Cluster-Based Authentication Process in a Smart City

The widespread deployment of the Internet of Things in any smart city provides a regular flow of huge amount of data in server(s) that poses challenges for effective and efficient management to improve the quality of citizens’ life. To maintain the privacy and security of these data, a proper and se...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2022-06, Vol.2022, p.1-14
Hauptverfasser: Islam, Md. Rafiqul, Adnan, Md. Nasim, Islam, Md. Ezazul, Ali, A B M Shawkat
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 14
container_issue
container_start_page 1
container_title Security and communication networks
container_volume 2022
creator Islam, Md. Rafiqul
Adnan, Md. Nasim
Islam, Md. Ezazul
Ali, A B M Shawkat
description The widespread deployment of the Internet of Things in any smart city provides a regular flow of huge amount of data in server(s) that poses challenges for effective and efficient management to improve the quality of citizens’ life. To maintain the privacy and security of these data, a proper and secured identification and authentication process is very essential. In this paper, we propose a cluster-based identification and authentication process for the users, edge servers, and service servers, which are engaged in storing, processing, and accessing data. The proposed identification and authentication process is secured due to some codes (values), which are not possible to compute except by the concerned entities. For the proposed trust evaluation method (which actually strengthens the proposed authentication process), we consider major components and their integration in the model very carefully so that the simulation results become credible. Hence, we hope that the simulation results will be useful for the readership. As a whole, the proposed approach has potentials of being implemented in real-time applications.
doi_str_mv 10.1155/2022/5186376
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2680911976</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2680911976</sourcerecordid><originalsourceid>FETCH-LOGICAL-c224t-4edbc60e7796ec37ac487afe06e4a779572128fa542184e456c268b2eaca88113</originalsourceid><addsrcrecordid>eNp90N9LwzAQB_AgCs7pm39AwUety6Vpkj7OMn_AQEF9Dll6ZRmznUmK7L83o8NHn-44PtwdX0Kugd4DlOWMUcZmJShRSHFCJlAVVU6BsdO_Hvg5uQhhQ6kALvmE8Ho7hIg-fzABm2w-xDV20VkTXd9lb763GELmusxk71_Gx6x2cX9JzlqzDXh1rFPy-bj4qJ_z5evTSz1f5pYxHnOOzcoKilJWAm0hjeVKmhapQG7SsJQMmGpNyRkojrwUlgm1YmisUQqgmJKbce_O998Dhqg3_eC7dFInSCuASoqk7kZlfR-Cx1bvvEu_7jVQfchFH3LRx1wSvx352nWN-XH_61_SQ1_3</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2680911976</pqid></control><display><type>article</type><title>Cluster-Based Authentication Process in a Smart City</title><source>Wiley Online Library Open Access</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Islam, Md. Rafiqul ; Adnan, Md. Nasim ; Islam, Md. Ezazul ; Ali, A B M Shawkat</creator><contributor>Khan, Habib Ullah</contributor><creatorcontrib>Islam, Md. Rafiqul ; Adnan, Md. Nasim ; Islam, Md. Ezazul ; Ali, A B M Shawkat ; Khan, Habib Ullah</creatorcontrib><description>The widespread deployment of the Internet of Things in any smart city provides a regular flow of huge amount of data in server(s) that poses challenges for effective and efficient management to improve the quality of citizens’ life. To maintain the privacy and security of these data, a proper and secured identification and authentication process is very essential. In this paper, we propose a cluster-based identification and authentication process for the users, edge servers, and service servers, which are engaged in storing, processing, and accessing data. The proposed identification and authentication process is secured due to some codes (values), which are not possible to compute except by the concerned entities. For the proposed trust evaluation method (which actually strengthens the proposed authentication process), we consider major components and their integration in the model very carefully so that the simulation results become credible. Hence, we hope that the simulation results will be useful for the readership. As a whole, the proposed approach has potentials of being implemented in real-time applications.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2022/5186376</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Authentication ; Citizens ; Cloud computing ; Clusters ; Computer centers ; Data integrity ; Information systems ; Internet of Things ; Privacy ; Registration ; Servers ; Smart cities ; Trust</subject><ispartof>Security and communication networks, 2022-06, Vol.2022, p.1-14</ispartof><rights>Copyright © 2022 Md. Rafiqul Islam et al.</rights><rights>Copyright © 2022 Md. Rafiqul Islam et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c224t-4edbc60e7796ec37ac487afe06e4a779572128fa542184e456c268b2eaca88113</cites><orcidid>0000-0001-9210-2896 ; 0000-0002-0777-6747 ; 0000-0003-0390-1990 ; 0000-0001-9673-0080</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Khan, Habib Ullah</contributor><creatorcontrib>Islam, Md. Rafiqul</creatorcontrib><creatorcontrib>Adnan, Md. Nasim</creatorcontrib><creatorcontrib>Islam, Md. Ezazul</creatorcontrib><creatorcontrib>Ali, A B M Shawkat</creatorcontrib><title>Cluster-Based Authentication Process in a Smart City</title><title>Security and communication networks</title><description>The widespread deployment of the Internet of Things in any smart city provides a regular flow of huge amount of data in server(s) that poses challenges for effective and efficient management to improve the quality of citizens’ life. To maintain the privacy and security of these data, a proper and secured identification and authentication process is very essential. In this paper, we propose a cluster-based identification and authentication process for the users, edge servers, and service servers, which are engaged in storing, processing, and accessing data. The proposed identification and authentication process is secured due to some codes (values), which are not possible to compute except by the concerned entities. For the proposed trust evaluation method (which actually strengthens the proposed authentication process), we consider major components and their integration in the model very carefully so that the simulation results become credible. Hence, we hope that the simulation results will be useful for the readership. As a whole, the proposed approach has potentials of being implemented in real-time applications.</description><subject>Authentication</subject><subject>Citizens</subject><subject>Cloud computing</subject><subject>Clusters</subject><subject>Computer centers</subject><subject>Data integrity</subject><subject>Information systems</subject><subject>Internet of Things</subject><subject>Privacy</subject><subject>Registration</subject><subject>Servers</subject><subject>Smart cities</subject><subject>Trust</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp90N9LwzAQB_AgCs7pm39AwUety6Vpkj7OMn_AQEF9Dll6ZRmznUmK7L83o8NHn-44PtwdX0Kugd4DlOWMUcZmJShRSHFCJlAVVU6BsdO_Hvg5uQhhQ6kALvmE8Ho7hIg-fzABm2w-xDV20VkTXd9lb763GELmusxk71_Gx6x2cX9JzlqzDXh1rFPy-bj4qJ_z5evTSz1f5pYxHnOOzcoKilJWAm0hjeVKmhapQG7SsJQMmGpNyRkojrwUlgm1YmisUQqgmJKbce_O998Dhqg3_eC7dFInSCuASoqk7kZlfR-Cx1bvvEu_7jVQfchFH3LRx1wSvx352nWN-XH_61_SQ1_3</recordid><startdate>20220614</startdate><enddate>20220614</enddate><creator>Islam, Md. Rafiqul</creator><creator>Adnan, Md. Nasim</creator><creator>Islam, Md. Ezazul</creator><creator>Ali, A B M Shawkat</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-9210-2896</orcidid><orcidid>https://orcid.org/0000-0002-0777-6747</orcidid><orcidid>https://orcid.org/0000-0003-0390-1990</orcidid><orcidid>https://orcid.org/0000-0001-9673-0080</orcidid></search><sort><creationdate>20220614</creationdate><title>Cluster-Based Authentication Process in a Smart City</title><author>Islam, Md. Rafiqul ; Adnan, Md. Nasim ; Islam, Md. Ezazul ; Ali, A B M Shawkat</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c224t-4edbc60e7796ec37ac487afe06e4a779572128fa542184e456c268b2eaca88113</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Authentication</topic><topic>Citizens</topic><topic>Cloud computing</topic><topic>Clusters</topic><topic>Computer centers</topic><topic>Data integrity</topic><topic>Information systems</topic><topic>Internet of Things</topic><topic>Privacy</topic><topic>Registration</topic><topic>Servers</topic><topic>Smart cities</topic><topic>Trust</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Islam, Md. Rafiqul</creatorcontrib><creatorcontrib>Adnan, Md. Nasim</creatorcontrib><creatorcontrib>Islam, Md. Ezazul</creatorcontrib><creatorcontrib>Ali, A B M Shawkat</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Islam, Md. Rafiqul</au><au>Adnan, Md. Nasim</au><au>Islam, Md. Ezazul</au><au>Ali, A B M Shawkat</au><au>Khan, Habib Ullah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cluster-Based Authentication Process in a Smart City</atitle><jtitle>Security and communication networks</jtitle><date>2022-06-14</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>14</epage><pages>1-14</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>The widespread deployment of the Internet of Things in any smart city provides a regular flow of huge amount of data in server(s) that poses challenges for effective and efficient management to improve the quality of citizens’ life. To maintain the privacy and security of these data, a proper and secured identification and authentication process is very essential. In this paper, we propose a cluster-based identification and authentication process for the users, edge servers, and service servers, which are engaged in storing, processing, and accessing data. The proposed identification and authentication process is secured due to some codes (values), which are not possible to compute except by the concerned entities. For the proposed trust evaluation method (which actually strengthens the proposed authentication process), we consider major components and their integration in the model very carefully so that the simulation results become credible. Hence, we hope that the simulation results will be useful for the readership. As a whole, the proposed approach has potentials of being implemented in real-time applications.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2022/5186376</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0001-9210-2896</orcidid><orcidid>https://orcid.org/0000-0002-0777-6747</orcidid><orcidid>https://orcid.org/0000-0003-0390-1990</orcidid><orcidid>https://orcid.org/0000-0001-9673-0080</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2022-06, Vol.2022, p.1-14
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2680911976
source Wiley Online Library Open Access; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection
subjects Authentication
Citizens
Cloud computing
Clusters
Computer centers
Data integrity
Information systems
Internet of Things
Privacy
Registration
Servers
Smart cities
Trust
title Cluster-Based Authentication Process in a Smart City
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T06%3A41%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cluster-Based%20Authentication%20Process%20in%20a%20Smart%20City&rft.jtitle=Security%20and%20communication%20networks&rft.au=Islam,%20Md.%20Rafiqul&rft.date=2022-06-14&rft.volume=2022&rft.spage=1&rft.epage=14&rft.pages=1-14&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2022/5186376&rft_dat=%3Cproquest_cross%3E2680911976%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2680911976&rft_id=info:pmid/&rfr_iscdi=true