A trust management delegation protocol for fog computing applications

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

4 Downloads (Pure)

Abstract

Fog computing applications involve collaboration among several devices, end and fog nodes. Trust management can enhance the security and reliability of fog applications by supporting the selection of trusted nodes to collaborate. Although several mechanisms for managing trust in fog computing have been proposed, they have not considered the difference in the ability of devices to perform trust management. Devices with limited resources are unable to manage trust on their own without support from resource-rich devices. We propose a trust management delegation protocol based on the Constrained Application Protocol (CoAP) to address this. Our protocol allows resource-constrained devices to delegate trust management to resource-rich devices that can manage trust on their behalf. Experimental evaluation results show that using our protocol for trust management delegation consumes less resources compared to managing trust locally. Our protocol enables resourceconstrained devices to exploit the resources available in fog computing environments to manage their trust.
Original languageEnglish
Title of host publication2024 IEEE International Conference on Cyber Security and Resilience (CSR)
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages62-67
Number of pages6
ISBN (Electronic)9798350375367
DOIs
Publication statusPublished - 24 Sept 2024
Event2024 IEEE International Conference on Cyber Security and Resilience - London, United Kingdom
Duration: 2 Sept 20244 Sept 2024
https://www.ieee-csr.org/

Conference

Conference2024 IEEE International Conference on Cyber Security and Resilience
Abbreviated titleIEEE CSR 2024
Country/TerritoryUnited Kingdom
CityLondon
Period2/09/244/09/24
Internet address

Keywords

  • fog computing
  • trust management
  • internet of things
  • delegation protocol

Fingerprint

Dive into the research topics of 'A trust management delegation protocol for fog computing applications'. Together they form a unique fingerprint.

Cite this