Fog Computing with IoT Device’s Data Security Management Using Density Control Weighted Election and Extensible Authentication Protocol

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Nowadays, most people utilize the Internet of Things (IoT) to gather private information and the gathereddetails are saved in a third-parties database. During this process, fog computing is worked with IoT devices because it collects a large volume of data and is computationally intensive. Although these techniques provide valuableservices, data security, privacy, edge node latency, and energy consumption are still significant problems. Thereforein this paper, the Data Security Management model (DSMM) has been proposed to overcome all the security andprivacy issues during the data transmission among IoT devices. DSMM involves the density control weightedelection that uses the effective clustering method to group the data into clusters to overcome these security issues.Authentication protocol technique is applied to manage the data security, privacy and eliminate intermediate attacks.The Density Control Weighted (DCW) election protocol is applied to select the cluster head and respective membersfor the clustering process. From the chosen routing process, the data has been transmitted by applying the extensibleauthentication protocol. DSMM ensures data security and reduces intermediate attacks successfully. Then theefficiency of the system is evaluated using the experimental results and compared with existing protocols. Theexperimental results of DSMM achieve data processing time ratio of 86.3%, data security 98.09%, precision 97.23%,performance 92.21%, effective data authentication ratio 94.91%, recall 97.25%, response time 96.18%, whencompared to other methods

Cite

CITATION STYLE

APA

Mahendran, J., & Lakshmanan, L. (2022). Fog Computing with IoT Device’s Data Security Management Using Density Control Weighted Election and Extensible Authentication Protocol. International Journal of Intelligent Engineering and Systems, 15(1), 21–32. https://doi.org/10.22266/IJIES2022.0228.03

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free