This document proposes an analysis of authentication methods in the context of edge computing architectures. As edge architectures become more widespread, it becomes increasingly important to create efficient infrastructures to enable the secure exchange of information between the cloud and IoT devices. Typically, edge nodes are used to record and preprocess information from IoT devices, in order to later share it with the cloud infrastructure. Despite the numerous efficiency advantages, implementing a stable and secure infrastructure poses significant challenges. In terms of security, one of the important points to explore is the management of authentication between different types of devices, seeking an authentication process that requires limited resources that can be executed on IoT devices and edge nodes. This study focuses on exploring authentication mechanisms and presents two prototypes: the first one based on AWS systems and the second based on an Open Source approach that uses Mosquitto to achieve authentication with the MQTT protocol.
Secure Authentication Methods in Edge Computing Architectures using AWS and Open-Source Prototypes
LIBRALATO, MICHELE
2023/2024
Abstract
This document proposes an analysis of authentication methods in the context of edge computing architectures. As edge architectures become more widespread, it becomes increasingly important to create efficient infrastructures to enable the secure exchange of information between the cloud and IoT devices. Typically, edge nodes are used to record and preprocess information from IoT devices, in order to later share it with the cloud infrastructure. Despite the numerous efficiency advantages, implementing a stable and secure infrastructure poses significant challenges. In terms of security, one of the important points to explore is the management of authentication between different types of devices, seeking an authentication process that requires limited resources that can be executed on IoT devices and edge nodes. This study focuses on exploring authentication mechanisms and presents two prototypes: the first one based on AWS systems and the second based on an Open Source approach that uses Mosquitto to achieve authentication with the MQTT protocol.File | Dimensione | Formato | |
---|---|---|---|
Libralato_Michele.pdf
accesso aperto
Dimensione
2.07 MB
Formato
Adobe PDF
|
2.07 MB | Adobe PDF | Visualizza/Apri |
The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License
https://hdl.handle.net/20.500.12608/62287