Cluster-Based Authentication Process in a Smart City
The widespread deployment of the Internet of Things in any smart city provides a regular flow of huge amount of data in server(s) that poses challenges for effective and efficient management to improve the quality of citizens’ life. To maintain the privacy and security of these data, a proper and se...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2022-06, Vol.2022, p.1-14 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 14 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2022 |
creator | Islam, Md. Rafiqul Adnan, Md. Nasim Islam, Md. Ezazul Ali, A B M Shawkat |
description | The widespread deployment of the Internet of Things in any smart city provides a regular flow of huge amount of data in server(s) that poses challenges for effective and efficient management to improve the quality of citizens’ life. To maintain the privacy and security of these data, a proper and secured identification and authentication process is very essential. In this paper, we propose a cluster-based identification and authentication process for the users, edge servers, and service servers, which are engaged in storing, processing, and accessing data. The proposed identification and authentication process is secured due to some codes (values), which are not possible to compute except by the concerned entities. For the proposed trust evaluation method (which actually strengthens the proposed authentication process), we consider major components and their integration in the model very carefully so that the simulation results become credible. Hence, we hope that the simulation results will be useful for the readership. As a whole, the proposed approach has potentials of being implemented in real-time applications. |
doi_str_mv | 10.1155/2022/5186376 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2680911976</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2680911976</sourcerecordid><originalsourceid>FETCH-LOGICAL-c224t-4edbc60e7796ec37ac487afe06e4a779572128fa542184e456c268b2eaca88113</originalsourceid><addsrcrecordid>eNp90N9LwzAQB_AgCs7pm39AwUety6Vpkj7OMn_AQEF9Dll6ZRmznUmK7L83o8NHn-44PtwdX0Kugd4DlOWMUcZmJShRSHFCJlAVVU6BsdO_Hvg5uQhhQ6kALvmE8Ho7hIg-fzABm2w-xDV20VkTXd9lb763GELmusxk71_Gx6x2cX9JzlqzDXh1rFPy-bj4qJ_z5evTSz1f5pYxHnOOzcoKilJWAm0hjeVKmhapQG7SsJQMmGpNyRkojrwUlgm1YmisUQqgmJKbce_O998Dhqg3_eC7dFInSCuASoqk7kZlfR-Cx1bvvEu_7jVQfchFH3LRx1wSvx352nWN-XH_61_SQ1_3</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2680911976</pqid></control><display><type>article</type><title>Cluster-Based Authentication Process in a Smart City</title><source>Wiley Online Library Open Access</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Islam, Md. Rafiqul ; Adnan, Md. Nasim ; Islam, Md. Ezazul ; Ali, A B M Shawkat</creator><contributor>Khan, Habib Ullah</contributor><creatorcontrib>Islam, Md. Rafiqul ; Adnan, Md. Nasim ; Islam, Md. Ezazul ; Ali, A B M Shawkat ; Khan, Habib Ullah</creatorcontrib><description>The widespread deployment of the Internet of Things in any smart city provides a regular flow of huge amount of data in server(s) that poses challenges for effective and efficient management to improve the quality of citizens’ life. To maintain the privacy and security of these data, a proper and secured identification and authentication process is very essential. In this paper, we propose a cluster-based identification and authentication process for the users, edge servers, and service servers, which are engaged in storing, processing, and accessing data. The proposed identification and authentication process is secured due to some codes (values), which are not possible to compute except by the concerned entities. For the proposed trust evaluation method (which actually strengthens the proposed authentication process), we consider major components and their integration in the model very carefully so that the simulation results become credible. Hence, we hope that the simulation results will be useful for the readership. As a whole, the proposed approach has potentials of being implemented in real-time applications.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2022/5186376</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Authentication ; Citizens ; Cloud computing ; Clusters ; Computer centers ; Data integrity ; Information systems ; Internet of Things ; Privacy ; Registration ; Servers ; Smart cities ; Trust</subject><ispartof>Security and communication networks, 2022-06, Vol.2022, p.1-14</ispartof><rights>Copyright © 2022 Md. Rafiqul Islam et al.</rights><rights>Copyright © 2022 Md. Rafiqul Islam et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c224t-4edbc60e7796ec37ac487afe06e4a779572128fa542184e456c268b2eaca88113</cites><orcidid>0000-0001-9210-2896 ; 0000-0002-0777-6747 ; 0000-0003-0390-1990 ; 0000-0001-9673-0080</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Khan, Habib Ullah</contributor><creatorcontrib>Islam, Md. Rafiqul</creatorcontrib><creatorcontrib>Adnan, Md. Nasim</creatorcontrib><creatorcontrib>Islam, Md. Ezazul</creatorcontrib><creatorcontrib>Ali, A B M Shawkat</creatorcontrib><title>Cluster-Based Authentication Process in a Smart City</title><title>Security and communication networks</title><description>The widespread deployment of the Internet of Things in any smart city provides a regular flow of huge amount of data in server(s) that poses challenges for effective and efficient management to improve the quality of citizens’ life. To maintain the privacy and security of these data, a proper and secured identification and authentication process is very essential. In this paper, we propose a cluster-based identification and authentication process for the users, edge servers, and service servers, which are engaged in storing, processing, and accessing data. The proposed identification and authentication process is secured due to some codes (values), which are not possible to compute except by the concerned entities. For the proposed trust evaluation method (which actually strengthens the proposed authentication process), we consider major components and their integration in the model very carefully so that the simulation results become credible. Hence, we hope that the simulation results will be useful for the readership. As a whole, the proposed approach has potentials of being implemented in real-time applications.</description><subject>Authentication</subject><subject>Citizens</subject><subject>Cloud computing</subject><subject>Clusters</subject><subject>Computer centers</subject><subject>Data integrity</subject><subject>Information systems</subject><subject>Internet of Things</subject><subject>Privacy</subject><subject>Registration</subject><subject>Servers</subject><subject>Smart cities</subject><subject>Trust</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp90N9LwzAQB_AgCs7pm39AwUety6Vpkj7OMn_AQEF9Dll6ZRmznUmK7L83o8NHn-44PtwdX0Kugd4DlOWMUcZmJShRSHFCJlAVVU6BsdO_Hvg5uQhhQ6kALvmE8Ho7hIg-fzABm2w-xDV20VkTXd9lb763GELmusxk71_Gx6x2cX9JzlqzDXh1rFPy-bj4qJ_z5evTSz1f5pYxHnOOzcoKilJWAm0hjeVKmhapQG7SsJQMmGpNyRkojrwUlgm1YmisUQqgmJKbce_O998Dhqg3_eC7dFInSCuASoqk7kZlfR-Cx1bvvEu_7jVQfchFH3LRx1wSvx352nWN-XH_61_SQ1_3</recordid><startdate>20220614</startdate><enddate>20220614</enddate><creator>Islam, Md. Rafiqul</creator><creator>Adnan, Md. Nasim</creator><creator>Islam, Md. Ezazul</creator><creator>Ali, A B M Shawkat</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-9210-2896</orcidid><orcidid>https://orcid.org/0000-0002-0777-6747</orcidid><orcidid>https://orcid.org/0000-0003-0390-1990</orcidid><orcidid>https://orcid.org/0000-0001-9673-0080</orcidid></search><sort><creationdate>20220614</creationdate><title>Cluster-Based Authentication Process in a Smart City</title><author>Islam, Md. Rafiqul ; Adnan, Md. Nasim ; Islam, Md. Ezazul ; Ali, A B M Shawkat</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c224t-4edbc60e7796ec37ac487afe06e4a779572128fa542184e456c268b2eaca88113</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Authentication</topic><topic>Citizens</topic><topic>Cloud computing</topic><topic>Clusters</topic><topic>Computer centers</topic><topic>Data integrity</topic><topic>Information systems</topic><topic>Internet of Things</topic><topic>Privacy</topic><topic>Registration</topic><topic>Servers</topic><topic>Smart cities</topic><topic>Trust</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Islam, Md. Rafiqul</creatorcontrib><creatorcontrib>Adnan, Md. Nasim</creatorcontrib><creatorcontrib>Islam, Md. Ezazul</creatorcontrib><creatorcontrib>Ali, A B M Shawkat</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Islam, Md. Rafiqul</au><au>Adnan, Md. Nasim</au><au>Islam, Md. Ezazul</au><au>Ali, A B M Shawkat</au><au>Khan, Habib Ullah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cluster-Based Authentication Process in a Smart City</atitle><jtitle>Security and communication networks</jtitle><date>2022-06-14</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>14</epage><pages>1-14</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>The widespread deployment of the Internet of Things in any smart city provides a regular flow of huge amount of data in server(s) that poses challenges for effective and efficient management to improve the quality of citizens’ life. To maintain the privacy and security of these data, a proper and secured identification and authentication process is very essential. In this paper, we propose a cluster-based identification and authentication process for the users, edge servers, and service servers, which are engaged in storing, processing, and accessing data. The proposed identification and authentication process is secured due to some codes (values), which are not possible to compute except by the concerned entities. For the proposed trust evaluation method (which actually strengthens the proposed authentication process), we consider major components and their integration in the model very carefully so that the simulation results become credible. Hence, we hope that the simulation results will be useful for the readership. As a whole, the proposed approach has potentials of being implemented in real-time applications.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2022/5186376</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0001-9210-2896</orcidid><orcidid>https://orcid.org/0000-0002-0777-6747</orcidid><orcidid>https://orcid.org/0000-0003-0390-1990</orcidid><orcidid>https://orcid.org/0000-0001-9673-0080</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2022-06, Vol.2022, p.1-14 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2680911976 |
source | Wiley Online Library Open Access; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection |
subjects | Authentication Citizens Cloud computing Clusters Computer centers Data integrity Information systems Internet of Things Privacy Registration Servers Smart cities Trust |
title | Cluster-Based Authentication Process in a Smart City |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T06%3A41%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cluster-Based%20Authentication%20Process%20in%20a%20Smart%20City&rft.jtitle=Security%20and%20communication%20networks&rft.au=Islam,%20Md.%20Rafiqul&rft.date=2022-06-14&rft.volume=2022&rft.spage=1&rft.epage=14&rft.pages=1-14&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2022/5186376&rft_dat=%3Cproquest_cross%3E2680911976%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2680911976&rft_id=info:pmid/&rfr_iscdi=true |