aggregation scheme for smart grids,” IEEE Syst. J., vol. 14, no. 1,
https://cloud.tencent.com/solution/energy_iot pp. 343–352, Mar. 2020, doi: 10.1109/JSYST.2019.2899986.
[26] N. Gupta, K. Anantharaj, and K. Subramani, “Containerized archi- [48] H. Shen, Y. Liu, Z. Xia, and M. Zhang, “An efficient aggregation
tecture for edge computing in smart home: A consistent architecture scheme resisting on malicious data mining attacks for smart grid,” Inf.
for model deployment,” in Proc. IEEE Int. Conf. Comput. Commun. Sci., vol. 526, pp. 289–300, Jul. 2020, doi: 10.1016/j.ins.2020.03.107.
Informat. (ICCCI), Coimbatore, India, 2020, pp. 1–8. [49] M. Mohammadpourfard, Y. Weng, M. Pechenizkiy, M. Tajdinian, and
[27] (2019). Edge Computing Consortium. [Online]. Available: B. Mohammadi-Ivatloo, “Ensuring cybersecurity of smart grid against
http://www.ecconsortium.org/Lists/show/id/374.html data integrity attacks under concept drift,” Int. J. Elect. Power Energy
[28] A. Kumari, S. Tanwar, S. Tyagi, N. Kumar, M. S. Obaidat, and Syst., vol. 119, Jul. 2020, Art. no. 105947.
J. J. Rodrigues, “Fog computing for smart grid systems in the 5G envi-
[50] S. Feng, P. Setoodeh, and S. Haykin, “Smart home: Cognitive
ronment: Challenges and solutions,” IEEE Wireless Commun., vol. 26,
interactive people-centric Internet of Things,” IEEE Commun. Mag.,
no. 3, pp. 47–53, Jun. 2019.
vol. 55, no. 2, pp. 34–39, Feb. 2017.

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4079

[51] M. Tao, J. Zuo, Z. Liu, A. Castiglione, and F. Palmieri, “Multi-layer


[74] H. A. Khattak, S. U. Islam, I. U. Din, and M. Guizani, “Integrating fog
cloud architectural model and ontology-based security service frame-
work for IoT-based smart homes,” Future Gener. Comput. Syst., vol. computing with VANETs: A consumer perspective,” IEEE Commun.
78, pp. 1040–1051, Jan. 2018. Stand. Mag., vol. 3, no. 1, pp. 19–25, Mar. 2019.
[52] A. Yassine, S. Singh, M. S. Hossain, and G. Muhammad, “IoT big [75] S. Garg et al., “Edge computing-based security framework for big
data analytics for smart homes with fog and cloud computing,” Future data analytics in VANETs,” IEEE Netw., vol. 33, no. 2, pp. 72–81,
Gener. Comput. Syst., vol. 91, pp. 563–573, Feb. 2019. Mar./Apr. 2019.
[53] C. S. M. Babou, D. Fall, S. Kashihara, I. Niang, and Y. Kadobayashi, [76] A. Mahmood, H. Zen, and S. Hilles, “Big data and privacy
“Home edge computing (HEC): Design of a new edge computing issues for connected vehicles in intelligent transporta-
technology for achieving ultra-low latency,” in Proc. Int. Conf. Edge tion systems,” 2018. [Online]. Available: arXiv:1806.02944.
Comput., 2018, pp. 3–17. doi: 10.1007/978-3-319-63962-8_234-1.
[54] J. M. Batalla and F. Gonciarz, “Deployment of smart home manage- [77] A. Nanda, D. Puthal, J. J. Rodrigues, and S. A. Kozlov, “Internet
ment system at the edge: Mechanisms and protocols,” Neural Comput. of autonomous vehicles communications security: Overview, issues,
Appl., vol. 31, no. 5, pp. 1301–1315, 2019. and directions,” IEEE Wireless Commun., vol. 26, no. 4, pp. 60–65,
[55] K. Xu, Y. Wan, and G. Xue, “Powering smart homes with information- Aug. 2019.
centric networking,” IEEE Commun. Mag., vol. 57, no. 6, pp. 40–46, [78] D. A. Hahn, A. Munir, and V. Behzadan, “Security and privacy
Jun. 2019. issues in intelligent transportation systems: Classification and chal-
[56] L. Zhu, M. Li, Z. Zhang, X. Du, and M. Guizani, “Big data mining of lenges,” IEEE Intell. Transp. Syst. Mag., early access, Apr. 11, 2019,
users’ energy consumption patterns in the wireless smart grid,” IEEE doi: 10.1109/MITS.2019.2898973.
Wireless Commun., vol. 25, no. 1, pp. 84–89, Feb. 2018. [79] S. M. Pournaghi, B. Zahednejad, M. Bayat, and Y. Farjami,
[57] Y. Meidan et al., “N-BaIoT—Network-based detection of IoT botnet “NECPPA: A novel and efficient conditional privacy-preserving
attacks using deep autoencoders,” IEEE Pervasive Comput., vol. 17, authentication scheme for VANET,” Comput. Netw., vol. 134, pp. 78–
no. 3, pp. 12–22, Jul./Sep. 2018. 92, Apr. 2018.
[58] B. Baruah and S. Dhal, “A two-factor authentication scheme against [80] P. Liu, B. Liu, Y. Sun, B. Zhao, and I. You, “Mitigating DoS
FDM attack in IFTTT based smart home system,” Comput. Security, attacks against pseudonymous authentication through puzzle-based co-
vol. 77, pp. 21–35, Aug. 2018. authentication in 5G-VANET,” IEEE Access, vol. 6, pp. 20795–20806,
[59] B. C. Chifor, I. Bica, V. V. Patriciu, and F. Pop, “A security authoriza- 2018.
tion scheme for smart home Internet of Things devices,” Future Gener. [81] C. Li, Q. Wu, H. Li, and J. Liu, “Trustroam: A novel blockchain-
Comput. Syst., vol. 86, pp. 740–749, Sep. 2018. based cross-domain authentication scheme for Wi-Fi access,” in Proc.
[60] H. Zhao, Y. Zhang, X. Huang, and Y. Xiang, “An adaptive secret key Int. Conf. Wireless Algorithms Syst. Appl., 2019, pp. 149–161.
establishment scheme in smart home environments,” in Proc. IEEE Int. [82] S. Tangade, S. S. Manvi, and P. Lorenz, “Decentralized and scalable
Conf. Commun. (ICC), Shanghai, China, 2019, pp. 1–6. privacy-preserving authentication scheme in VANETs,” IEEE Trans.
[61] Y. Zhang, H. Zhao, Y. Xiang, X. Huang, and X. Chen, “A key agree- Veh. Technol., vol. 67, no. 9, pp. 8647–8655, Sep. 2018.
ment scheme for smart homes using the secret mismatch problem,” [83] H. Zhong, S. Han, J. Cui, J. Zhang, and Y. Xu, “Privacy-preserving
IEEE Internet Things J., vol. 6, no. 6, pp. 10251–10260, Dec. 2019. authentication scheme with full aggregation in VANET,” Inf. Sci.,
[62] Y. Lu, G. Xu, L. Li, and Y. Yang, “Robust privacy-preserving mutual vol. 476, pp. 211–221, Fev. 2019.
authenticated key agreement scheme in roaming service for global [84] I. Ali and F. Li, “An efficient conditional privacy-preserving
mobility networks,” IEEE Syst. J., vol. 13, no. 2, pp. 1454–1465, authentica- tion scheme for vehicle-to-infrastructure communication in
Jun. 2019. VANETs,” Veh. Commun., vol. 22, Apr. 2020, Art. no. 100228.
[63] M. A. Mughal, P. Shi, A. Ullah, K. Mahmood, M. Abid, and X. Luo, [85] T. Chen, X. Li, and Q. Cheng, “An enhanced key exchange protocol
“Logical tree based secure rekeying management for smart devices exhibiting key compromise impersonation attacks resistance in mobile
groups in IoT enabled WSN,” IEEE Access, vol. 7, pp. 76699–76711, commerce environment,” Sci. China Inf. Sci., 2019. [Online].
2019. Available: http://engine.scichina.com/doi/10.1007/s11432-019-2645-x
[64] Q. Jiang, Z. Chen, J. Ma, X. Ma, J. Shen, and D. Wu, “Optimized [86] Q. Jiang, N. Zhang, J. Ni, J. Ma, X. Ma, and K.-K. R. Choo, “Unified
fuzzy commitment based key agreement protocol for wireless body biometric privacy preserving three-factor authentication and key agree-
area network,” IEEE Trans. Emerg. Topics Comput., early access, Oct. ment for cloud-assisted autonomous vehicles,” IEEE Trans. Veh.
23, 2019, doi: 10.1109/TETC.2019.2949137. Technol., early access, Feb. 3, 2020, doi: 10.1109/TVT.2020.2971254.
[65] M. Fakroon, M. Alshahrani, F. Gebali, and I. Traore, “Secure [87] X. Zhang and X. Chen, “Data security sharing and storage based on a
remote anonymous user authentication scheme for smart home envi- consortium blockchain in a vehicular ad-hoc network,” IEEE Access,
ronment,” Internet Things, vol. 9, Mar. 2020, Art. no. 100158, vol. 7, pp. 58241–58254, 2019.
doi: 10.1016/j.iot.2020.100158. [88] L. Zhang et al., “Blockchain based secure data sharing system for
[66] M. B. Mollah, M. A. K. Azad, and A. Vasilakos, “Secure data sharing Internet of Vehicles: A position paper,” Veh. Commun., vol. 16,
and searching at the edge of cloud-assisted Internet of Things,” IEEE pp. 85–93, Apr. 2019.
Cloud Comput., vol. 4, no. 1, pp. 34–42, Jan./Feb. 2017. [89] J. Shen, T. Zhou, J. F. Lai, P. Li, and S. Moh, “Secure and efficient
[67] H. Yang, W. Zheng, T. Zhou, X. Jin, and A. Wang, “A privacy- data sharing in dynamic vehicular networks,” IEEE Internet Things J.,
protecting and resource-saving scheme for data sharing in smart early access, Apr. 29, 2020, doi: 10.1109/JIOT.2020.2985324.
home,” [90] K. Fan et al., “A secure and verifiable data sharing scheme
J. Internet Technol., vol. 20, no. 2, pp. 607–615, 2019. based on blockchain in vehicular social networks,” IEEE
[68] Z. Guan et al., “Privacy-preserving and efficient aggregation based Trans. Veh. Technol., vol. 69, no. 6, pp. 5826–5835, Jun. 2020,
on blockchain for power grid communications in smart communities,” doi: 10.1109/TVT.2020.2968094.
IEEE Commun. Mag., vol. 56, no. 7, pp. 82–88, Jul. 2018. [91] X. Li, S. Liu, F. Wu, S. Kumari, and J. J. Rodrigues, “Privacy
[69] J. Shen, C. Wang, T. Li, X. Chen, X. Huang, and Z.-H. Zhan, “Secure preserving data aggregation scheme for mobile edge computing
data uploading scheme for a smart home system,” Inf. Sci., vol. 453, assisted IoT applications,” IEEE Internet Things J., vol. 6, no. 3,
pp. 186–197, Jul. 2018. pp. 4755–4763, Jun. 2019.
[70] G. S. Poh, P. Gope, and J. Ning, “PrivHome: Privacy-preserving
[92] Z. Guan et al., “APPA: An anonymous and privacy preserving data
authenticated communication in smart home environment,” IEEE
aggregation scheme for fog-enhanced IoT,” J. Netw. Comput. Appl.,
Trans. Depend. Secure Comput., early access, May 3, 2019,
vol. 125, pp. 82–92, Jan. 2019.
doi: 10.1109/TDSC.2019.2914911.
[93] J. Shen, D. Liu, X. Chen, J. Li, N. Kumar, and P. Vijayakumar,
[71] Q. Liu, W. Zhang, S. Ding, H. Li, and Y. Wang, “Novel secure group
“Secure real-time traffic data aggregation with batch verification for
data exchange protocol in smart home with physical layer network
vehicu- lar cloud in VANETs,” IEEE Trans. Veh. Technol., vol.
coding,” Sensors, vol. 20, no. 4, p. 1138, 2020.
69, no. 1, pp. 807–817, Jan. 2020, doi: 10.1109/TVT.2019.2946935.
[72] S. Garg, A. Singh, S. Batra, N. Kumar, and L. T. Yang, “UAV-
[94] Y. Li, Q. Cheng, X. Liu, and X. Li, “A secure anonymous
empowered edge computing environment for cyber-threat detection in
identity-based scheme in new authentication architecture for mobile
smart vehicles,” IEEE Netw., vol. 32, no. 3, pp. 42–51, May/Jun. 2018.
[73] T. S. Darwish and K. A. Bakar, “Fog based intelligent transportation edge computing,” IEEE Syst. J., early access, Mar. 19, 2020,
doi: 10.1109/JSYST.2020.2979006.
big data analytics in the Internet of Vehicles environment: Motivations,
architecture, challenges, and critical issues,” IEEE Access, vol. 6, [95] P. Zhang, J. Liu, Y. Shen, H. Li, and X. Jiang, “Lightweight tag-based
pp. 15679–15701, 2018. PHY-layer authentication for IoT devices in smart cities,” IEEE
Internet Things J., vol. 7, no. 5, pp. 3977–3990, May 2020.

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4080 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021

[96] R. Liao et al., “Security enhancement for mobile edge comput-


ing through physical layer authentication,” IEEE Access, vol. 7, Qingfeng Cheng received the M.S. degree from
pp. 116390–116401, 2019. the National University of Defense Technology,
[97] R. F. Liao et al., “Multiuser physical layer authentication in Internet Changsha, China, in 2004, and the Ph.D.
of Things with data augmentation,” IEEE Internet Things J., vol. 7, degree from Information Engineering University,
no. 3, pp. 2077–2088, Mar. 2020. Zhengzhou, China, in 2011.
[98] N. Zhang et al., “Physical layer authentication for Internet of Things He is currently an Associate Professor with the
via WFRFT-based Gaussian tag embedding,” IEEE Internet Things J., State Key Laboratory of Mathematical Engineering
early access, Jun. 11, 2020, doi: 10.1109/JIOT.2020.3001597. and Advanced Computing, Strategic Support Force
[99] P. Zhang, Y. Shen, X. Jiang, and B. Wu, “Physical layer authentication Information Engineering University, Zhengzhou.
jointly utilizing channel and phase noise in MIMO systems,” IEEE His research interests include cryptography and
Trans. Commun., vol. 68, no. 4, pp. 2446–2458, Apr. 2020. information security.
[100] X. Lu, L. Xiao, T. Xu, Y. Zhao, Y. Tang, and W. Zhuang,
“Reinforcement learning based PHY authentication for VANETs,”
IEEE Trans. Veh. Technol., vol. 69, no. 3, pp. 3068–3079, Mar. 2020.

Xinghua Li (Member, IEEE) received the M.E.


and Ph.D. degrees in computer science from Siqi Ma received the B.S. degree in computer sci-
Xidian University, Xi’an, China, in 2004 and 2007, ence from Xidian University, Xi’an, China, in 2013,
respectively. and the Ph.D. degree in information system from
He is currently a Professor with the School of Singapore Management University, Singapore, in
Cyber Engineering, Xidian University. His research 2018.
interests include wireless networks security, privacy She is currently a Lecturer with the School of
protection, cloud computing, and security protocol Information Technology and Electrical Engineering,
formal methodology. University of Queensland, Brisbane, QLD,
Australia, and was a Research Fellow with
Distinguished System Security Group, CSIRO,
Canberra, ACT, Australia. Her research interests
include IoT security,
mobile security, and software security.

Ting Chen received the B.S. degree in Internet


of Things Engineering from East China Jiaotong Jianfeng Ma (Member, IEEE) received the M.E.
University, Nanchang, China, in 2018. She is cur- and Ph.D. degrees in computer software and
rently pursuing the M.S. degree in security of communi- cations engineering from Xidian
cyberspace with Xidian University, Xi’an, China. University, Xi’an, China, in 1988 and 1995,
Her research interests include authentication and respectively.
security protocol. He is currently a Professor with the School of
Cyber Engineering, Xidian University, China. His
research interests include information and network
security, coding theory, and cryptography.

Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.

You might also like