The Smart home possesses the capability of facilitating home services to their users with the systematic advance in The Internet of Things (IoT) and information and communication technologies (ICT) in recent decades. The home service offered by the smart devices helps the users in utilize maximized level of comfort for the objective of improving life quality. As the user and smart devices communicate through an insecure channel, the smart home environment is prone to security and privacy problems. A secure authentication protocol needs to be established between the smart devices and the user, such that a situation for device authentication can be made feasible in smart home environments. Most of the existing smart home authentication protocols were identified to fail in facilitating a secure mutual authentication and increases the possibility of lunching the attacks of session key disclosure, impersonation and stolen smart device. In this paper, Secure Supervised Learning-based Smart Home Authentication Framework (SSL-SHAF) is proposed as are liable mutual authentication that can be contextually imposed for better security. The formal analysis of the proposed SSL-SHAF confirmed better resistance against session key disclosure, impersonation and stolen smart device attacks. The results of SSL-SHAF confirmed minimized computational costs and security compared to the baseline protocols considered for investigation.
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
The document discusses various security mechanisms for cloud computing including encryption, hashing, digital signatures, public key infrastructure, identity and access management, single sign-on, cloud-based security groups, hardened security server images, user behavior profiling, and decoy technology. It focuses on how user behavior profiling and decoy technology can play an important role in detecting unauthorized access by monitoring a user's behavior and sending fake data to verify genuine user information. The document concludes that while most security mechanisms provide a level of protection, user behavior profiling and decoy technology are particularly effective for enhancing cloud computing security.
A signature-based data security and authentication framework for internet of...IJECEIAES
This document presents a research paper that proposes a signature-based data security and authentication framework for Internet of Things (IoT) applications. The paper introduces a novel computational model that establishes a unique authentication process using a simplified encryption strategy. The model considers both local and global IoT environments and implements an authentication mechanism using challenge-response exchanges between communicating nodes. A digital signature is generated using parameters like random seeds, secret keys, prime values, and data packets. Simulation results show that the proposed system offers efficient security and data transmission performance in the presence of unknown adversaries, performing better than commonly used security solutions in vulnerable IoT environments.
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
MEKDA: MULTI-LEVEL ECC BASED KEY DISTRIBUTION AND AUTHENTICATION IN INTERNET ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
Privacy-aware secured discrete framework in wireless sensor networkIJECEIAES
Rapid expansion of wireless sensor network-internet of things (WSN-IoT) in terms of application and technologies has led to wide research considering efficiency and security aspects. Considering the efficiency approach such as data aggregation along with consensus mechanism has been one of the efficient and secure approaches, however, privacy has been one of major concern and it remains an open issue due to low classification and high misclassification rate. This research work presents the privacy and reliable aware discrete (PRD-aggregation) framework to protect and secure the privacy of the node. It works by initializing the particular variable for each node and defining the threshold; further nodes update their state through the functions, and later consensus is developed among the sensor nodes, which further updates. The novelty of PRD is discretized transmission for efficiency and security. PRD-aggregation offers reliability through efficient termination criteria and avoidance of transmission failure. PRD-aggregation framework is evaluated considering the number of deceptive nodes for securing the node in the network. Furthermore, comparative analysis proves the marginal improvisation in terms of discussed parameter against the existing protocol.
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
The document proposes using blockchain technology to authenticate devices in the Internet of Things (IoT) and address major security issues. It describes how IoT currently lacks adequate authentication of entities and integrity of exchanged information due to its decentralized nature. The approach suggests an initial decentralized system using blockchain's security elements to guarantee solid device identification and authentication while preserving integrity and accessibility of information. This would help generate secure virtual environments where devices can identify and trust each other. The document provides background on IoT security issues, blockchain technology, and smart contracts before reviewing related literature on authentication in IoT.
Secure Channel Communication between IOT Devices and ComputersIRJET Journal
The document proposes a model to establish secure communication channels between IoT devices and computers/servers. The model implements encryption algorithms like RSA to encrypt data transmitted between IoT devices and an unconstrained node (computer/server). This helps create secure channels for transmitting encrypted data while offloading intensive encryption tasks to more powerful unconstrained nodes. The model aims to address growing security and privacy concerns with the proliferation of IoT devices and applications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
The document discusses various security mechanisms for cloud computing including encryption, hashing, digital signatures, public key infrastructure, identity and access management, single sign-on, cloud-based security groups, hardened security server images, user behavior profiling, and decoy technology. It focuses on how user behavior profiling and decoy technology can play an important role in detecting unauthorized access by monitoring a user's behavior and sending fake data to verify genuine user information. The document concludes that while most security mechanisms provide a level of protection, user behavior profiling and decoy technology are particularly effective for enhancing cloud computing security.
A signature-based data security and authentication framework for internet of...IJECEIAES
This document presents a research paper that proposes a signature-based data security and authentication framework for Internet of Things (IoT) applications. The paper introduces a novel computational model that establishes a unique authentication process using a simplified encryption strategy. The model considers both local and global IoT environments and implements an authentication mechanism using challenge-response exchanges between communicating nodes. A digital signature is generated using parameters like random seeds, secret keys, prime values, and data packets. Simulation results show that the proposed system offers efficient security and data transmission performance in the presence of unknown adversaries, performing better than commonly used security solutions in vulnerable IoT environments.
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
MEKDA: MULTI-LEVEL ECC BASED KEY DISTRIBUTION AND AUTHENTICATION IN INTERNET ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
Privacy-aware secured discrete framework in wireless sensor networkIJECEIAES
Rapid expansion of wireless sensor network-internet of things (WSN-IoT) in terms of application and technologies has led to wide research considering efficiency and security aspects. Considering the efficiency approach such as data aggregation along with consensus mechanism has been one of the efficient and secure approaches, however, privacy has been one of major concern and it remains an open issue due to low classification and high misclassification rate. This research work presents the privacy and reliable aware discrete (PRD-aggregation) framework to protect and secure the privacy of the node. It works by initializing the particular variable for each node and defining the threshold; further nodes update their state through the functions, and later consensus is developed among the sensor nodes, which further updates. The novelty of PRD is discretized transmission for efficiency and security. PRD-aggregation offers reliability through efficient termination criteria and avoidance of transmission failure. PRD-aggregation framework is evaluated considering the number of deceptive nodes for securing the node in the network. Furthermore, comparative analysis proves the marginal improvisation in terms of discussed parameter against the existing protocol.
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
The document proposes using blockchain technology to authenticate devices in the Internet of Things (IoT) and address major security issues. It describes how IoT currently lacks adequate authentication of entities and integrity of exchanged information due to its decentralized nature. The approach suggests an initial decentralized system using blockchain's security elements to guarantee solid device identification and authentication while preserving integrity and accessibility of information. This would help generate secure virtual environments where devices can identify and trust each other. The document provides background on IoT security issues, blockchain technology, and smart contracts before reviewing related literature on authentication in IoT.
Secure Channel Communication between IOT Devices and ComputersIRJET Journal
The document proposes a model to establish secure communication channels between IoT devices and computers/servers. The model implements encryption algorithms like RSA to encrypt data transmitted between IoT devices and an unconstrained node (computer/server). This helps create secure channels for transmitting encrypted data while offloading intensive encryption tasks to more powerful unconstrained nodes. The model aims to address growing security and privacy concerns with the proliferation of IoT devices and applications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Implementing High Grade Security in Cloud Application using Multifactor Auth...IJwest
As a high
-
speed internet foundation is being developed and people are informationized, most
of the tasks are engaged in internet field so there is
a risk that any private data like personal information or
applications for managing money can be wiretapped or eavesdropped. The consolidation of One Time
Passwords (OTPs) and Hash encryption algorithms are used to evolve a more secured password
-
protected
web sites and data storage systems. The new outlined scheme had higher security, small system overhead
and is easy to implement.
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
The document proposes an enhanced privacy-preserving communication protocol for smart home systems. It discusses challenges with privacy and security in smart home IoT systems. The proposed protocol uses symmetric encryption with keys generated by chaotic systems for data transmission security. It also incorporates message authentication codes to ensure data integrity and authenticity. The protocol aims to improve energy efficiency and security while preserving user privacy in smart home systems.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...cyberprosocial
The Internet of Things, or IoT, has become a disruptive force in the era of connected devices, changing the way we interact with our surroundings. In the center of this networked web is an essential element called IoT gateways. The purpose of this paper is to offer a thorough overview of IoT gateways, their importance in enabling smooth device connectivity, and the critical necessity to safeguard these gateways against growing cyber threats.
This document proposes an architecture called a pervasive public key infrastructure (pervasive-PKI) to provide authentication and authorization for mobile users across heterogeneous networks. The pervasive-PKI allows credential validation when centralized PKI services are unavailable due to disconnection or limited device capabilities. It includes three software components installed on user devices: 1) a Pervasive Trust Management component that handles trust information and certificate validation, 2) a Privilege Verifier that validates attribute certificates, and 3) an Access Control Engine that makes access decisions based on the other components. These components allow credential validation, authentication, and authorization to occur even when global connectivity and centralized services are lost.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
This document summarizes authentication techniques for mobile systems. It discusses single-factor and multi-factor authentication using passwords, tokens, and biometrics. It also reviews RFID authentication protocols like SRAC and ASRAC for secure and low-cost RFID systems. Public key cryptography models using elliptic curve cryptography are proposed for mobile security. Secure authentication provides benefits like protection, scalability, speed, and availability for mobile enterprises. Both encryption and authentication are needed but encryption requires more processing resources so should only be used for critical information.
Cybersecurity stands as the bedrock of our digital world, safeguarding systems, networks, and data from a rising tide of cyber threats. In the era of the Internet of Things (IoT), wherean ever-expanding array of devices and objects are seamlessly interconnected, the importance of cybersecurity has escalated to unprecedented levels.
This document provides summaries of 7 IEEE papers from 2012 related to software projects in various domains such as Java, J2ME, J2EE, .NET, MATLAB and NS2. The papers discuss topics such as password security, data provenance, trust-aware routing in wireless sensor networks, content distribution via network coding, detecting insider threats, secure message passing interfaces, and the security of an anonymity system with traceability.
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
The document discusses using deep learning and big data technologies to improve security for Internet of Things (IoT) devices and networks. Specifically, it proposes using deep learning models to analyze large amounts of data from IoT sensors to better detect and classify security threats. This can help identify attacks like botnets and distributed denial-of-service (DDoS) attacks. The document also outlines some common IoT security challenges and how approaches like Apache Hadoop, Spark, and Storm can process large volumes of IoT data to improve real-time monitoring and threat prevention.
In most networks and distributed systems, security
has always been of a major concern and authentication is the core
issue as it provides protection from unauthorized use and ensures
proper functioning of the system. This paper investigates and
proposes DS-NIZKP, an approach for authenticating users by
three factors, (namely password, smart-card and biometrics)
based on the concept of Zero Knowledge Proof (ZKP), so that no
sensitive information can be revealed during a communication.
The proposal employs the concept of digital signature (DS) to
authenticate the identity of the sender or the signer within a
single communication. Given that DS employs asymmetric
encryption, a one-way hash of the user’s identity is created then
signed using the private key. Hashing prevents from revealing
information about the user while signing provides authentication,
non-repudiation and integrity. This approach not only saves time
since just a single message between the prover and the verifier is
necessary but also defends privacy of the user in distributed
systems.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
This document summarizes a research paper on privacy-preserving techniques for IoT data in cloud environments. It introduces two differential privacy algorithms: 1) Generic differential privacy (GenDP) which provides generalized privacy protection for homogeneous and heterogeneous IoT metadata through data portioning. 2) Cluster-based differential privacy which groups similar data into clusters before defining classifiers to validate privacy. The paper evaluates these techniques and finds the cluster-based approach offers better security than customized interactive algorithms while maintaining data utility. Overall, the study presents new differential privacy methods for anonymizing IoT metadata stored in the cloud.
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IJCI JOURNAL
IoT as a domain has grown so much in the last few years that it rivals that of the mobile network
environments in terms of data volumes as well as cybersecurity threats. The confidentiality and privacy of
data within IoT environments have become very important areas of security research within the last few
years. More and more security experts are interested in designing robust IDS systems to protect IoT
environments as a supplement to the more traditional security methods. Given that IoT devices are
resource-constrained and have a heterogeneous protocol stack, most traditional intrusion detection
approaches don’t work well within these schematic boundaries. This has led security researchers to
innovate at the intersection of Machine Learning and IDS to solve the shortcomings of non-learning based
IDS systems in the IoT ecosystem.
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
This document discusses security challenges in ubiquitous computing environments. It begins by defining ubiquitous computing as involving the integration of computing technology into everyday objects and environments. This allows information access from any device at any time, but also increases security risks. The document then outlines some common ubiquitous applications like smart homes. It identifies key security issues like lack of authentication, unauthorized access, and privacy concerns. Finally, it discusses challenges in ubiquitous security including how the expanded computing environment impacts traditional security methods and introduces new privacy and trust issues.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
Weitere ähnliche Inhalte
Ähnlich wie Secure Supervised Learning-Based Smart Home Authentication Framework
Implementing High Grade Security in Cloud Application using Multifactor Auth...IJwest
As a high
-
speed internet foundation is being developed and people are informationized, most
of the tasks are engaged in internet field so there is
a risk that any private data like personal information or
applications for managing money can be wiretapped or eavesdropped. The consolidation of One Time
Passwords (OTPs) and Hash encryption algorithms are used to evolve a more secured password
-
protected
web sites and data storage systems. The new outlined scheme had higher security, small system overhead
and is easy to implement.
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
The document proposes an enhanced privacy-preserving communication protocol for smart home systems. It discusses challenges with privacy and security in smart home IoT systems. The proposed protocol uses symmetric encryption with keys generated by chaotic systems for data transmission security. It also incorporates message authentication codes to ensure data integrity and authenticity. The protocol aims to improve energy efficiency and security while preserving user privacy in smart home systems.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...cyberprosocial
The Internet of Things, or IoT, has become a disruptive force in the era of connected devices, changing the way we interact with our surroundings. In the center of this networked web is an essential element called IoT gateways. The purpose of this paper is to offer a thorough overview of IoT gateways, their importance in enabling smooth device connectivity, and the critical necessity to safeguard these gateways against growing cyber threats.
This document proposes an architecture called a pervasive public key infrastructure (pervasive-PKI) to provide authentication and authorization for mobile users across heterogeneous networks. The pervasive-PKI allows credential validation when centralized PKI services are unavailable due to disconnection or limited device capabilities. It includes three software components installed on user devices: 1) a Pervasive Trust Management component that handles trust information and certificate validation, 2) a Privilege Verifier that validates attribute certificates, and 3) an Access Control Engine that makes access decisions based on the other components. These components allow credential validation, authentication, and authorization to occur even when global connectivity and centralized services are lost.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
This document summarizes authentication techniques for mobile systems. It discusses single-factor and multi-factor authentication using passwords, tokens, and biometrics. It also reviews RFID authentication protocols like SRAC and ASRAC for secure and low-cost RFID systems. Public key cryptography models using elliptic curve cryptography are proposed for mobile security. Secure authentication provides benefits like protection, scalability, speed, and availability for mobile enterprises. Both encryption and authentication are needed but encryption requires more processing resources so should only be used for critical information.
Cybersecurity stands as the bedrock of our digital world, safeguarding systems, networks, and data from a rising tide of cyber threats. In the era of the Internet of Things (IoT), wherean ever-expanding array of devices and objects are seamlessly interconnected, the importance of cybersecurity has escalated to unprecedented levels.
This document provides summaries of 7 IEEE papers from 2012 related to software projects in various domains such as Java, J2ME, J2EE, .NET, MATLAB and NS2. The papers discuss topics such as password security, data provenance, trust-aware routing in wireless sensor networks, content distribution via network coding, detecting insider threats, secure message passing interfaces, and the security of an anonymity system with traceability.
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
The document discusses using deep learning and big data technologies to improve security for Internet of Things (IoT) devices and networks. Specifically, it proposes using deep learning models to analyze large amounts of data from IoT sensors to better detect and classify security threats. This can help identify attacks like botnets and distributed denial-of-service (DDoS) attacks. The document also outlines some common IoT security challenges and how approaches like Apache Hadoop, Spark, and Storm can process large volumes of IoT data to improve real-time monitoring and threat prevention.
In most networks and distributed systems, security
has always been of a major concern and authentication is the core
issue as it provides protection from unauthorized use and ensures
proper functioning of the system. This paper investigates and
proposes DS-NIZKP, an approach for authenticating users by
three factors, (namely password, smart-card and biometrics)
based on the concept of Zero Knowledge Proof (ZKP), so that no
sensitive information can be revealed during a communication.
The proposal employs the concept of digital signature (DS) to
authenticate the identity of the sender or the signer within a
single communication. Given that DS employs asymmetric
encryption, a one-way hash of the user’s identity is created then
signed using the private key. Hashing prevents from revealing
information about the user while signing provides authentication,
non-repudiation and integrity. This approach not only saves time
since just a single message between the prover and the verifier is
necessary but also defends privacy of the user in distributed
systems.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
This document summarizes a research paper on privacy-preserving techniques for IoT data in cloud environments. It introduces two differential privacy algorithms: 1) Generic differential privacy (GenDP) which provides generalized privacy protection for homogeneous and heterogeneous IoT metadata through data portioning. 2) Cluster-based differential privacy which groups similar data into clusters before defining classifiers to validate privacy. The paper evaluates these techniques and finds the cluster-based approach offers better security than customized interactive algorithms while maintaining data utility. Overall, the study presents new differential privacy methods for anonymizing IoT metadata stored in the cloud.
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IJCI JOURNAL
IoT as a domain has grown so much in the last few years that it rivals that of the mobile network
environments in terms of data volumes as well as cybersecurity threats. The confidentiality and privacy of
data within IoT environments have become very important areas of security research within the last few
years. More and more security experts are interested in designing robust IDS systems to protect IoT
environments as a supplement to the more traditional security methods. Given that IoT devices are
resource-constrained and have a heterogeneous protocol stack, most traditional intrusion detection
approaches don’t work well within these schematic boundaries. This has led security researchers to
innovate at the intersection of Machine Learning and IDS to solve the shortcomings of non-learning based
IDS systems in the IoT ecosystem.
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
This document discusses security challenges in ubiquitous computing environments. It begins by defining ubiquitous computing as involving the integration of computing technology into everyday objects and environments. This allows information access from any device at any time, but also increases security risks. The document then outlines some common ubiquitous applications like smart homes. It identifies key security issues like lack of authentication, unauthorized access, and privacy concerns. Finally, it discusses challenges in ubiquitous security including how the expanded computing environment impacts traditional security methods and introduces new privacy and trust issues.
Ähnlich wie Secure Supervised Learning-Based Smart Home Authentication Framework (20)
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
Secure Supervised Learning-Based Smart Home Authentication Framework
1. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.1, January 2024
DOI: 10.5121/ijcnc.2024.16101 1
SECURE SUPERVISED LEARNING-BASED SMART
HOME AUTHENTICATION FRAMEWORK
K. Swapna Sudha1
, N. Jeyanthi2
, and Celestine Iwendi3
1
Research Scholar, School of Computer Science Engineering and Information Systems,
Vellore Institute of Technology, Vellore-14, India
2
Professor, School of Computer Science Engineering and Information Systems,
Vellore Institute of Technology, Vellore-14, India
3
Research Coordinator, School of Creative Technologies at the University of Bolton.
ABSTRACT
The Smart home possesses the capability of facilitating home services to their users with the systematic
advance in The Internet of Things (IoT) and information and communication technologies (ICT) in recent
decades. The home service offered by the smart devices helps the users in utilize maximized level of
comfort for the objective of improving life quality. As the user and smart devices communicate through an
insecure channel, the smart home environment is prone to security and privacy problems. A secure
authentication protocol needs to be established between the smart devices and the user, such that a
situation for device authentication can be made feasible in smart home environments. Most of the existing
smart home authentication protocols were identified to fail in facilitating a secure mutual authentication
and increases the possibility of lunching the attacks of session key disclosure, impersonation and stolen
smart device. In this paper, Secure Supervised Learning-based Smart Home Authentication Framework
(SSL-SHAF) is proposed as are liable mutual authentication that can be contextually imposed for better
security. The formal analysis of the proposed SSL-SHAF confirmed better resistance against session key
disclosure, impersonation and stolen smart device attacks. The results of SSL-SHAF confirmed minimized
computational costs and security compared to the baseline protocols considered for investigation.
KEYWORDS
Supervised Learning, Smart Home, Authentication Framework, Contextual Information, and Mutual
Authentication.
1. INTRODUCTION
In the recent past, the information shared among IoT devices has exponentially increased with an
indispensable increase in the essentiality of security [1]. In specific, security is an extensive
domain [2]. This security domain is categorized into four classes that include service availability
protection, availability, alteration prevention against exchanged information, integrity,
provisioning security over communication channels established between communicating parties,
confidentiality, claimed identity validation and authenticity. In specific, authenticity is the first
important class of security over which the other classes of security are constructed [3]. Moreover,
the approaches of authentication are classified into physiological, object-based, and knowledge-
based depending on the dimension used for provisioning security [4]. However the authentication
approaches possess limitations, since the knowledge-based approaches necessitate the
remembrance of credentials associated with 1authentication that includes username and password
which are highly susceptible to attacks. In particular, the key challenge in the SH environment
wholly emphasizes on enabling secure and effective user authentication that confirms that the
2. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.1, January 2024
2
command is certainly dispensed by the genuine user or device [5]. A safe distant authentication
mechanism using Supervised Learning (SL) that allows only genuine users to gain admittance to
smart devices is indispensable. The attacker has the likelihood of achieving access to the home so
as to perform criminal activities like theft or attack, when he efficaciously negotiates the smart
door for accepting the false command [6].
A varied amount of authentication protocols is available for focusing on the production of safe
session keys that can be used for the production of authentic channels [7]. IoT in an SH does not
own tolerable storage and computation capacity for assisting in the application of the prevailing
protocols focusing on exhaustive cryptographic algorithms. Furthermore, the existing
authentication schemes [8] demand an increased amount of user interference based on
provisioning and configuration. Many devices have limited access, thus requiring primary
configuration to protect from stealing, meddling and possible forms of complete negotiation
throughout their lifetime [9]. Further, password-based results are not the only probable solutions
as the passwords are likely to be easily broken. Additionally, many IoT devices do not act as
interface for password endorsement. Despite varied user authentication methods propounded for
achieving remote access, they do not focus on the past transactions and awareness of physical
context [10]. These features are necessary in an authentication scheme for overcoming Mirai kind
of attacks. Furthermore, the prevailing protocols are found to be complex and not preferably
secure for precluding attacks on the resource-controlled devices in a smart home environment.
1.1. Motivation
The algorithms that use supervised learning generally operates using labelled datasets. It is
mainly used for detecting the locations, adaptive filtration, channel estimation, and spectrum
detection during the access of smart home devices. These supervised learning approaches can be
categorized into classification and regression types. Some of the most significant classification
algorithms that can be used in smart home environments are decision trees, random forest, naïve
Bayes, and Support Vector Machine (SVM, etc. On the other hand, logistic regression and
polynomial methods are considered as the regression methods which can be ideally utilized in the
smart home environments. In specific, these supervised algorithms pertain to the category of
instance-oriented algorithms for predicting the output depending on the model learned from each
new observation identified from the smart home scenario. For IoT-based smart home
environments, supervised learning algorithms such as naïve Bayes, DT and SVM can be utilized.
For example, the constraints with non-linear properties can be used for a model of solution that
could be obtained from SVMs. However SVMs are highly insufficient for massive datasets.
When massive datasets are used, random forest algorithms can be applied to facilitate maximized
accuracy degree. It also requires minimized amount of prediction. But the training process of
random forest algorithm incurs minimized time compared to NB and SVM algorithms. Moreover,
supervised learning models are used for thwarting DDoS attacks and detect intrusion in the IoT
network in the cloud and the layer of communication.
In this paper, a secure Supervised Learning-based Smart Home Authentication Framework (SSL-
SHAF) is proposed for achieving potential mutual authentication to attain better security. This
SSL-SHAF framework is implemented based on three different supervised learning strategies that
incorporate and strategies together in a more contextual way. The formal investigation of the
proposed SSL-SHAF scheme aided in offering better resistance against session key disclosure,
impersonation and stolen smart device attacks. The experimental validation of the proposed SSL-
SHAF is also conducted using computational costs and computational cost to compare it with the
competitive baseline protocols considered for investigation.
3. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.1, January 2024
3
2. RELATED WORK
A secure smart home mutual authentication framework using multi-factor was proposed for
utilizing transitory identities towards better security provision in smart home environments [11].
This mutual authentication framework was proposed for confirming the authentication of users
with the controllers in the smart building environment in a more untraceable, unlinkable and
anonymous manner. It was proposed with the capability of preventing the issue of clock
synchronization. It was also proposed for resisting quantum computing attacks to prevent the
credentials of the users in the smart home environment. The model checks and informal analysis
of this smart home mutual authentication framework confirmed minimized computations cost and
communication overhead with maximized capability in thwarting security attacks in the smart
home scenario. Another, smart home authentication framework was proposed for guaranteeing
high-level security using the single low-entropy human memorable password for securing smart
home scenarios [12]. It was proposed as a key confirmation protocol that utilized the merits of
mutual authenticated key agreement, password, and threshold for securing smart home
environment. It was proposed for mitigating l−1 smart home devices for handling the impacts of
the adversary in a more scalable and robust scheme. It was proposed for designing password-
intensive settings for ensuing end-to-end security depending on the selected IoT devices during
the process of user authentication. It was proposed for facilitating session key secrecy and mutual
authentication with respect to the user and the device manager. It confirmed minimized
computation and communications costs independent the number of users authenticated in the
smart home environment.
An authentication Framework using a cancellable Biometric System (CBS) was proposed for
securing smart home user credentials from exploitation [13]. This CBSAF was proposed as a
biometric protection approach for performing the operation of authentication provided at the
transformation or distortions degree over the level of the features or signals. It was proposed for
provisioning potential environment that makes it more suitable and deployable in real time
settings that improves the maximized accuracy, minimized overhead without influencing the
security of the sensitive biometric templates. The experimental and theoretical investigations of
CBS confirmed better minimized equal error rate on par with the existing works of the literature.
It was identified to incurs less time in order to make it more ideal for IoT environments. In
addition, a Context-aware smart home authentication framework (CASHAF) was proposed for
ensuring security based on the contextual information derived with respect to the patterns of
users’ access behaviour, request time, calendar, profile and location of the user [14]. This
authentication approach used the derived confidential information for making concluding
decisions for validating the access requests for accepting or rejecting the request access of the
users in the smart home scenario. It was proposed for facilitating security in a more adaptive
manner without the intervention of the user. The core objective of this CASHAF completely
concentrates on the process of determining the continuous authentication model used by mobile
users for the purpose of accessing smart home devices [15]. It was proposed as an application for
IoT depending on the use of classical credentials that include potential contextual information. It
was also proposed a multifactor authentication attribute that integrates the merits of context
information and static credentials.
3. PROPOSED SECURE SUPERVISED LEARNING-BASED SMART HOME
AUTHENTICATION FRAMEWORK (SSL-SHAF)
In this section, the detailed view of the proposed SSL-SHAF with the steps involved during the
smart authentication process.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.1, January 2024
4
The primary goal of the proposed SSL-SHAF framework concentrates on the process of attaining
a continuous authentication mechanism for mobile user clients essential for accessing smart home
services (devices). This SSL-SHAF framework utilizes contextual information using supervised
learning depending on the utilized classical credentials. This SSL-SHAF framework is
implemented as a use-case scenario for facilitating services towards user authentication in the
smart home environment. It derived contextual information from the smart home resources
deployed in the environment for examining it in the real time. It utilized multifactor attributes
that includes the integration of context information and static credentials for strengthening the
process of authentication. It facilitated better decision-making process through the inclusion of
different authentication attributes that attributes to assigned level of confidence associated with
each smart device interacting in a specific implemented environment. It adopted different levels
of confidence to each of its registered users in the smart home scenario based on the estimated
threshold level of access. This confidence level proves wide options for the smart home owner in
feasibly deriving available factors depending on the views that could be possibly determined in
the smart home scenario. In specific, contextual information utilized in the framework includes
historical information such as logs and access patterns, calendar of the users, Bluetooth and IP
information of the location, and profile of the users including identifier, age, and name.
The proposed SSL-SHAF framework comprises of the following components explained as
follows.
a) Clients (Users): The user represents any individual entity or a person who attempts to
access of the protected devices or services that could be possibly facilitated through that
device.
b) Home devices: These devices represent any equipment that interacts in the IoT
environment through the smart lock, thermostat and IP camera which can be potentially
accessed wirelessly by the clients through the aid of the gateway.
c) Database of the users: It comprises of different tables that need to be updated in the smart
home environment in the form of encryption with a calendar, user profiles, usage patterns
and access control policies.
d) Core gateway: It is the intermediator entity that exists between the connected home device
and the clients. It plays an anchor role in protecting the user access to the smart home
devices and achieving the process of authentication. It is responsible for gathering the
necessitated contextual information. It aids in verifying whether the access request satisfies
the requirement in a more pre-defined manner. It represents an application that gets
executed over a small, single-board computer named Raspberry Pi. Moreover, the access
policies need to be controlled through the gateway.
e) Bluetooth Sensor: It is the real-time sensor embedded in the Raspberry Pi for facilitating
information collection which pertains to the information associated with the proximity of
the users.
The use case scenario considered during the implementation of the proposed SSL-SHAF
framework comprises the following steps, i) stage of registration, ii) stage of verification, iii)
stage of login, iv) stage of utilization and v) stage of authentication. In the initial stage of
registration, the users need to provide specific details that include the calendar schedule and
preferences of the users. In the stage of verification, the user termed as the home owner is
responsible for activating the user accounts and reviewing the user registration. In the stage of
login, the users initially provide their classical credentials for achieving the maximized
authentication level that is related to the smart devices based on the user profiles. However, when
the user external to the home environment wants to access the services of the framework, proper
access with restriction is provided based on the roles and predefined policies provided by the
home owner. In the stage of smart home service utilization, the user performs access to the smart
5. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.1, January 2024
5
equipment’s with the help of web GUI. Moreover, the gateway continuously confirms the access
of the requested users depending on the information derived in different contexts includes history
of access, location and calendar. Finally, the access level of users in the authentication stage is
achieved based on the computation of contextual information integrated with estimated different
levels of confidence.
The proposed SSL-SHAF framework inherits the merits of three different supervised learning-
based smart home authentication mechanism as detailed as follows.
3.1. Merkle Hash Tree based Enhanced Strong Discrete Hashing Function
Authentication Scheme (MHT-ESDHF-AS)
MHT-ESDHF-AS approach is proposed based on transaction history and physical context for
guaranteeing security. It alleviates the challenges of clock synchronization and does not involve a
verification table during authentication [14]. It is proposed as a supervised hashing method that
prevents the issues of huge quantization errors and sub-optimal Binary Codes (BCs). It is
proficient in learning BCs and fighting against transmission loss as the information used for
verification includes the authentication data itself. The computation and communication costs of
the proposed scheme is found to be lesser than the standard authentication mechanisms taken for
investigation. The formal, informal and model checking-based security examination of the
propounded MHT-ESDHF-AS is also found to be better than the standard authentication
mechanisms designed for SH environments. The proposed MHT-ESDHF-AS is a secure and
lightweight scheme designed for attaining mutual authentication and key agreement using the
MHT-ESDHF supporting trusted communication for SH applications. It incorporates the
transaction history and information about the context for improving the security level for remote
access of IoT-based SH environments. It overcomes the issue related to clock synchronization
that is common in timestamp-based authentication and also avoids the use of averification table.
3.2. Supervised Hash Signature using Dynamic Forest of Random Subsets (SHS-
DFRS) Mechanism
This SHS-DFRS is propounded as an anonymous authentication approach based on past
transactions and context awareness during user authentication in SHs. This propounded SHS-
DFRS mechanism simultaneously performs the signed production of arbitrary subsets as every
element of a signature is involved in the production of consecutive arbitrary elements in
authentication. It uses the power of exposed secret keys by binding the packages to arbitrary
subset production and signature. The SHS-DFRS is designed as a lightweight and trusted user
authentication approach that is extremely good for a SH[17]. It combines the advantages of
exposed secret keys depending on chaining that incorporates the signature and subset production.
It includes a principal SL scheme that permits only the owner of the message to possibly produce
a arbitrary subset so as to avoid malicious invaders from accessing smart devices. The proposed
SHS-DFRS mechanism is a secure and lightweight key management and authentication protocol
for distant access of IoT supported SHs. It includes key generation (Secret and public keys, and
quantum SHT) based on past transactions attained using SL for applying exploited security. It is
based on the advantages of Dynamically Obtained Random Subset (DORS)-based signature
production and confirmation of the produced signature to support easiness in an application.
3.3. Supervised Learning-based Discrete Hash Signature Authentication (SLDHSA)
This supervised authentication scheme facilitates the benefits of similarity learning using the
characteristics of symmetric cryptosystems and discrete hash signatures. It is proposed for
6. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.1, January 2024
6
addressing security and authentication through the assignment of unique addressing to the
devices that aids in constructing the smart home scenario, It includes distinct identification based
on the updated unique 64-bit interface identifier generated during the process of authentication. It
generated discrete hash signature based on the 64-bit interface identifier exchanged between the
user smart card, edge server and home server. It always stores the user request packet in the
encapsulated format such that the least significant 64 bits are available in the IPv6 packet format.
In specific, the edge server is responsible for the reception of the user request for decapsulating
the unique identifier. It is proposed for verifying whether the identifier stored in the database of
the edge server and user smart card are similar during the process of authentication. It also
utilizes the merits of home server using the registration process for storing the distinct identifier
in the database to forward it and update the information of the smart card. It adopts six important
phases that include initialization, addressing, registration, login authentication, session
agreement and password update. In addition, the overall framework diagram of the proposed
SSL-SHAF framework is depicted in Figure 1.
Figure 1: Framework diagram of the proposed SSL-SHAF
7. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.1, January 2024
7
4. RESULTS AND DISCUSSION
The performance of the proposed SSL-SHAF framework and the competitive CASHAF [15] and
CBSAF [16] methods framework is validated based on Internet Access Time and Local Access
Time measured in milliseconds.
Initially, Table 1 and 2 demonstrates the Internet Access Time and Local Access Time incurred
by the proposed SSL-SHAF framework and the competitive framework used for investigation.
Table 1: SSL-SHAF Framework-Internet Access Time and Local Access Time under individual algorithm
enforcement
Utilized
parameter
Internet access time (milliseconds) Local Access Time (milliseconds)
SSL-
SHAF
CASHAF[14] CBSAF[13] SSL-
SHAF
CASHAF[14] CBSAF[13]
Proximity
(Bluetooth-based
location
86 94 99 7 11 15
Access of
Calendar
96 112 134 13 19 26
Network (IP
address-based
location)
92 96 103 13 17 23
Username and
password
(knowledge-based
credentials)
93 111 123 14 19 24
No authentication 83 91 98 6 10 15
Table 2: SSL-SHAF Framework-Internet Access Time and Local Access Time under integration of
algorithms
Utilized parameter Internet access time (milliseconds) Local Access Time (milliseconds)
SSL-
SHAF
CASHAF[14] CBSAF[13] SSL-
SHAF
CASHAF[14] CBSAF[13]
Bluetooth and IP
Address-based
location
83 90 97 11 14 17
Bluetooth and IP
Address-based
location with access
of Calendar
92 06 103 13 17 23
Bluetooth and IP
Address-based
location with access
of Calendar and
knowledge-based
credentials
93 98 111 13 16 19
No authentication 82 88 94 5 8 11
8. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.1, January 2024
8
The above demonstrated results from Table 1, clearly confirmed that the proposed SSL-SHAF is
performing better than the competitive CASHAF [15] and CBSAF [16] methods independent of
the process of integrating attributes or individually selecting contextual information. As the
expected, the integration of all the methods is considered to be comparatively higher than the no
authentication condition. But a minimum degree of overhead is realized with the request level
related to the methods used for authentication. Moreover, the response time is identified to be
influenced more due to the proximity, calendar access and knowledge-based credentials.
In the second level of investigation, the proposed SSL-SHAF and the competitive CASHAF [15]
and CBSAF [13] methods are compared based on the security factors of integrity, availability,
and authentication and presented in Table 3.
Table 3: Performance comparison of the proposed SSL-SHAF with respect to security factors
Security factors
considered for evaluation
Schemes under comparison
SSL-SHAF CASHAF[14] CBSAF[13]
Authentication Strong Strong Strong
Integrity Strong Moderate Moderate
Availability Strong Strong Weak
The above-mentioned results depicted in Table 3 demonstrated that the proposed SSL-SHAF
framework is competent enough in guaranteeing the factors of security such as authentication,
Integrity and Availability on par with the CASHAF [15] and CBSAF [16] methods used for
comparison. Further, the performance of the proposed SSL-SHAF and the competitive CASHAF
[15] and CBSAF [16] authentication frameworks are compared based on response time,
computational overhead, and communicational overhead. Figures 2, 3 and 4 depict the response
time, computational overhead and communicational overhead incurred by the proposed SSL-
SHAF and the competitive CASHAF [15] and CBSAF [16] authentication frameworks with
respect to number of users. The results confirmed that the proposed SSL-SHAF has potential
enough in minimizing the response time as contextual information based on supervised learning
is derived during the authentication process. In particular, the computational cost of the proposed
SSL-SHAF framework is minimized, since the number of messages used for authentication is
minimal as they integrate the factors of Bluetooth and IP Address-based location with access of
Calendar and knowledge-based credentials together in a more contextual manner. Moreover, the
proposed SSL-SHAF framework also reduced the storage overhead on par with the baseline
frameworks of comparison as they contextually adopt only one supervised learning-based user
smart home authentication at a single instant of time.
Figure 2: Proposed SSL-SHAF-Response timeunder different users
9. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.1, January 2024
9
Figure 3: Proposed SSL-SHAF-communicational cost under different users
Figure 4: Proposed SSL-SHAF-Storage Costs (in bits) incurred under different users
Thus, the SSL-SHAF framework, on average minimized the response time by 19.21%,
computation cost by 21.84% and storage costs by 18.72%, independent to the users requisitioning
for anauthentication process.
In addition, the proposed SSL-SHAF framework is compared with the baseline MHT-ESDHF-
AS, SHS-DFRS and SLDHSA with respect to privacy preservation degree under different users
considered for evaluation. Figure 5 demonstrates the privacy preservation degree achieved by the
proposed SSL-SHAF framework on par with the compared MHT-ESDHF-AS, SHS-DFRS and
SLDHSA under different number of users.
0
20
40
60
80
100
120
140
160
4 8 12 16 20
COMPUTATION
COST
(in
milliseconds)
NUMBER OF IUSERS
Proposed SSL-SHAF CASHAF[14] CBSAF[13]
0
200
400
600
800
1000
1200
1400
4 8 12 16 20
STORAGE
COST
(IN
BITS)
NUMBER OF USERS
Proposed SSL-SHAF CASHAF[14] CBSAF[13]
10. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.1, January 2024
10
Figure 5: Proposed SSL-SHAF- Privacy preservation degree achieved under different users
The results from Figure 5 confirmed that the proposed SSL-SHAF framework, on average
improved the privacy preservation degree by 18.21% and 20.18%, better than the benchmarked
authentication process.
5. CONCLUSION
The proposed SSL-SHAF achieved robust and secure mutual authentication through contextual
derivation of parameters associated with access control. It facilitated better resistance against
session key disclosure, impersonation and stolen smart device attacks. It integrated the benefits of
MHT-ESDHF-AS, SHS-DFRS and SLDHSA in a more contextual manner for guaranteeing
security against attacks that could be launched in the smart home scenario. The results of SSL-
SHAF confirmed minimized computational costs and security compared to the baseline protocols
considered for investigation. The investigational endorsement of the propounded SSL-SHAF
framework confirmed the decrease in the computational overhead by 6.74%, 7.92% and 9.568%
in contrast to the standard schemes. The storage and communication costs of the propounded
SSL-SHAF also found to be reasonably reduced when compared to the standard authentication
schemes in a SH. As the part of future scope, it is decided to formulate a semi-supervised
learning-based mutual authentication framework and compare it with the proposed supervised
learning framework.
CONFLICTS OF INTEREST
The authors have no conflicts of interest to declare. All co-authors have seen and agree with the
contents of the manuscript and there is no financial interest to report.
REFERENCES
[1] Vanitchasatit M.,Sanguankotchakorn T. (2022), “A Class-based Adaptive QoS Control Scheme
Adopting Optimization Technique over WLAN SDN Architecture”, International Journal of
Computer Networks & Communications (IJCNC), Vol. 14, No. 3, pp. 55-72.
[2] Oh, J., Yu, S., Lee, J., Son, S., Kim, M., & Park, Y. (2021). A secure and lightweight authentication
protocol for IoT-based smart homes. Sensors, 21(4), 1488.
[3] Banerjee, S., Odelu, V., Das, A. K., Chattopadhyay, S., & Park, Y. (2020). An efficient, Anonymous
and robust authentication scheme for smart home environments. Sensors, 20(4), 1215.
0
200
400
600
800
1000
1200
1400
4 8 12 16 20
STORAGE
COST
(IN
BITS)
NUMBER OF USERS
Proposed SSL-SHAF CASHAF[14] CBSAF[13]
11. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.1, January 2024
11
[4] Poh, G. S., Gope, P., & Ning, J. (2019). PrivHome: Privacy-preserving authenticated communication
in smart home environment. IEEE Transactions on Dependable and Secure Computing, 2(3), 1-1.
[5] Lyu, Q., Zheng, N., Liu, H., Gao, C., Chen, S., & Liu, J. (2019). Remotely access “My” smart home
in private: An anti-tracking authentication and key agreement scheme. IEEE Access, 7(2), 41835-
41851.
[6] Wazid, M., Das, A. K., Odelu, V., Kumar, N., & Susilo, W. (2020). Secure remote user authenticated
key establishment protocol for smart home environment. IEEE Transactions on Dependable and
Secure Computing, 17(2), 391-406.
[7] Shuai, M., Yu, N., Wang, H., & Xiong, L. (2019). Anonymous authentication scheme for smart home
environment with provable security. Computers & Security, 86(1), 132-146.
[8] Trnka, M., Abdelfattah, A. S., Shrestha, A., Coffey, M., & Cerny, T. (2022). Systematic review of
authentication and authorization advancements for the Internet of things. Sensors, 22(4), 1361.
[9] Kang, W. M., Moon, S. Y., & Park, J. H. (2017). An enhanced security framework for home
appliances in smart home. Human-centric Computing and Information Sciences, 7(1), 12-24.
[10] Alkhresheh, A.; Elgazzar, K.; Hassanein, H.S. DACIoT: Dynamic Access Control Framework for IoT
Deployments. IEEE Internet Things J. 2020, 7, 11401–11419
[11] Shayan, M.; Naser, M.; Hossein, G. IoT-Based Anonymous Authentication Protocol Using
Biometrics in Smart Homes. In Proceedings of the 2019 16th International ISC (Iranian Society of
Cryptology) Conference on Information Security and Cryptology (ISCISC), Mashhad, Iran, 28–29
August 2019; pp. 114–121
[12] Mujib Alshahrani, M. (2021). Secure multifactor remote access user authentication framework for
IoT networks. Computers, Materials & Continua, 68(3), 3235-3254.
[13] Huszti, A., Kovács, S., & Oláh, N. (2022). Scalable, password-based and threshold authentication for
smart homes. International Journal of Information Security, 3(2), 12-24.
[14] Huy D. Le et al.: Aodvmo: A Security Routing Protocol Using One-Time Password Authentication
Mechanism Based On Mobile Agent, IJCNC Vol.14, No. 13, May 2022, 17–35.
https://doi.org/10.5121/ijcnc.2022.14302.
[15] Chifor, B., Bica, I., Patriciu, V., & Pop, F. (2018). A security authorization scheme for smart home
Internet of things devices. Future Generation Computer Systems, 86(2), 740-749.
[16] Y. Ashibani, D. Kauling and Q. H. Mahmoud, "A context-aware authentication framework for smart
homes," 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE),
2017, pp. 1-5.
[17] Sudha, K. S., & Jeyanthi, N. (2021). Dynamic forest of random subsets‐based supervised hash
signature scheme for secure user authentication in smart home environment. Concurrency and
Computation: Practice and Experience, 3(3), 45-56.
AUTHORS
K. Swapna Sudha received M.Tech degree from Jawaharlal Nehru Technological
University, Anantapur, Andhra Pradesh, India. Currently, she is a research scholar in the
School of Computer Science Engineering and Information Systems, Vellore Institute of
Technology, Vellore, Tamilnadu, India and pursing her Ph.D. degree in the field of Cyber
Security. Her main area of research includes Network Security, Cyber Security and Internet
of Things.
Dr. N. Jeyanthi received her Ph.D. degree in Cloud Security from VIT University,
Vellore, Tamilnadu, India. She is an Associate Professor in VIT, Vellore for School of
Computer Science Engineering and Information Systems. Her research work was funded
by Department of Science and Technology, Govt. of India. She has authored and co-
authored over 62 research publications in peer-reviewed reputed journals and 30
conference proceedings. Her entire publications have been cited over 367 times (Google
Scholar). The latest Google h-index of his publications is 12 and i10 index is 13. Books
and book chapters were also added to her research contribution. She has served as the program committee
member of various international conferences and reviewer for various international journals. She has been
honoured by VIT as an active researcher for four consecutive years. Her current areas of interest include
IoT, Cloud, and Big Data security.
12. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.1, January 2024
12
Celestine Iwendi (Senior Member, IEEE) received the master’s degree in communication
hardware and microsystem engineering from Uppsala University, Uppsala, Sweden, in
2008, and the Ph.D. degree in electronics from the University of Aberdeen, Aberdeen,
U.K., in 2013. He is currently a Senior Lecturer with the School of creative Technologies,
University of Bolton, Bolton, U.K. He is also a Visiting Professor with Coal City
University Enugu, Enugu, Nigeria. He is a highly motivated and hardworking researcher.
He has authored or co-authored the book Wireless Sensor Network Security and more than
100 publications. His research interests include the Internet of Things, machine learning, artificial
intelligence, and wireless sensor networks. He is a fellow of the Higher Education Academy, U.K. He is
also a Board Member of IEEE Sweden Section.