4.7 Article

The Universal Fog Proxy: A Third-party Authentication Solution for Federated Fog Systems with Multiple Protocols

Journal

IEEE NETWORK
Volume 35, Issue 6, Pages 285-291

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MNET.111.2100168

Keywords

Protocols; Smart cities; Authentication; Switches; Production facilities; Relays; Edge computing

Ask authors/readers for more resources

This article proposes a universal fog proxy to enable third-party authentication among different protocols, facilitating federation among fogs to enhance service capability. The proxy provides transparency through virtual entities, supporting authentication between fogs using different protocols.
Fog computing is suitable for latency constrained applications useful to end users and IoT devices in smart cities, factories, and homes. A federation among fogs is beneficial for subscribers and providers in terms of enhanced capability, capacity, coverage, and services. To realize such a federation, a third-party authentication mechanism among fog providers is required, so that a subscriber of a fog can access the services provided by the other fogs without having to create new accounts. In this article, we propose a transparent and standard-compliant universal fog proxy that provides third-party authentication among OpenID Connect (OIDC), 802.1x, and Protocol for Carrying Authentication for Network Access (PANA) without requiring a new protocol. The proxy consists of virtual counterparts of the entities involved in these protocols so that it provides transparency. For example, when a fog using OIDC receives an authentication request, the proxy relays and behaves as a virtual Identity Provider (vIdP) for the fog using OIDC and a virtual supplicant for the fog using 802.1x. We applied our solution to nine scenarios across OIDC, 802.1x, and PANA. Experimental results show that the proxy takes 4-52 percent of the total authentication time of 0.128-3.504s for nine scenarios, with a larger percentage in scenarios involving OIDC due to multiple re-directions among virtual components. The scenarios involving 802.1x take a considerably lon-ger time, though a low percentage (4-12 percent) by the proxy, as the spanning tree protocol in an 802.1x switch takes about one second to converge when adding a new device to the network.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available