Smart
Smart
TABLE I
COMPARISON OF EXISTING OVERVIEWS WITH THEIR PRIMARY FOCUS
Consequently, the original schemes need improving based on and related architectures of edge computing, we
the features of edge computing before they are applied to exhibit the edge computing-based architecture for smart
these edge computing-based systems. applications.
Currently, there have existed some overviews on smart 2) We describe three typical smart applications and briefly
applications or edge computing, such as [7], [8], [11]–[18]. illustrate how edge computing works in them. Then,
Among them, Khan et al. [11] surveyed on edge computing we briefly summarize some security risks of them and
driven smart city and highlighted the role that edge computing present a security protection framework by taking iden-
played in smart city, but it did not focus on the security of tity authentication and data preserving for illustration.
specific applications in smart city. Although Zhang et al. [12] 3) Based on the proposed security protection framework,
and Xiao et al. [15] highlighted the security in edge com- we overview and analyze the current related works,
puting, but they did not combine specific smart applications. including briefly discussing their applicability after the
As [13] and [14], they only surveyed on edge computing, participation of edge computing.
neither combining smart applications nor focusing on secu- 4) After summaries, analysis, and discussions, we briefly
rity. Tan et al. [8] and Kuyucu et al. [16] put emphasis present the future security researches on authentication
on the security discussion in the smart grid and the smart and data security of the edge computing-based smart
home, respectively, but they did not take edge computing applications.
into account. Li et al. [7] surveyed on edge computing- The remaining of this article is sketched as follows. We
based smart transportation, but their focus is not security. briefly introduce the definitions of edge computing and
Caropreso et al. [17] and Ghosal and Conti [18] summarized exhibit the architecture of smart applications based on edge
the security issues and technologies related to smart metering computing in Section II. Section III introduces three typical
facilities in the smart grid. Concretely, Caropreso et al. [17] smart applica- tions, analyzes the security protection
put forward an open-source framework of smart meters from requirements from the perspective of identity authentication
the perspective of communication security and data security, and data security, and puts forward the security protection
and realized the multiframe communication between the client framework of these smart applications in the edge
and the server by TCP/IP protocol via wireless networks. computing environment. Based on the proposed framework,
Ghosal and Conti [18] emphasized the important role that some recent research reviews and corresponding analysis of
key management system played in the advanced measurement the smart grid, the smart home, and the smart transportation
infrastructure of the smart grid, and observed that its secu- are given in Sections IV–VI in order. Section VII presents
rity was still a challenge. Although Caropreso et al. [17] and brief extension that is interesting. Section VIII concludes this
Ghosal and Conti [18] have made contributions to survey on article. The last section presents the possible research works
the security of the smart grid, they still failed to consider edge in the future.
computing. To indicate the difference between our article and
the aforementioned overviews, the comparison of our
overview with [7], [8], [11]–[18] is given in Table I. From the II. EDGE COMPUTING: DEFINITION AND A RCHITECTURE
compar- ison, it is obvious that our overview is the first one to
As [19] described, the requirement of edge computing were
discuss the security of edge computing-based smart
pushed from three aspects, i.e., cloud services, IoT, and data
applications and the corresponding applicability in edge
consumer to producer. Specifically, when various edge
computing. Since the legality of entity and data security are
devices produce massive data that needs efficient processing
two basic points to guar- antee the better function of the
in a network area, it is a challenge for the cloud to meet the
system, we take the two aspects to discuss. Our main
high efficiency with limited resources. Moreover, in the IoT
contributions are listed as follows.
era, billions of devices participate in the data production. All
1) We introduce the definition of edge computing from dif-
the data transmitted to the cloud puts great pressure on the
ferent research works. Associating with the definitions
network bandwidth. To some extent, processing data on the
edge of the
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4065
network can protect users’ privacy better. Thus, the the edge gateway focuses on network protocol processing and
emergence of edge computing is inevitable, which plays a conversion, the edge controller focuses on supporting real-
nonnegligible role in addressing the aforementioned issues. time closed-loop control business, and the edge sensor mainly
The definitions of edge computing are various on ver- collects and processes low-power information. Specifically,
sions. Specifically, Shi et al. [19] claimed that it referred to when these smart applications upload data to the cloud center
a technology, where the computing was permitted to be exe- and interact with it, edge computing layer plays a significant
cuted on the edge network. Moreover, the downstream and role in data processing and storage, service delivery, the IoT
the upstream data represent cloud service and IoT services, management, privacy protection, and computing offloading by
respectively. The word “edge” can refer to any network and decreasing the time delay and lightening the pressure of the
computing service existing from the data source to the cloud cloud center.
center. Edge computing consortium (ECC) also defined it in As Fig. 1 displays, cloud computing and edge computing
the white paper of Edge Computing Reference Architecture are complementary and cooperative. They have their own
3.0. Concretely, edge computing, a distributed architecture, advan- tages, but they are not separate. Otherwise, the
inte- grates the computing, network, and other core system will not achieve the expected effect. As for cloud
capabilities on the edge network. Close to the objects or data computing, it possesses a larger storage resource, while the
sources, it provides smart services nearby and satisfies some storage resource of edge computing is limited. However,
key require- ments, such as the industry digitalization in agile compared with cloud computing, edge computing closes to the
connection, real-time business, application intelligence, etc. data producer and costs shorter time to respond users. If the
Besides, it serves as a bridge that connects the physical and user requires a real- time response, then edge computing
digital world, enabling smart assets, smart gateways, and functioned as the data processor can satisfy the user by
smart services [20]. Associating with the aforementioned reducing the delay. In addi- tion, to well make use of the
definitions, based on our understanding of edge computing storage of cloud computing, the edge node can also return
and related descriptions in [21]–[23], we put forward an edge the data result to the cloud if the user approves. In this case,
computing-based archi- tecture for smart applications, seen in if the edge node misses some data that the user requires,
Fig. 1. The architecture consists of three layers, i.e., the cloud he/she can obtain them from the cloud. To exhibit a more
center, edge computing, and the smart applications. Edge comprehensive display of the differences and relations
computing, which interacts with both the cloud center and between cloud computing and edge computing, we summarize
the smart applications, is in the middle layer, docking with them in Table II.
the cloud upward and connect- ing with various smart
devices downward. Edge computing is mainly composed of
various hardware entity edge nodes. As described in [20], III. TYPICAL SMART APPLICATIONS AND
according to different hardware char- acteristics and C ORRESPONDING SECURITY R EQUIREMENTS
business focus, edge nodes can be classified into edge
Three typical smart applications, i.e., the smart grid, the
gateway, edge controller, edge sensor, etc., where
smart home, and the smart transportation, are introduced in
this
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4066 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
TABLE II
DIFFERENCE AND RELATION BETWEEN CLOUD COMPUTING 2) Smart Home: Except for the smart grid, the smart home,
AND EDGE COMPUTING
which aims to improve the living environment of res-
idents and remotely or automatically control different
smart home appliances through computer and commu-
nication technologies, is also a hot application under
the development of IoT. In the smart home scene, there
are security monitoring devices, such as smart webcam
that can identify hazards. Undoubtedly, smart appli-
ances are indispensable in the smart home. They can
implement some automatic functions for hosts’ conve-
nience. Moreover, smart energy and lighting are in great
demand, such as smart doors and windows. One of the
most important thing to realize smart home is sensing
and speech recognition, which produce the amount of
sensitive data locally. To better analyze and decide on
these data in real time as well as preserving the privacy,
edge node plays an essential role. In some proposed
smart home edge computing architecture [26], there
have introduced edge analysis engines like local speech
section, including illustrating how edge computing is recog- nition. Such engines, which are used to
deployed in them at current research. Furthermore, we will temporarily store sensitive data and further analyze
summarize some security risks and security requirements of them, are deployed on the edge and close to data
them in terms of authentication and data security. The details resource.
are shown as follows. 3) Smart Transportation: The smart transportation can
help solve the issues of urban residents’ travel path. It
inte- grates several technologies like information and
A. Brief Introduction of Typical Smart Applications com- munication technology, and applies them to the
1) Smart Grid: As one of the IoT applications, the smart trans- portation, the vehicle manufacturing, and service
grid is a network physical system covering various control, realizing the improvement on the traffic
smart devices. It perfectly combines modern environment and efficiency. Information collection,
information tech- nology with traditional grid, and information analysis, and information release are three
transmits not only current but also the data of advanced significant components of the smart transportation. For
monitoring appli- cations. It highly integrates flows of instance, if a vehi- cle accident happens somewhere,
power, information, and business and improves the nearby monitors can collect such information, analyze
efficiency of power sup- ply. Smart grid relies on some causes of such acci- dent, and release the accident
advanced technologies, such as data analysis, sensing, information in the system to inform other vehicles and
and measurement, to realize its efficient function with users. However, numer- ous vehicles and monitoring
security and relia- bility. A variety of monitoring equipment are included in the system. Since the
devices and measur- ing equipment are deployed in bandwidth is limited and the data resource is far from
the smart grid system. In the earlier stage, it applies the data center, some urgent information may not be
cloud computing for data processing and storage to released in real time, result- ing in serious
guarantee efficiency. A related illustration can refer to consequence. To address such problem, researchers
[24]. In response to the high requirement of real time have tried to apply edge computing and realize cloud-
and meeting the challenges in communication and edge collaboration. The edge nodes are deployed close
storage, researchers have introduced edge computing to roadside infrastructure and vehicles, such as edge
into the smart grid. Concretely, analyze and process the servers and edge sensors. In this way, the related
data collected by smart meters and other monitoring information can be sent to the edge nodes close to the
equipment on the edge or power devices terminal. There data source for analysis and processing in some
have already existed such cases in application. For emergency cases.
instance, Tencent Cloud and Pengmai Energy
Technology took edge com- puting into account and
B. Summary of Security Requirements
released the overall architecture of energy IoT solution
in 2018 [25]. In the released Pengmai smart grid No matter the smart grid, the smart home, or the smart
solution, the edge server acts as the core component. It transportation, the complexity of their own structure and the
connects with numerous monitoring devices and diversity of their participants will lead to many security
measuring equipment deployed in the smart grid, threats. Edge computing also risks various security issues. For
collects power information and analyzes them in real a clear display of the security problems existing in both edge
time. com- puting and the described three smart applications, we
briefly summarize and list them in Table III. There is no
deny- ing that the participation of edge computing will make
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4066 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
them
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4067
TABLE III
BRIEF SUMMARY OF SECURITY WEAKNESSES EXISTING IN EDGE defense line and the most significant basis. Identity authenti-
COMPUTING AND THOSE SMART APPLICATIONS
cation technology can confirm the validity of communication
participants, preventing the attacker from impersonating as the
legitimate users to spoof the server and consuming the com-
puting, storage, and network sources of the server. Similarly,
this technology prevents the attacker from impersonating as
the legitimate servers to obtain the privacy information of
users. In the edge computing environment, multiple trust
domains coexist, and multiple user entities in the smart grid,
the smart home, and the smart transportation participate in
communica- tion and interaction. Therefore, realizing the
authentication of the application system is very necessary.
Additionally, any system will produce various data and the
data plays an important part in these systems. The data is
usually generated from the user terminal and there exists
user’s sensitive privacy in these data. Moreover, the data
produced in the systems are encouraged to be shared and
aggregated for better function of the systems, but the
security needs to be guaranteed in these data operations.
Thus, data security is another essential basis to guarantee the
normal and even better functions of these systems. That is,
apart from identity authentication, data security protection is
also a top priority.
Similar to the smart grid, the smart home, and smart trans-
portation, after edge computing is applied to them, although
there involve threats of both edge computing and smart
applications, the identity authentication of entities and data
security are common issues. Besides, there exists a
relationship between identity authentication and data security.
By authen- tication, the user’s legality is verified and then
he/she can be authorized to access certain data. Moreover, in
some proposed authentication schemes, after authentication,
become more complex, and the characteristics of edge legal users can further negotiate a session key that can be
comput- ing also add new security threats to these smart utilized to pro- tect the data transmitted between the entities,
applications. For instance, various edge nodes are distributed realizing data protection to a certain extent.
in the system, such as edge server and edge controller, so they Different scenarios possess different architecture character-
are easier to become the target of attackers. Concretely, the istics and the authentication objects are also not the same.
attacker can disguise malicious edge nodes as legitimate edge Accordingly, the requirements of authentication and data
nodes and then induce users to access them by giving some secu- rity protection are naturally different. Consequently,
benefits. In this case, some important information of user there is no such common identity authentication scheme and
may be leaked to the attacker, such as the account and data security protection mechanism for these smart application
password of some soft- ware used by users. Furthermore, as scenarios. We present the differences between them and
Edge Computing Security White Paper released [27], there summarize their respective security requirements on
exist 12 security challenges in edge computing, mainly authentication and data preserving as follows.
reflecting in four aspects, i.e., edge network, edge dada, edge 1) First, according to the different security requirements
application, and edge infrastruc- ture. In terms of attacks, they and device characteristics of smart applications in these
may occur in edge access, edge server, and edge edge computing-based systems, it is necessary to design
management. For edge access, there exist insecure different authentication schemes, thus realizing the con-
communication protocols and malicious edge nodes. For edge fidentiality of the communication process. Generally,
server, it occurs problems, such as Distributed Denial of the authentication in the smart grid occurs at the smart
Service (DDoS), insecure systems and components, and lack meter and service provider and requires properties of
of data privacy preserving. For edge management, it anonymity, unlinkability, and lightweight. While in the
exhibits challenges like malicious administrators that are smart home, apart from the smart meter, there are other
difficult to supervise. Thus, if edge computing is applied in home devices that need to authenticate with users or
the smart application, it is inevitable to face these security home gateway. The authentication also requires rela-
problems. tively lightweight. In the smart transportation, we prefer
Currently, most Internet scenes are open to people, to discuss authentication in the Internet of Vehicles
including users and attackers. To guarantee the normal and (IoV), i.e., vehicle to vehicle and vehicle to roadside
secure func- tion of the Internet system, identity infrastructure. The authentication in such scene may
authentication is the first
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4068 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4068 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4068 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4069
provider anonymously without the participation of third par- key disclosure attacks in the Canetti–Krawczyk (CK) threat
ties in the authentication. Additionally, only a small amount of model. Based on these analyses, Abbasinezhad-Mood and
calculation operation is needed at the smart meter. However, Nikooghadam [35] mended the drawbacks. In 2019, based
Odelu et al. [30] found that the scheme in [29] suffered on TinySet, Afianti et al. [36] designed a multiuser authen-
from server impersonation attacks and failed to provide secure tication scheme to improve efficiency and resist DoS attacks.
mutual authentication. Besides, when the ephemeral secret Their scheme used RC5 encryption, partial recovery principle,
was inadvertently disclosed, Tsai et al.’s scheme could not and elliptic curve digital signature, which greatly increased
guar- antee the session key security and user certificate the complexity of attack. Additionally, TinySet is regularized
privacy. Consequently, Odelu et al. put forward an to simplify the administrator’s task to setup initialization
improvement and enhanced the security. However, both the param- eters. For the computing limitation of the smart
protocols designed by Tsai et al. and Odelu et al. need high measuring device, Abbasinezhad-Mood et al. [37]
computation and communication costs, which cannot meet the specifically designed a security protocol, which not only
resource con- straints of smart meters. In 2018, Mahmood et overcame the weakness of power service providers
al. [31] and Abbasinezhad-Mood and Nikooghadam [32] participating in the key protocol but also greatly reduced the
designed authen- tication protocols for smart grid based on communication cost. To over- come the weaknesses existing
bilinear pairing operation and elliptic curve cryptosystem, in the IEC 62351 standard, Moghadam et al. [38] used
respectively, meet- ing the anonymity of smart meters. private key and hash function and proposed a secure
However, compared with Abbasinezhad-Mood et al.’s protocol. By pointing out the failure of previous
scheme, Mahmood et al.’s scheme costs more calculation and anonymous authentication schemes in identify- ing
does not realize key escrow. Moreover, Chen et al. [33] malicious users, Kong et al. [39] designed a group blind
pointed out that Mahmood et al.’s scheme failed to provide signature scheme, realizing conditional anonymity.
perfect forward security, suffered from impersonation attack No matter what the application scenario, key agreement
and potentially vulnerable to ephemeral key compromise protocols to realize identity authentication usually use some
attack. common cryptography methods, such as elliptic curve, bilin-
For the complexity and time delay sensitivity of the smart ear pairing, public-key encryption and symmetric encryption,
grid, Mahmood et al. [34] proposed a lightweight authen- etc. Thus, here we only take smart grid as an example to
tication scheme using the elliptic curve. After the effective compare the involved protocols on the security and com-
session key is shared between the communication partic- putation cost to present the advantages and disadvantages
ipants, the identity authentication is completed. However, of these key agreement schemes. The compared literature
Abbasinezhad-Mood et al.’s protocol [35] observed that their involve [29]–[35], [37], [38], shown in Table IV. In the
scheme still exhibited some drawbacks, such as the inabil- table, S1–S7 means user anonymity, perfect forward security,
ity to provide forward security and resistance to ephemeral mutual authentication, anti-impersonation attack, anti-replay
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4070 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
TABLE IV
COMPARISON ON THE SECURITY AND COMPUTATION COST OF RELATED SCHEMES
attack, resistance to man-in-the-middle attack, and session key adopted to propose an authoritative proof consensus protocol,
security. Additionally, the symbols Tm, Tb, Te, Th, and Ts which aimed to get the credit score, so as to solve the existing
denote time for performing scalar multiplication, bilinear pair- computing problem of Ethereum blockchain.
ing, modular exponentiation, hash function, and symmetric Smart grid, the next power grid generation, can effectively
encryption in order. As the table shows, the key agreement monitor, control, and predict the production and consumption
schemes for the smart grid are improving. Besides, security of the energy, but the transmission of power data fails to keep
and performance are relative, that is, high security requires a confidential. Besides, the fine-grained measurement data may
certain performance as a cost. The issue on how to balance leak the privacy of users. Therefore, Li et al. [42] designed a
the security and performance is a challenge. power data transmission protection scheme based on quantum
cryptography combining with the one-time key mechanism.
Additionally, they used quantum to generate random numbers,
B. Data Security which fixed the weaknesses of the traditional generator, and
There are entities, such as substations, smart appliances, put forward a key distribution scheme. For another thing, the
and control centers in the smart grid. Smart meter is used research on secure data aggregation has been developing and
to help exchange information between the smart appliances improving [43]–[49], including various public-key-based data
and substations and transmit customer’s requirements to the aggregation protocols, but the public-key technology is not
substation. Then, the substation forwards these requests to the recommended in this scenario due to the high costs of main-
corresponding control center, which further responds to taining public-key infrastructure (PKI). Thus, by adopting the
incom- ing requests. Thus, there must exist data interaction identity-based encryption and signature, Wang [43] proposed
among the above-mentioned entities. They are confidential a protocol of data aggregation, which was suitable for the
information and need security protecting. According to the appli- cation in the smart grid. It can avoid fine-grained
summarized security requirements, from the perspective of analysis as well as unauthorized reading, and resist
secure shar- ing, transmission, and aggregation of the power unexpected faults and malicious tampering of message.
data, this subsection reviews some works and analyzes them. In 2018, Gope and Sikdar [44] put forward an effective
Under the era of the IoT, smart meters in the smart grid will data aggregation scheme, which avoided high computation
generate massive data. Users, however, are generally cost and overcame the weakness of fixed price for the whole
unwilling to share the data that they own because the privacy day (or even the whole month). Their scheme used symmet-
of their data cannot be guaranteed to be not leaked. To balance ric key encryption primitives for privacy-aware and secure
the personal privacy and the beneficial use of data in the smart billing system, and promoted the generation of power and
grid, Yassine et al. [40] proposed a mechanism that could the requirement balance in the smart grid, relatively decreas-
determine the value of privacy risk. Once a user decided to ing the computation cost and the time for data aggregation.
share data with a third-party service provider, this mechanism Thus, it was suitable for smart grid devices with constrained
will function to determine the benefits of users. Moreover, resource. Liu et al. [45] proposed a practical scheme with pri-
Yassine et al.’s scheme used a negotiation mechanism based vacy preserving used for data aggregation. In the scheme, a
on game theory to study the fairness among entities involv- virtual aggregation region consisting of users with a certain
ing a third party, consumers, and data aggregators, where degree of trust is constructed to hide single user’s data, where
the entities in the game aimed to maximize their own util- the aggregation results have little impact on the data practica-
ity. Concretely, the consumers wanted to get the maximum bility of large-scale applications. Liu et al. [45] depended little
return for allowance to access their data, the data aggregators on the third party, promoted the performance, and improved
wished to get more money from the third party by providing the practicability. In 2020, Gope and Sikdar [47] proposed
the consumers with less rewards, and the third party wanted a privacy-friendly scheme of data aggregation to prevent fine-
to spend less money for the data. For the sake of encourag- grained data from being collected by smart meters and
ing users to share data, based on blockchain and differential massive measurement results from being used to reconstruct
privacy technology, Samuel et al. [41] proposed a mechanism the behav- ior of consumers. Aiming at the data integrity
of access control to fairly compensate users’ contribution in attacks for smart grid, Mohammadpourfard et al. [49]
sharing data. Meanwhile, in [41], PageRank mechanism was recommended to find the critical line outage contingencies.
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4071
TABLE V
KEY WORDS, ANALYSIS, AND THE APPLYING OF EDGE COMPUTING IN THE SMART GRID
C. Applicability in Edge Computing Environment researches should not only learn from the existing
For the sake of clearly presenting the consideration of technologies, such
edge computing in the smart grid, we summarize some lit-
erature mentioned above in Table V. Obviously, the table
shows that a few schemes take edge computing into account
when discussing the security in the smart grid. Among them,
only [31] applies edge computing. However, [31] only intro-
duces edge computing as a background, but it does not reflect
in the authentication scheme. Edge nodes exhibits the char-
acteristics of distributed deployment. Such deployment brings
more threats to the secure communication of the smart grid,
such as the DDoS attack, so the requirement of resistance to
such attack should be taken into consideration when design-
ing authentication protocols. Moreover, in the edge computing
environment, massive smart devices are connected; thus, the
efficiency of authentication is another challenge that can-
not be ignored. These authentication protocols should realize
lightweight and improve the performance. In addition, if the
edge node is malicious or forcibly manipulated by the
attacker, the data information it stores will also be disclosed.
As far as the data sharing and aggregation are concerned, to
ensure the data security or even the data privacy, the future
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4071
TABLE V
as attribute encryption and homomorphic encryption but
also shorten the time delay, being able to correctly and
timely han- dle the data transmission among the smart grid
devices, edge computing nodes, and the cloud centers.
V. SMART H OME
In the smart home system, the data collected by the
sensor is transmitted to the decision-making unit, which
calculates the appropriate control signals to achieve the
predetermined goal [50]. The research works of
deploying cloud comput- ing, fog computing, and edge
computing to the smart home have been put forward
successively [51]–[54]. The scenario of the smart home in
the edge computing environment is presented in Fig. 4 [55],
[56]. Users can locally control kinds of smart home
devices through Bluetooth, Wi-Fi, home LAN, etc.
Additionally, users can also remotely operate home devices
through Internet services provided by the edge com- puting
layer. Therefore, the smart home system is also the
intrusion target of hackers and other attackers. For
instance, an attacker can launch a botnet attack [57] to
control vari- ous smart home device, so as to achieve a
large-scale DDoS attack.
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4072 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
A. Identity Authentication layer to establish encryption key for smart home devices.
As the summarized security requirements of the smart home However, the rate of key generation in most advanced
describe, it is necessary to realize the authentication of user schemes is low. To overcome this challenge and improve the
and smart home equipment. The entities in the smart home are key gen- eration rate, by using the received signal strength
able to use Bluetooth and other channels for communication, (RSS), Zhao et al. [60] presented an adaptive key
and these channels have their own unique parameters and fea- establishment scheme, where the two devices in the smart
tures. The designed schemes will prefer to use physical-layer home were able to quantify the RSS measurements adaptively
information for authentication. Such reviewing are illustrated and got the key. Furthermore, to demonstrate the
as follows. practicability, they car- ried out experimental implementation
From the perspective of identity authentication in the smart based on the Ralink Wi-Fi card of RT2870 chipset and
home, there have been many related works available for evaluated the random- ness of the key generation through the
reference [58]–[65]. The smart home enables individuals to test experiment of NIST randomness. In some cases, devices
control smart devices in their homes through the Internet. used in the smart home are made by various factories, so it
Internet services like IFTTT integrate different kinds of smart is a big challenge to use the secret loaded in advance by
home devices, which allow users to customize smart home different factories to securely establish the communication
configuration through IFTTT. In view of the challenge that key. In this case, Zhang et al. [61] presented a key
distributed malware based on features can harm users’ IFTTT agreement protocol suit- able for the smart home. Their
accounts, Baruah and Dhal [58] put forward a secure IFTTT- scheme adopted the problem of secret mismatch existing in
based framework for the smart home. It combined a one- the schemes of secret extraction on the physical layer. That is,
time password authentication scheme using verification code. two smart home devices used mismatched bitstreams to
Adopting one-time password makes it resist to replay attack. generate highly correlated blocks and then used these blocks
Chifor et al. [59] presented an authorization stack that was to mask the transmitted message between the devices in the
lightweight in the cloud environment to provide digital smart home, so as to guarantee the secure establishment of
identity for users and smart devices, where the cloud joint the communication key between them. Although this key
authentica- tion for the smart home through the fast identity protocol can address some issues existing in some related
online (FIDO) authentication message was realized. In works, it also increases some extra communication cost.
addition, they used a keep-alive online protocol for security, Considering the group communication, Mughal et al. [63]
which was executed every time when a user requested for the presented a mobile management scheme using logical tree,
authentication of FIDO. Additionally, to ensure the near real- which could effectively solve the problem of frequent key
time constraints, Chifor et al. implemented experiments based updates. Based on transaction history and physi- cal context
on the Kaa IoT cloud and further measured the delay time. awareness, Fakroon et al. [65] proposed a scheme for
To ensure the security of home LAN, it is necessary to authenticating the user remotely, which avoided the prob-
implement a lightweight key extraction scheme on the lems of clock synchronization and maintaining a verification
physical table.
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4073
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4074 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
TABLE VI
KEY WORDS, ANALYSIS, AND THE APPLYING OF EDGE COMPUTING IN THE SMART HOME
is not very high. Meanwhile, it is necessary to ensure the authentication scheme using blockchain. Their scheme
anonymity of the vehicle, so as to prevent the vehicle from authen- ticated servers and users anonymously, solving a
being tracked by the attacker and preserve the privacy of the single point of failure problems and realizing privacy
owner. In 2018, for some problems existing in the related preserving. Through the mutual authentication and distributed
works, such as the high cost of initial authentication may lead agreement mech- anism, Li et al.’s scheme exhibits high
to serious DoS attacks, Liu et al. [80] put forward a cooper- fault tolerance and can well handle the attacked servers. To
ative authentication scheme applied in VANET. Their scheme overcome the weak- nesses of the low performance and the
designs a computing problem using the real-time information strong hypothesis of ideal TPD, Zhong et al. [83] proposed a
like the expected receiver and location, so as to reduce DoS completely con- verged privacy-preserving authentication
attacks against anonymous authentication. Additionally, the scheme in vehicle ad hoc network. They used the
trust cluster was constructed by adopting the trust relation- aggregation signature with- out certificate, realizing the
ships among vehicles and the connected component theory secure communication of vehicle to infrastructure and greatly
that effectively helped construct the trust cluster. After estab- saving the resources of comput- ing and bandwidth.
lishing the trust clusters among the legal vehicles, they can Furthermore, they adopted pseudonyms, conditionally
conduct authentications through the trust cluster to improve achieving privacy protection, and when neces- sary, the
the efficiency. tracking agencies were able to identify the vehicle’s real
Furthermore, vehicles in the IoV come from different identity. Since the length is constant in the aggrega- tion
domains and the mobility of vehicles is high. Therefore, in signature, the overhead of storage and communication are
addition to the authentication of vehicles in the single domain, reduced. Based on bilinear pairing and one-way hash
cross-domain authentication of vehicles is also needed con- operation, Ali and Li [84] presented an efficient signature
sideration. In 2019, Li et al. [81] presented a cross-domain scheme called ID-CPPA, which was used for the communi-
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4074 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
cation between vehicles and infrastructure and was allowed
to
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4075
authenticate massive traffic-related messages. Facing the when they transmit and store data, and allocate rewards to the
appli- cation of cloud-assisted autonomous vehicles, Jiang et vehicles participating in data sharing. Based on blockchain,
al. [86] presented a three-factor authentication scheme, Fan et al. [90] presented a scheme of data sharing that realized
involving smart card, biometrics and password. Their one to many, where the blockchain was responsible for
scheme pro- vides privacy preserving, especially user’s record- ing the access policy to achieve the cloud
biometric privacy preserving. nonrepudiation and user self-certification.
The rapid advancement in the IoT technology contributes to
massive smart devices with specific perception ability access-
B. Data Security
ing to the network and getting data. To guarantee the security
Various privacy data will be generated in the smart trans- and privacy of data aggregation, Li et al. [91] put forward
portation system, such as the location data produced by a scheme of data aggregation for IoT applications assisted
vehicle users, road information data collected by surveillance by mobile-edge computing in 2018. In their scheme, Boneh–
cameras, etc. To enjoy better service, some personal data is Goh–Nissim cryptosystem is adopted to ensure user privacy.
encouraged to share in the system. For better deciding on the Through edge computing, the public cloud center can use
data, some- times they need aggregating. All these data the sensing function of the IoT terminal equipment (TE) to
operation should be secure and even privacy preserving. To obtain specific parameters and the data collected by TE is
realize the above mentioned, researchers have presented summarized by the edge server. In 2019, based on fog
plenty of schemes and some of them [87]–[93] are illustrated comput- ing, Guan et al. [92] designed a device-oriented
as follows. scheme with privacy protection, which provided security for
Zhang and Chen [87] proposed a new scheme to ensure the the data aggre- gation application. It supported multiauthority
privacy protection of real-time location data. In this scheme, management of local smart devices and fog nodes. Moreover,
a vehicle can dynamically generate virtual location accord- Guan et al. used pseudonym and the corresponding
ing to the surroundings and provide misleading information pseudonym certificate to ensure the validity and anonymity
of driving route, so as to achieve the privacy preserving. Also, for the devices and deployed the local certification authority
based on the alliance chain, Zhang et al. [88] put forward a to transfer the management of pseudonyms to the professional
secure system of data storage and data sharing. The technol- edge fog network, so as to offer real-time services for the
ogy of digital signature adopted in [88] follows the elliptic registration and correspond- ing update of devices. Besides,
curve’s feature of bilinear pairing, which guarantees the relia- they used Paillier algorithm to ensure the data confidentiality
bility and integrity of data transmission. Besides, the adopted in the process of data aggre- gation. Based on the feature of
blockchain provides a decentralized database that is reliable message recovery signature (MRS), Shen et al. [93] proposed
and secure. In addition, the smart contracts are utilized to be a secure scheme of traffic data aggregation with real-time
the constraint triggering conditions of the preselected nodes service for vehicle cloud in
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4076 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
TABLE VII
KEY WORDS, ANALYSIS, AND THE APPLYING OF EDGE COMPUTING IN THE SMART TRANSPORTATION
VII. E XTENSION
Most of the aforementioned authentication schemes are
high-layer protocols based on cryptography without using
the inherent properties of the wireless channel. They may
resist various attacks, but they commonly cost high com-
putation or communication overhead. In recent years, PHY-
layer authentication based on physical-layer channel
features
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4077
is a hot authentication technology. It enhances the secu- research direction for the security in the edge computing
rity of high-layer with the help of transmission features of environment.
the channel, such as spatiotemporal uniqueness. Due to its
advantages of low computation and communication cost, low
delay and power consumption, and unnecessary distribution FUTURE WORK
of secret keys, PHY-layer authentication is promising to serve Based on the aforementioned summaries and discussions,
as a complementary solution for the conventional high-layer we look forward to future researches in this field as follows.
authentication. 1) When designing the protocol for realizing the identity
There is no doubt that PHY-layer authentication can be authentication in the edge computing-based smart grid
applied in these smart applications, as described in the smart system, we should not only consider the anonymity of
home scenario, such as [60] and [61]. Moreover, in the smart devices but also consider the ability to resist
smart city scenario, by using tag embedding and verification, DDoS attacks under edge computing. When designing
Zhang et al. [95] presented a PHY-layer authentication frame- the data security protection scheme, we should not only
work that was lightweight. PHY-layer authentication is also a learn from the existing data security technology of the
useful aid in edge computing. For instance, Liao et al. [96] smart grid but also reduce the time delay and ensure the
used PHY-layer authentication to enhance the security of data availability.
mobile-edge computing. In their designed method, multiple 2) After edge computing is deployed in the smart home,
legal edge nodes can be distinguished from attackers and based on the existing authentication technology, we
mali- cious nodes. Recently, Liao et al. [97], Zhang et al. [98], need to combine with the network environment of the
and Zhang et al. [99] have also investigated on PHY-layer home equipments and the application characteristics of
authenti- cation. For edge computing-based smart application edge computing and design the lightweight
scenarios, PHY-layer authentication may also be a good boost authentication protocols with high security. For the data
in identity authentication and there has presented such work. security and privacy preserving, the existing task
For instance, to overcome rogue edge attacks in mobile-edge offloading technolo- gies need to be improved, enabling
computing- based VANETs, an important part of smart them to offload part or all of the sensitive data in the
transportation scenario, Lu et al. [100] proposed a PHY smart home to the edge for execution.
authentication scheme by exploiting mobile device’s serving 3) After the combination of smart transportation and edge
edge and the related channel information. Unfortunately, computing, it is necessary to design the correspond-
PHY-layer authen- tication may be not suitable for the mobile ing security protocols with low cost and high efficiency
communication system with fast mobility, and to achieve under the condition of knowing the characteristics of
higher efficiency, it needs to be combined with mutual authentication entities, as well as considering the
cryptography. In a word, apply- ing PHY-layer dynamic and mobility. Moreover, in the environment of
authentication in edge computing-based smart application edge computing, according to the multisource hetero-
scenarios will be an interesting research direction in the geneity of the data generated by the smart transportation
future. system, it is necessary to design secure aggregation and
sharing schemes with privacy preserving.
4) The smart grid and the smart home, the smart grid
VIII. C ONCLUSION
and the smart transportation are also closely related.
The trend of the large-scale deployment of edge comput- For example, the smart grid can provide power for the
ing is inevitable, especially in IoT-based smart applications. smart home, and electric vehicles in the smart
From the viewpoint of cybersecurity, this article especially transporta- tion can help the smart grid in case of power
investigates on the issues of authentication and data secu- shortage when they are idle. Therefore, how to design
rity existing in edge computing-based smart applications. To appro- priate security protection technologies while
provide a comprehensive understanding, we briefly describe ensuring mutual promotion among them is another
some definitions of edge computing in current works and possible future research direction.
compare it with cloud computing. From the comparison,
it can be seen that edge computing does have its obvious
advantages, such as fast response. Moreover, we introduce R EFERENCES
three typical applications that apply edge computing and [1] “The 44th China statistical report on Internet development,” in Office
analyze some security weaknesses existing in these smart of the Central Leading Group for Cyberspace Affairs, China Internet
applications as well as edge computing. We observe that Netw. Inf. Center, Beijing, China, 2019.
[2] W. Shi and S. Dustdar, “The promise of edge computing,” Computer,
their common challenge is to ensure the identity legality of vol. 49, no. 5, pp. 78–81, May 2016.
system entity, which is also the most basic problem to be [3] M. Satyanarayanan, “The emergence of edge computing,” Computer,
solved in ensuring system security. Besides, data protection is vol. 50, no. 1, pp. 30–39, Jan. 2017.
[4] (2018). Gartner Inc. [Online]. Available: https://www.gartner.com/
indispensable because it is an important component of these technology/home.jsp
smart applications. Thus, based on authentication and data [5] K. Gai, Y. Wu, L. Zhu, L. Xu, and Y. Zhang, “Permissioned
security, we summarize some related works of these smart blockchain and edge computing empowered privacy-preserving smart
grid networks,” IEEE Internet Things J., vol. 6, no. 5, pp. 7992–8004,
applications and briefly illustrate the adaptability after edge Oct. 2019.
computing is introduced to them. Moreover, we give the
future
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4078 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
LI et al.: SMART APPLICATIONS IN EDGE COMPUTING: OVERVIEW ON AUTHENTICATION AND DATA SECURITY 4079
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.
4080 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 6, MARCH 15, 2021
Authorized licensed use limited to: University of Queensland. Downloaded on March 07,2022 at 00:44:16 UTC from IEEE Xplore. Restrictions apply.