This document proposes an analysis of authentication methods in the context of edge computing architectures. As edge architectures become more widespread, it becomes increasingly important to create efficient infrastructures to enable the secure exchange of information between the cloud and IoT devices. Typically, edge nodes are used to record and preprocess information from IoT devices, in order to later share it with the cloud infrastructure. Despite the numerous efficiency advantages, implementing a stable and secure infrastructure poses significant challenges. In terms of security, one of the important points to explore is the management of authentication between different types of devices, seeking an authentication process that requires limited resources that can be executed on IoT devices and edge nodes. This study focuses on exploring authentication mechanisms and presents two prototypes: the first one based on AWS systems and the second based on an Open Source approach that uses Mosquitto to achieve authentication with the MQTT protocol.

Secure Authentication Methods in Edge Computing Architectures using AWS and Open-Source Prototypes

LIBRALATO, MICHELE
2023/2024

Abstract

This document proposes an analysis of authentication methods in the context of edge computing architectures. As edge architectures become more widespread, it becomes increasingly important to create efficient infrastructures to enable the secure exchange of information between the cloud and IoT devices. Typically, edge nodes are used to record and preprocess information from IoT devices, in order to later share it with the cloud infrastructure. Despite the numerous efficiency advantages, implementing a stable and secure infrastructure poses significant challenges. In terms of security, one of the important points to explore is the management of authentication between different types of devices, seeking an authentication process that requires limited resources that can be executed on IoT devices and edge nodes. This study focuses on exploring authentication mechanisms and presents two prototypes: the first one based on AWS systems and the second based on an Open Source approach that uses Mosquitto to achieve authentication with the MQTT protocol.
2023
Secure Authentication Methods in Edge Computing Architectures using AWS and Open-Source Prototypes
Edge computing
Authentication
Internet of Things
X.509 certificates
MQTT
File in questo prodotto:
File Dimensione Formato  
Libralato_Michele.pdf

accesso aperto

Dimensione 2.07 MB
Formato Adobe PDF
2.07 MB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/62287