[Online]A Proposal mechanism of mutual authentication to optimise Internet of Things resources in the context of Fog Computing

A Proposal mechanism of mutual authentication to optimise Internet of Things resources in the context of Fog Computing
ID:48 Submission ID:30 View Protection:ATTENDEE Updated Time:2025-11-19 09:22:58 Hits:417 Online

Start Time:2025-12-29 15:30 (Asia/Amman)

Duration:15min

Session:[S2] Track 2: IoT and applications » [S2-1] Track 2: IoT and applications

No files

Abstract
The Internet of Things (IoT) technology is the extension of the Internet network to things/objects and places in the physical world. Objects become connected and networked, such as smart watches, smart bracelets, and even smart shoes. The data generated by these entities (objects) is exchanged via the Internet for use in various fields.  Today, the overcrowding of prisons in Senegal shows that it is urgent to find solutions to relieve the pressure on our prisons. That is why we have proposed to study a mutual authentication model based on the Internet of Things in the context of Fog Computing, while managing the mobility of objects. The study focuses on electronic bracelets. To carry out this work, we described the network model of our architecture, then analyzed the security solutions to be implemented, and finally evaluated performance in terms of computing and storage resource consumption.
 
Keywords
security,mutual authentication,optimisation resources,mobility,Internet of Things,Fog Computing
Speaker
GAYE Dr Abdourahime
Teacher-Cherchor University Alioune DIOP Bambey

Submission Author
GAYE Dr Abdourahime University Alioune DIOP Bambey
Mr. Ousmane NDIAYE university Alioune DIOP of Bambey
Comment submit
Verification code Change another
All comments

CONTACT US

Email: asiancomnet@usssociety.org

Website & IT Support: hi@aconf.org 

Registration Submit Paper