Analysis of Mechanisms for Resource Management in IoT: Performance of Mutual Authentication in the Context of Fog and EDGE-Fog Computing

Gaye Abdourahime *

Department of Computer Engineering and Communication, University Alioune DIOP, Bambey, Senegal.

Ousmane Ndiaye

Department of Computer Engineering and Communication, University Alioune DIOP, Bambey, Senegal.

*Author to whom correspondence should be addressed.


The Internet is now experiencing an unprecedented expansion with the development of connected objects. At its inception the IoT, like any revolution, its objectives were quite limited. Its main objective was to reduce the effort of human data entry in order to allow the storage and automatic processing of the latter. Moreover, objects generate a lot of data that they cannot store or process by themselves, hence the need for external support. This is how Cloud Computing comes to answer this problem, making the success of IoT. This technology guarantees the storage, availability, processing, etc. of data, its integration into the latter is known as "Cloud of Things" CoT. The data generated should not only be stored, but rather processed in order to derive knowledge, decision making. The objective of our work is to analyze mutual authentication management models of IoT devices to optimize resources trying to provide solutions in the face of resource availability. To carry out this work, we analyzed the application areas and the challenges of IoT. Then, we studied IoT security threats. Our work ends with a study and an analysis mechanism of mutual authentication management models of IoT based on uncertificated Authentication mechanisms, Elliptic curve cryptography authentication, Mutual Authentication in the context of Fog Computing.

Keywords: Internet of Things, security, mutual authentication, elliptic curve cryptography, fog computing, uncertificated, resource management

How to Cite

Abdourahime, G., & Ndiaye, O. (2023). Analysis of Mechanisms for Resource Management in IoT: Performance of Mutual Authentication in the Context of Fog and EDGE-Fog Computing. Asian Journal of Mathematics and Computer Research, 30(1), 17–25.


Download data is not yet available.


Aurélien Francillon: Security in IoT. CS of INS2I; 2016.

Hidjeb Ali: Implementation of an authentication server election protocol in the Internet of Things. Abderrahmane Mira University of Bejaia; 2017.

Ismail Lotfi: Cryptography based on elliptic curves. Thesis; 2016.

UIT-T: Data Networking, Open Systems Communication and Security - Secure Applications and Services - Security of the Internet of Things (IoT). Suisse; 2019.

Hafizah Che Hasan, Fateen Nazwa Yusof and Maslina Daud: Comparison of Authentication Methods in Internet of Things Technology. Engineering and Technology International Journal of Computer and Systems Engineering, World Academy of Science; 2018.

Mohamed Tahar Hammi: Securing the Internet of Things. University of Paris-Saclay prepared at Télécom Paristech, Thesis; 2018.

Yacine Challal. Security of the Internet of Things; towards a cognitive and systemic approach. University of Technology of Compiegne; 2013.

Djamel Eddine Kouicem: Security of Internet of Things for systems of systems. University of Technology of Compiegne; 2018.

Santosh Kumar, Goudar RH. Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications: A Survey. International Journal of Future Computer and Communication; 2012.

Rahimi H, Zibaeenejad A, Safavi AA. A Novel IoT Architecture based on 5G-IoT and Next Generation Technologies. IEEE 9th Annu. Inf. Technol. Electron. Mob. Commun. Conf. 2018;81–88.

Fagen Li, Jiaojiao Hong, Anyembe Andrew Omala: Efficient certificateless access control for industrial Internet of Things. Future Generation Computer Systems. 2016;18(6):1089-1101.

LEFEVRE François: LoRaWAN network deployment and vulnerability analysis. University of Lille; 2018.

CORINNE Erhel and LAURE DE LA Raudière : Introduction in The Internet of Things: Digital in the Age of Prediction.

Hany F. Atlam, Robert J. Walters et Gary B. Wills: Fog Computing and the Internet of Things: A Review. Big Data and Cognitive Computing; 2018.

Insider: The internet of things. Here's what over 400 IoT decision-makers say about the future of enterprise connectivity and how IoT companies can use it to grow revenue; 2020.

Aly Benfattoum: From LORA technology to the LORAWAN network. In Frugal Technology; 2016.

Gianmarco Baldini and Trevor Peirce: Internet of Things: IoT Governance, Privacy and Security Issues. European Research Cluster on the Internet of Things; 2015.

Paul Pinault: Introduction to the connected objects. ZZ promo 2000 / F1; 2017.

Benenson Z, Gedicke N, Raivio O. Realizing robust user authentication in sensor networks. Workshop on Real-World Wireless Sensor Networks; 2005.

Xuan Hung Le, Sungyoung Lee, Ismail Butun, Murad Khalid, Ravi Sankar, Miso (Hyoung-IL) Kim, Manhyung Han, Young-Koo Lee, Heejo Lee: An Energy-Efficient Access Control Scheme for Wireless Sensor Networks based on Elliptic Curve Cryptography. Journal Of Communications And Networks. 2009;11(6):599–606.

Leandro Loffi, Carla Merkle Westphall, Lukas Derner Grudtner, Carlos Becker Westphall: Mutual Authentication for IoT in the Context of Fog Computing. 11th International Conference on Communication Systems & Networks (COMSNETS). 2019;367–374.

Oracle: Qu’est-ce que l’Internet of Things? 2021.

Al-Riyami SS, Paterson KG. Certificateless public key cryptography:Advances in Cryptology-ASIACRYPT 2003. LNCS 2894, Springer-Verlag. 2003;452–474.

Chi L, Hu L, Li HT, Sun Y, Yuan W, Chu JF. Improved energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Sensor Letters. 2013;11(5):953-7.

ANSI X9.63: Elliptic Curve Key Agreement and Key Transport Protocols. American Bankers Association; 1999.