Conference PaperPDF Available

Authentication of IoT Device and IoT Server Using Security Key

Authors:

Abstract and Figures

IoT is an emerging topic in the field of IT that has attracted the interest of researchers from different parts of the world. Authentication of IoT includes the establishment of a model for controlling access to IoT devices through the internet and other unsecured network platforms. Strong authentication of IoT is necessary for ensuring that machines and devices could be trusted when it comes to data sharing. The whole idea of authentication further prevents cybercriminals from using loopholes in IoT devices to access data that they are not allowed to access. Various authentication techniques could be used to secure IoT servers and devices. Establishing mutual authentication between IoT servers and IoT devices has attracted a lot of research interest because it helps enhance the effectiveness and overall security of data sharing. Therefore, this research provides the basis for analyzing the whole idea of using security keys to encrypt both IoT servers and IoT devices. Index Terms-unsecured network platforms, mutual authentication, security key, internet of things
Content may be subject to copyright.
978-1-6654-1224-7/21/$31.00 ©2021 IEEE
Authentication of IoT Device and IoT Server
Using Security Key
Wael Alnahari
College of Computing & Information Technologies
University of Bisha, Bisha,
Saudi Arabia
Email: master@wjn.sa
Mohammad Tabrez Quasim
College of Computing & Information Technologies
University of Bisha, Bisha,
Saudi Arabia
Email: tabrezquasim@gmail.com
Abstract—IoT is an emerging topic in the field of IT that has
attracted the interest of researchers from different parts of the
world. Authentication of IoT includes the establishment of a model
for controlling access to IoT devices through the internet and other
unsecured network platforms. Strong authentication of IoT is
necessary for ensuring that machines and devices could be trusted
when it comes to data sharing. The whole idea of authentication
further prevents cybercriminals from using loopholes in IoT
devices to access data that they are not allowed to access. Various
authentication techniques could be used to secure IoT servers and
devices. Establishing mutual authentication between IoT servers
and IoT devices has attracted a lot of research interests because it
helps enhance the effectiveness and overall security of data
sharing. Therefore, this research provides the basis for analyzing
the whole idea of using security keys to encrypt both IoT servers
and IoT devices.
Index Terms—unsecured network platforms, mutual authenti-
cation, security key, internet of things
I. INTRODUCTION
IoT is one of the latest technological innovations that has
attracted a lot of interest from researchers and IT experts in the
last couple of years. Mutual authentication between IoT servers
and IoT devices is considered by experts as a critical step of
securing the entire IoT system. The use of authentica- tion
systems that are based on single passwords is vulnerable to
dictionary and side-channel attacks [1]. Authentication in the
context of IoT servers and IoT devices is simply a model for the
establishment of trust in the identity of IoT devices and servers
to control access and protect data when information is conveyed
through the internet or other unsecured network. It is important
to have strong IoT authentication because it helps ensure that
connected servers and devices could earn the trust of protecting
data against possible control commands from malicious actors
and unauthorized machines. Additionally, authentication plays
an integral role in preventing potential attackers from
pretending to be authorized IoT servers and IoT devices hoping
that they will access sensitive data.
Different pieces of research have been conducted to estab-
lish the best way of attaining the right level of authentica- tion
for IoT devices and IoT servers. This includes and is
not limited to centralized, distributed, two-way, and one-way
authentication. It is equally vital to note that the IoT is not just
one technology but rather a connected environment that is
comprised of different “things” or machines that function
independently without human intervention. The purpose of the
IoT authorization process is to provide the basis for validating
the identity of every single endpoint within the larger IoT
system. The underlying process of certification is usually
configured following the enrollment entry and offers the
service providers information about the method that can be
used to check the identity of the system during registration.
Consequently, machine identity management usually fo- cuses
on managing and building confidence in the identity of
machines that are meant to interact with other gateways,
clouds, applications, and devices. The rationale could include
authorization and authentication of IoT devices like smart
outlets, lights, and speakers, mobile devices, home security
systems, security cameras, vehicle engine control units, and
industrial control systems. Every single IoT device should have
a unique digital identity that can be used when connecting to
the central server or gateway to help prevent unauthorized
parties from accessing the system. This is attained by binding
identities to cryptographic keys that are unique to each IoT
device. Approaches for machine identity management are es-
pecially essential when it comes to discovering the credentials
that are utilized by various machines. The unique ID of IoT
servers and IoT devices enables system administrators to track
them throughout their lifecycles, establish secure
communication with them, and prevent them from executing
processes that could be harmful. Should an IoT server or device
start to exhibit a behavior that is not expected, the system
administrators could revoke their privileges with ease.
II. EXPECTED DELIVERABLES
IoT servers and devices can be hacked remotely by mali-
cious actors and unauthorized parties who might attempt to
find their way into the device using an internet connection. If
IoT devices could have been configured in a manner that
2021 International Congress of Advanced Technology and Engineering (ICOTEN) | 978-1-6654-1224-7/21/$31.00 ©2021 IEEE | DOI: 10.1109/ICOTEN52080.2021.9493492
Authorized licensed use limited to: Bisha University. Downloaded on July 28,2021 at 11:34:13 UTC from IEEE Xplore. Restrictions apply.
allows for communication only with authorized servers, the
outside communication attempts could have been ignored. The
number of attacks targeting IoT servers and devices has
continued to increase year in year out. Thus, as these devices
are being integrated into corporate networks, special attention
should be redirected to the essence of security. Powerful and
efficient cryptographic solutions should be utilized be- because
they can assist with the standardization of secure lines of
communications between different devices and machines.
Nonetheless, it is also a tough decision to select the most
appropriate authentication model that can get the job done.
Before choosing the architecture model that is ideal for IoT
authentication, it is first essential to consider a wide range of
factors that includes and are not limited to connectivity, security
requirements, security expertise, financial budgets, hardware
capacity, and energy resources [2]. Therefore, the following
models will be used to address the authentication problem that
relates to IoT servers and IoT devices:
A. The Chain of Trust Model
The core purpose of the chain of trust model is to prove that
a specific certificate comes from a given trusted source [3]. The
model is comprised of three basic entities that form the valid
chain of trust. They include end-entity, intermediate, and root.
Consequently, the end-entity offers compliance, scalability, and
security with certificate authority standards. Nonetheless,
certificates, in this case, do not offer a guarantee that the subject
under consideration is reputable or trustworthy in his business
activities, safe to carry out business with, or compliant with
specific laws. The end-entity offers vital pieces of information
to the issuing certificate authority through a form of certificate
signing request. This certificate must be signed before being
issued by a trusted certificate authority showing that the
information that has been provided is correct at the time of
issuance. The Secure Sockets Layer connection to the IoT
server will not be successful if the certificate has not been
signed or verified [4].
The chain of trust model could be further categorized into
three models including the CA certificate authority archi-
tecture, web of trust, and hierarchical trust model . For the
hierarchical trust model, there must be a single root certificate
authority or more subordinate certificate authorities. In this
case, subordinated certificate authorities are meant to offer load
balancing and redundancy when the root certificate authority is
offline. That means that even if the subordinate certificate
authority has been compromised, the root certificate authority
will have the opportunity to revoke the subordinate certificate
authority, thus offering redundancy. Apart from that, the web of
trust model which is also regarded as the cross- certification
model has been designed such that the certificate authorities can
form what could be considered as a peer-to- peer relationship.
According to experts, this model is somehow challenging to
manage with an increase in the number of certificate authorities
[5]. This type of trust relationship that is formed in this case
could only take place when other company divisions have their
unique certificate authorities that
must work together. Lastly, the bridge certificate authority
architecture model is different in the sense that it can overcome
the challenges and complexities of the web of trust model. In
this case, the bride certificate authority serves as the central
point of coordination. That implies that other principals or
certificate authorities must trust the bridge certificate authority
only.
B. The Threat Model
The IoT servers have been deployed at the cloud architecture
and have the underlying capability of communicating with the
IoT devices or the client over a WAN . The use of single key
authentication cannot be sufficient when it comes to the
authentication of IoT devices and IoT servers. There are
additional side-channel cyber-attacks that can provide the basis
for the retrieval of shared keys when communication has been
established between the IoT server and the IoT device. If
passwords are not changed regularly, they become vulnerable
to the brute force of dictionary attacks. As soon as adversaries
have acquired the key that has been shared, fake devices could
be created with that same key. Thus, while establishing the
right model for the documentation of this task, a set of keys
known as a secure vault could be used to authenticate both IoT
devices and IoT servers.
In essence, there are three-way mutual authentication tech-
nique for authenticating both the IoT devices and IoT servers
is used. The IoT devices will be responsible for the initiation
of communication by redirecting the request for connection to
the server. Once the request has been received by the IoT
servers, the IoT servers will then send back challenges to the
IoT devices. To this point, the IoT devices can then respond to
the challenges by redirecting further challenges for
authentication to the IoT servers. The IoT servers will then
make a verification for the responses that have been provided
and if by any chance they are valid, the IoT servers would
eventually end up responding to the challenge that has been
sent by the IoT devices. During this session, the IoT devices
and IoT servers must create a shared secret also known as the
session key. The session key must fulfill fundamental
purposes.
Firstly, they should help encrypt all messages that have been
exchanged between the IoT devices and the IoT servers.
Secondly, they serve as encryption keys for message au-
thentication codes that are relied upon for authentication of
messages. All messages that in one or another are going to
be exchanged between the two authentications that have been
established are regarded as sessions. Session keys usually
remain unmodified throughout the entire session even though
varied sessions utilize different, unique session keys.
C. Proposed Design
This study proposes the use of security keys to secure IoT
devices against cyberattacks. Therefore, some of the attacks
and attackers that have been considered in this work include:
1) Malware attackers.
2) Network attackers.
Authorized licensed use limited to: Bisha University. Downloaded on July 28,2021 at 11:34:13 UTC from IEEE Xplore. Restrictions apply.
3) Related-site attackers.
4) Web attackers.
With that in mind, our design goals are as follows:
1) Security: The proposed security key should protect users
against man-in-the-middle attacks, phishing, password reuse,
and so forth.
2) Privacy: The security key should be designed in a manner
that prevents any kind of tracking. Besides, if a security key has
been lost, it should not be easy for attackers to retrieve useful
information from the security key.
3) Easy for developers: The security key should make it
easier for developers to incorporate them into their websites
using simple APIs.
4) Easy for users: The security keys should not require a lot
from the part of the users for them to use them. Its use should
be brainless, easy, and fast.
The security key should be used in the context of web
applications whereby the servers might want to verify the
identity of the users. Therefore, the security key should support
the following commands:
1) Authenticate.
2) Register.
The detailed design captures cryptographic primitives, a test
of user presence, client data, device attestation, authentication,
and registration. Nonetheless, the most important aspects will
registration and authentication as shown in the diagrams below:
The design was implemented using end-to-end support for
security keys. The rationale involved the development of
various open-source components.
D. Evaluation
There are a few metrics that will be used to evaluate the
security key including:
1) Comparative: This will be based on security, deploya-
bility, and usability.
2) Hardware performance: This will involve coming up
with a protocol that was fast enough during normal or ordinary
use.
3) Deployment experience: The security key should be as
advantageous as possible.
4) Time spent authenticating: The key should take little
time possible when authenticating.
5) Failure of the rate of authentication: Higher rates of
authentication failures increased users’ frustrations and time
spent when trying to authenticate.
6) Hardware cost: The security should be cost-effective.
III. DISCUSSIONS
A. Security Keys
The advent of the IoT is arguably amongst the most ex- citing
and dynamic developments in ICT [6]. The past two decades
have seen networking devices becoming increasingly
ubiquitous. However, these devices have largely been restricted
to connect to the traditional end-user devices like tablets,
smartphones, laptop and desktop computers, mainframes, and
so forth. The past few years have seen have experienced more
attachment of more and more devices to the network. These
devices include and are not limited to digital assistants like
Google Home and Amazon Alexa, smart TVs, traffic controls,
streetlights, electric controls and meters, medical devices,
household appliances, and vehicles [7].
The need to authenticate IoT servers and IoT devices using
security keys has attracted the attention of different groups of
researchers and scholars in the field of information technology.
According to [8,9], authentication of online accounts is some-
thing that many people understand as something you have,
something you are, or something you know. This partly implies
the use of passphrases, PINs, and passwords as knowledge;
physical tokens as possessions, and biometric identity as a
form of being intrinsic to oneself [9].
Other authentication techniques might include someone that
you are conversant with and where you are. Once any of these
methods of authentication are used together, the practice is
considered as 2FA. Although there exist different kinds of
authentication options, the use of passwords is continuing to
dominate when it comes to online authentication. In this case,
the main concern is that passwords are associated with a wide
range of security vulnerabilities and flaws with sheer amounts
of generated passwords causing even greater risks [9]. Despite
the continuing instances of passwords being compromised,
many people are still using a single-factor authentication
method that has greatly been associated with misalignment in
human cognition, a vulnerability in the event of social
engineering, and difficulties when it comes to creating
necessary policies. Even though a two-factor authentication is
being adopted on a large scope, a simple examination of the
benefits and risks that are associated with them could call for
further evaluation of their adoption [9].
The initial evaluation that was made about the security keys
were made based on different frameworks that had been
developed to evaluate various authentication approaches. It
was evident that for authentication protocols to be accepted on
a large scale, they must outperform the use of passwords on
many fronts that include and are not limited to preservation of
privacy, scalability, physical burden, and cognitive burden [7].
Further research has also seen five important attributes being
proposed for tokens namely, theft-resistant, loss resistant,
scalable, memoryless, and secure [9]. Despite the fact the use
of security keys does not come in handy with a physical
burden, it is physically effortless, and is lightweight because
their operations are based on the pressing of buttons. Even
more, security keys are unlikely to be stolen or get lost and are
also scalable and secure besides being compatible with the
use of passwords. Once an individual has enrolled in the
service, security keys are further considered as cognitively
effortless[9-15].
B. Cloud Computing
The IoT technology is an extension of cloud computing.
Cloud computing is a general term referring to the delivery of
a wide range of hosted services over the internet. In
Authorized licensed use limited to: Bisha University. Downloaded on July 28,2021 at 11:34:13 UTC from IEEE Xplore. Restrictions apply.
Fig. 1. Security Key Registration
Fig. 2. Security Key Authentication
other words, cloud computing is the provision of various on-
demand computing services like processing power, storage, and
applications, typically on a pay-as-you-go basis and over the
internet. These services are placed into three broad categories
including SaaS, PaaS, and IaaS. According to [16], cloud
computing has evolved into one of the most inspiring
technology in industry and research. It is a model that
necessitates convenient, ubiquitous, on-demand network access
to a wide range of configurable computing resources including,
services, applications, storage, servers, and network that can be
provisioned and subsequently released with min- imal
interaction with the service providers and management efforts.
Due to its high computational value, cloud computing has
continued to grow and allow companies such as Microsoft
Azure to offer their cloud computing services through the
internet [16].
The vast cloud’s capability to store and ensure the avail-
ability of different applications and contents poses a lot of
risks that relate to security and privacy [17]. This is an
important issue of concern, especially for the diffusion of the
cloud because many organizations rely on the cloud for their
mission-critical and strategic functions. In that same regard,
cloud providers are said to be experiencing numerous
challenges and pressure from different stakeholders including
the members of the society to protect information and other
sensitive data assets that belong to the customers [17]. Today,
there is a huge gap between what cloud providers claim to be
offering, and what potential and existing adopters think about
cloud computing’s cloud security. On the flip side, players in
the industry are starting to realize the need to establish
standards that can be used to offer guidance for promoting
privacy and security. Because of a wide range of individual and
organized efforts, the society at large is anticipating significant
security changes in cloud-related institutions [17].
Cloud computing can be classified into different architecture
models, types, and classifications [18]. The public cloud, pri-
vate cloud, and hybrid cloud are the three major transformative
types of networked computing models. The underlying cloud
Authorized licensed use limited to: Bisha University. Downloaded on July 28,2021 at 11:34:13 UTC from IEEE Xplore. Restrictions apply.
infrastructure could assume different features and forms in-
cluding hyper-converged models, software-defined, virtualized
models, and so forth. The public cloud can be described as
the cloud computing model in which IT services are offered
through the internet. Consequently, the service could be
charged, subscription-based, freemium, or free depending on
the type of computing resources that are being used or
consumed. The corresponding computing functionality varies
and might include services such as infrastructure environment,
storage, apps, and emails. It is the responsibility of the cloud
vendors to maintain, manage, and develop the different pools of
computing resources that are provided to different tenants. The
main defining features of public cloud solutions are scalability
of the IT-enabled services and high elasticity that are provided
at relatively low costs and based on pricing tier. The public
cloud has developed into the most common way for cloud
computing deployment [19]. Consequently, cloud resources
such as storage and servers are operated and owned by third-
party cloud vendors after which they are delivered through the
internet. A great example of a public cloud is Microsoft Azure.
The cloud provider manages and owns all software, hardware,
and related supporting infrastructure in the public cloud. In this
type of cloud, tenants share network, storage, and hardware with
fellow tenants. These tenants manage their accounts through
web browsers. Many public cloud deployments offer online
office applications, web-based email, testing, storage, and
development environments. Some of the advantages that are
associated with the use of public clouds include high reliability,
near-unlimited scalability, no maintenance, and lower costs.
The private cloud is widely known as a cloud solution that is
mainly dictated for use by a single corporation or organization.
Here, the data center resources could either be operated by a
third-party vendor off-site or on-site. The under- lying
computing resources are isolated before being delivered through
secure private networks rather than being shared with fellow
customers. A private cloud can be customized to meet the
various security and business needs of an organization at large
[20]. With greater control and visibility into such infrastructure,
companies can operate IT workloads that are compliance
sensitive without necessarily having implications on
performance and security. The private cloud is comprised of a
wide range of computing resources that are exclusively used by
a single organization or business. Besides, the private cloud can
be located physically on an organization’s on-site datacenter or
could be hosted by third-party service providers. Infrastructure
and services in the private cloud are usually maintained on what
could be termed as a private network whereas software and
hardware are typically dedicated to solely fulfill organizational
needs. Private clouds are in most cases used by financial
institutions, government agencies, and other middle to large
government corporations that have business-critical functions
aimed at promoting control over a cloud environment.
Advantages of the private cloud include and are not limited to
high scalability, improved security, and more flexibility.
Lastly, a hybrid cloud is defined as the cloud infrastructure
environment that constitutes the mix of private and public
cloud solutions. In this case, resources are mainly orchestrated
as infrastructural environments that have been integrated. Data
workloads and applications can share a wide range of
resources between private and public cloud deployment
depending on organizational efficiency and cost, scalability,
performance, technical policies that revolve around the subject
of security, and so forth [21,22]. For example, a company can
use a private cloud for its information technology workloads
and at the same time complement the underlying infrastructure
with some public cloud resources with the hope of
accommodating spikes in network traffic that are likely to be
experienced on an occasional basis. Because of that, access to
another computing capability will not necessarily need high
CapEx of the private cloud environment. Instead, it will be
delivered through the public cloud solution as a short-term IT
service.
C. Authentications
Authentications are processes that are involved in verifying
whether something or someone is what or who is declared to
be. In other words, authentication is an approach that is
employed when trying to recognize the identity of users. The
mechanism entails relating incoming requests to various sets
of identifying credentials. Credentials that have been provided
are first compared to those that have been filed in the
authentication servers, operating systems, and databases for
information about authorized users. Authentication processes
will always run at the start of applications before any other
code is given the green light to proceed. Multiple systems
might need varied credentials to determine the identity of the
users. These credentials normally assume the form of
passwords that could either be known or secret to a system or
individuals.
There are three authentication techniques. They include
something that you are such as a scanned body part, some-
thing that you have like token keys, and something that you
know like a password. Essentially, something that you are is
considered as the strongest authentication method that is the
hardest to crack. For instance, it is not easy for one to duplicate
fingerprints or replicate an iris scan. Something that you have
has continued to gain popularity because of people’s
unwillingness to be detached from their mobile devices. This
access control technique usually assumes the form of a one-
time toke key that can be retrieved from external sources.
Lastly, something you know does not require special hardware.
Just like the use of passwords, there are no additional tools that
are required to offer secret codes. That is why people are highly
encouraged to come up with passwords that are difficult to
guess.
D. MFA
MFA is an authentication technique whereby users offer at
least two verification factors to establish access over resources
like virtual private networks, online accounts, or applications
MFA is an important aspect of strong policy for identity and
Authorized licensed use limited to: Bisha University. Downloaded on July 28,2021 at 11:34:13 UTC from IEEE Xplore. Restrictions apply.
access management. For instance, instead of being required to
provide a password and a username only, MFA requires the use
of an additional verification factor, thus minimizing cyber-
attacks. In information technology, credentials that form MFA
can take the form of locations, time, biometrics, numerical
codes, hardware tokens, passwords, and so forth [23]. Techni-
cally, combining any two of such credentials is considered as
MFA. That is although many implementations tend to capitalize
on two factors or what is considered as two-factor
authentication. Using many credentials rather than one makes
the authentication process more secure even if one of the
combinations that have been used is compromised. For MFA to
work, users’ credentials must come from a minimum of two of
three different factors or categories: what you are, what you
have, and what you know [24].
E. Weak Passwords
Passwords are arguably the most common authentication
forms that are used to establish control over information such
as voice mail systems, calling cards, telephone, credit cards,
automated teller machines, and personal identification numbers.
Many people use passwords because they are con- venient,
inexpensive, and simple mechanisms to implement and use.
Similarly, passwords are regarded as extremely poor forms of
authentication or protection. It is very difficult to manage
password problems since one computer network could have
thousands or hundreds of accounts that have been protected
using passwords and that only one of them could be
compromised to provide potential attackers with access to the
network or system. With the current nature of the
interconnected internet, skillful hackers can use passwords to
compromise millions of systems [25].
Weak passwords usually play significant roles in any form of
hacking activity [26]. Some systems and applications do not
promote password complexity, thus encouraging users to use
simple passwords like their phone numbers, god, 12345, and
123. Weak passwords are not necessarily characterized by the
characters or length that has been used. They could as well be
associated with guess ability. For instance, a password like
name@12345 appears to be complex but could be guessed [26].
Users are encouraged to avoid passwords that relate to mobile
numbers, places, or names. Weak passwords are easy to guess
and, in some instances, especially when they are too short,
attackers can use brute force. That is why users are highly
encouraged to utilize special characters alongside random
strings. Even though it might be difficult to remember such a
password combination, the truth is that they are quite secure
[26].
F. Importance of MFA
The core importance of MFA is that it increases organiza-
tional security [27]. The technique requires all users such as
organizational employees to identify themselves using addi-
tional credentials rather than just usernames and passwords.
Essentially, usernames and passwords are vulnerable to brute
force attacks and could be compromised or get stolen by
unauthorized third parties. Promoting the use of MFA at the
organizational level promotes the sense of confidence that an
organization remains safe from potential cyber-attacks.
Passwords are considered the most popular authentication
technique. However, they provide very little protection
because once stolen, they can be used by hackers or
unauthorized users to wreak serious havoc, bypass other access
controls, and log in to business systems and applications.
According to research, stolen login credentials are the most
common means that hackers use to carry out data breaches.
There are many other attack vectors out there that
cybercriminals can use to gain access and steal passwords such
as stolen hardware, point of sale intrusions, web app attacks,
brute force attacks, and phishing attacks. Some users make
things easier for cyber attackers by keeping the same
passwords for a considerably long period, storing their
passwords in locations that are not secure, using the same
passwords in different applications, and going for weak
passwords. Thankfully, MFA comes in handy with an
additional protection layer that makes it easier to deal with
these problems. This technique addresses the ripple
implications of credentials that have been compromised
because even if malicious actors might steal users’ passwords
and usernames, they will be prompted to offer another factor
before being allowed to access sensitive data.
MFA is also important because based on recent surveys, the
most security and IT professionals think that it is the most
effective security control for both public cloud and on-
premises data. Additionally, many current MFA solutions that
are also available in the market are easy and fast to implement.
The solutions make it easy for companies to implement the
security controls without redirecting a lot of effort and time on
the same. That is beside the level of cost-effectiveness that
comes in handy with the same solutions.
Another vital significance of MFA authentication is that it
offers an excellent way of enabling enterprise mobility [28].
This is especially important since enterprise mobility is a
significant initiative that is prioritized by many companies that
are still undergoing digital transformation. The level of
productivity usually increases when workers or employees can
use devices that they prefer securely and easily to access
resources that they need to fulfill their tasks. The use of MFA
authentication to remotely log in to a network using virtual
private networks or long into business applications provides a
high level of flexibility. Besides, encouraging the use of MFA
at the organizational level is a clear indication that a firm is
committed to both network and data protection measures.
MFA is also important because it forms part of compliance
with specific geographical and industry regulations. For
instance, PCI-DSS requires the implementation of MFA on
specific instances to prevent unauthorized users and malicious
actors from accessing systems that are used to process payment
transactions. Additionally, MFA provides healthcare institu-
tions and providers to have the convenience of complying with
HIPAA. The authentication method is an integral part of
making sure that strong customer authentication has been met,
especially in financial institutions.
Authorized licensed use limited to: Bisha University. Downloaded on July 28,2021 at 11:34:13 UTC from IEEE Xplore. Restrictions apply.
MFA helps promote cybersecurity. As the scope and number
of cybercrimes continue to increase, enterprises are soon
starting to realize the scope of threats that they are facing. In
the world of today, cyber-attackers do not target large
organizations only. Approximately 31% of companies that have
less than 250 employees have been popular targets of
cybercrimes. It is equally vital to note that the intention of
cyber-attackers is not just stealing data. Some of them try to
destroy or corrupt it completely. Because of this concern, the
market for MFA is expected to hit about $12.51 billion in the
next four years.
Further, implementation of MFA is important when it comes
to setting security expectations [29]. Identification of
organizational security requirements is an integral part of any
implementation of MFA. For instance, it is important to
consider things like the business model, industry, type of
data that should be stored, utilized, or captured, and applicable
compliance regulations to attain normal business functions.
Implementation of MFA provides all organizations with the
opportunity to single out and classify typical business scenarios
depending on the level of risks and to figure out situations when
MFA should be applied. For example, based on different sets of
factors, companies could choose to use MFA when workers are
logging in remotely when specific databases or applications are
being accessed or for high-risk scenarios. Apart from that, MFA
could also be used to limit locations where users can access data
or information, thus enhancing access restriction measures.
G. Different Implementations of MFA
There are various ways of implementing MFA. Examples
include:
Using a TOTP. TOTP functions by generating a one-time
password from the current timestamp and shared secret key
using types of cryptographic function. Here, the cryptographic
functions tend to vary across the board. The use of SMS. Once
you try to log in to systems or resources, a text message with a
code is automatically sent to your phone. Because you are the
only person who has access to your phone, you will
automatically receive notification of any attempt made to log
into your system, resource, or account.
1) The use of email.
2) Push notifications.
H. Statistics and Numbers on Security
The field of IT is complex and subject to change. Any
security change has the potential of setting off a chain of
adjustments and tweaks that could irritate users. Streamlined
authentication processes help maintain productivity levels in the
IT sector as high as possible. That is why IT administrators are
encouraged to make sure that all emerging upgrades are
integrated to increase security. With MFA, IT administrators
have a unique opportunity of adapting the required level of
security support with the aid of contextual information like geo-
location and behavioral patterns.
Identity theft is a high-reward, low-risk, and easy type of
crime and threat to individuals and organizations. It is one of
the fastest-growing crimes that is increasingly becoming more
profitable compared to crimes that relate to drugs. Research
has shown that stolen and weak user credentials are important
weapons to hackers who have been using them in almost 95%
of all attacks that have been orchestrated on web applications.
Malicious actors seem to be on the winning side because
between 2013 and 2014, the total number of attack breaches
that ended up being successful had gone up by approximately
27.5%. Even though these breaches have been associated with
companies that bear household names, there has been a further
concern because out of all target attacks, about 31% have been
targeting business enterprises with less than 250 employees.
Advanced firewalls and anti-virus systems are as important as
vulnerability tests. However, the front door will always remain
open without proper user authentication. Password theft has
continued to evolve as attackers attempt to utilize highly
sophisticated techniques like pharming, phishing, and
keylogging. The bitter truth is that cyberattackers have been
trying to do more than just steal data.
They change services or programs, destroy data, or use
servers to transmit malicious code, spam, or propaganda.
I. Effectiveness of MFA
Many IT departments would agree that implementing MFA
across all APs could bolster organizational security. The prob-
lem is that the nature of MFAs could be tedious leaving some
people wondering about their effectiveness. Therefore, to truly
understand the effectiveness of multifactor authentications, it
is first important to develop a coherent understanding of how
hackers and other malicious actors engage in their activities in
the absence of MFA. In a nutshell, cyber-attackers are required
to access your password and username. Some of the typical
access techniques that hackers have been using to steal
sensitive information include:
1) Dark Web: In both small and large organizations, data
breaches can always mean that confidential information has
been made available on the Dark Web where people with
bad intentions can purchase or sell them. Such information
could be corporate login information or personal information
such as bank information, credit card numbers, driver’s license
information, and addresses.
2) Malware: There are different ways in which malware
can find its way into your computer. This could be through
thumb drives, network shares, attachments, websites, emails,
and so forth. The problem is that once malware has entered
your computer, it can do a lot of terrible things including a
keylogger that can be used to record anything that you type
and forwards them to cyberattackers. Logging in into a website
where the keylogger is active and running can only mean that
your password and username are going to be shared
immediately.
3) Social engineering: Just like phishing, social engineering
takes place when cyberattackers decide to impersonate other
people in an organization or corporation. Once they do so, they
Authorized licensed use limited to: Bisha University. Downloaded on July 28,2021 at 11:34:13 UTC from IEEE Xplore. Restrictions apply.
can then send you an email requesting that they are granted
access to resources like network servers. If the individual who
has been impersonated is a senior person, there are high chances
that those who have been tricked will share requested
information without asking a lot of questions.
4) Smishing/Phishing: Most phishing activities occur when
cyber criminals decide to send millions of emails to specific
individuals. These emails could be offering warnings about
compromised passwords, thus prompting the receivers to
change them. In such a case, the link that will be provided is
always fictitious and will make it possible to immediately gather
all login credentials that are shared. The malicious actors can
then attempt to use the credentials to gain access to sensitive
information of their victims including their banks. Smishing
works the same way except that initial messages come in form
of texts.
5) Brute Force: Brute force is an automated technique of
attempting thousands or hundreds of passwords to gain access
over a system. It is often based on personal information about
an individual such as anniversary dates, pet names, spouse
names, and birthdays as well as common passwords.
Thousands of people from different parts of the world
including prominent and intelligent ones get hacked every day
using either of the above methods. As soon as malicious actors
have been able to acquire your login credentials, they can cause
a lot of damage.
According to Microsoft, MFA blocks approximately 99% of
account hacking attempts. Users who want to prevent 99% of
automated attacks should consider implementing MFA because
it does the trick well. This strategy is not just effective for
Microsoft accounts only, but also for other accounts. That is
why it is highly encouraged that MFA is enabled regardless of
whether there are complex or simple security measures in place.
The advice was further echoed by Google by encouraging users
who were using the phone number for account recovery
purposes because the rationale helps strengthen the security of
their accounts. That among others is a clear indication of the
overall effectiveness of MFA.
MFA is an effective and proven technique than just using
credentials. Its effectiveness revolves around the fact that
whereas malicious actors might obtain users credentials
through credential stuffing or phishing attempts, they cannot
easily obtain second verification. The method is an integral
aspect of zero-trust security and requires that users should offer
at least two credentials if they want to gain access to sensitive
information and resources. So far, this form of security
approach has been proved to protect resources, sensi- tive
information, accounts, and so forth from cyber-attackers. MFA
functions by preventing attacks that could result from
cybercriminals attempting to guess or obtain users’ credentials.
The effectiveness of MFA is further demonstrated through its
applicability in various industries including education,
communication and media, technology, and financial services,
among others. Being a process whereby users are required to
pass at least two authentication levels to access information,
resources, accounts, or data, MFA has continued to gain
popularity. It has become increasingly important to implement
MFA, especially now that companies are facing cyber threats
of different scopes and nature. The chances of suffering from
cyber-attacks will usually decrease by adding another security
layer. Essentially, this is because of the difficulty that is
associated with attempts to surpass multiple levels of
authentication.
IV. RESULTS
1) Proof of Concept: There was a demonstration of how
fake domains and social engineering could be used to bypass
the use of passwords. To address this concern, further research
was conducted to determine the effectiveness of the 2FA
technique. Even though 2FA has some weaknesses that could
be explored through push notifications, the security approach
emerged as an excellent first step that can help keep attackers
at bay. In this research, evaluations were made on IoT servers
and IoT devices that had been configured using 2FA, and
results documented. It emerged that in as much as this research
was seeking a basis for assessing the effectiveness of security
keys in the authentication of IoT servers and IoT devices, the
core objectives were met. 2FA comes in handy with the
scalability and adaptability that can enable both organizations
and individuals to meet their security needs.
2) Research Evaluation: This prototype that came up in this
study was evaluated based on the dominant nature of the use of
passwords. Whereas some people go for weak passwords that
could be compromised easily using brute force and dictionary
attacks, 2FA enhances the effectiveness of promoting security.
An evaluation about the scope of the use of 2FA was conducted
and the extent to which the security approach is being adopted
and implemented assessed even further. Two models were used
to help bolster the testability of the authentication technique in
the light of similar research that has thus far been carried out
by other scholars. It emerged that as contrasted to overreliance
on the use of passwords, it appeared that many users find it
more secure to use 2FA. Therefore, it will be especially vital
to encourage users to start accepting the use of this
authentication approach.
V. CONCLUSION
To sum up, MFA is one of the proven approaches that could
be used to increase cybersecurity. Even though passwords play
an integral part in promoting security, they are not entirely
infallible. Cyber-attackers can use different methods to
compromise, steal, or guess your passwords. However, MFA
can assist significantly because it makes it more challenging
for malicious actors to access accounts or devices. That is why
many companies have been providing MFA features in most of
their product offerings.
VI. NOMENCLATURE
Internet of Things (IoT)
Information Technology (IT)
Public Key Infrastructure (PKI)
Authorized licensed use limited to: Bisha University. Downloaded on July 28,2021 at 11:34:13 UTC from IEEE Xplore. Restrictions apply.
Multi-factor Authentications (MFA)
Electronic Mail (email)
Short Message Service (SMS)
Time-based One-Time Password (TOTP)
Software-as-a-Service (SaaS)
Platform-as-a-Service (PaaS)
Infrastructure-as-a-Service (IaaS)
Access Points (APs)
Two-Factor-Authentication (2FA)
Internet Protocol (IP)
Information and Communications Technology (ICT)
Wide Area Network (WAN)
Distributed Denial of Service (DDoS)
Denial of Services (DoS)
ACKNOWLEDGMENT
I wish to thank my parents for their support and encour-
agement throughout my studies and special thanks to my
respected supervisor Dr. Mohammad Tabrez Quasim.
REFERENCES
[1] T. Shah and S. Venkatesan, “Authentication of IoT Device and IoT Server
Using Secure Vaults,” Proceedings 17th IEEE International Conference
on Trust, Security and Privacy in Computing and Commu- nications and
12th IEEE International Conference on Big Data Science and
Engineering, pp. 819–824, 2018.
[2] H. Alqarni, W. Alnahari, and M.T. Quasim, “Internet of things (IoT)
security requirements: Issues related to sensors,” 2021 National Com-
puting Colleges Conference (NCCC, 2021.
[3] G. Cheng, H. Xie, and D. Zhang, “Analyzing the Chain of Trust Model
Based on Entity Dependence,” Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and Lecture
Notes in Bioinformatics) 12472 LNCS, pp. 146–159, 2020.
[4] S. Y. Chau, O. Chowdhury, E. Hoque, H. Ge, A. Kate, C. Nitarotaru, and
N. Li, “SymCerts: Practical Symbolic Execution for Exposing Noncom-
pliance in X.509 Certificate Validation Implementations,” Proceedings
IEEE Symposium on Security and Privacy, pp. 503–520, 2017.
[5] S. B. Roosa and S. Schultze, “Trust Darknet: Control and Compromise
in the Internet’s Certificate Authority Model,” IEEE Internet Computing,
vol. 17, no. 3, pp. 18–25, 2013. [Online].
Available: 10.1109/mic.2013.27;https://dx.doi.org/10.1109/mic.2013.27
[6] M. A. Khan, M. T. Quasim, N. S. Alghamdi and M. Y. Khan, "A Secure
Framework for Authentication and Encryption Using Improved ECC for
IoT-Based Medical Sensor Data," in IEEE Access, vol. 8, pp. 52018-
52027, 2020. DOI: 10.1109/ACCESS.2020.2980739
[7] M. T. Quasim, M. A. Khan, M. Abdullah, M. Meraj, S. P. Singh and P.
Johri, "Internet of Things for Smart Healthcare: A Hardware Perspective,"
2019 First International Conference of Intelligent Computing and
Engineering (ICOICE), Hadhramout, Yemen, 2019, pp. 1-5. DOI:
10.1109/ICOICE48418.2019.9035175
[8] M. Meraj, S. P. Singh, P. Johri and M. T. Quasim, "An investigation on
infectious disease patterns using Internet of Things (IoT)," 2020
International Conference on Smart Technologies in Computing, Electrical
and Electronics (ICSTCEE), Bengaluru, 2020, pp. 599-604, doi:
10.1109/ICSTCEE49637.2020.9276922.
[9] M. A. Khan, M. T. Quasim, F. Algarni and A. Alharthi, "Internet of Things:
On the Opportunities, Applications and Open Challenges in Saudi Arabia,"
2019 International Conference on Advances in the Emerging Computing
Technologies (AECT), Al Madinah Al Munawwarah, Saudi Arabia, 2020,
pp. 1-5, doi: 10.1109/AECT47998.2020.9194213.
[10] I. B. Guirat and H. Halpin, “Formal verification of the w3c web
authentication protocol,” ACM International Conference Proceeding
Series, 2018.
[11] M. Joye and Y. Michalevsky, “RSA signatures under hardware re-
strictions,” Proceedings of the ACM Conference on Computer and
Communications Security, pp. 51–54, 2018.
[12] C. D. Omorog, B. D. Gerardo, and R. P. Medina, “The performance of
blum-blum-shub elliptic curve Pseudorandom Number Generator as WiFi
protected access 2 security key generator,” ACM International Conference
Proceeding Series, pp. 23–28, 2018.
[13] D. Strobel, D. Oswald, B. Richter, F. Schellenberg, and C. Paar,
“Microcontrollers as (In)Security Devices for Pervasive Computing
Applications,” Proceedings of the IEEE, vol. 102, no. 8, pp. 1157–
1173, 2014. [Online]. Available: 10.1109/jproc.2014.2325397;https:
//dx.doi.org/10.1109/jproc.2014.2325397
[14] Quasim M.T., Khan M.A., Algarni F., Alshahrani M.M. (2021)
Fundamentals of Smart Cities. In: Khan M.A., Algarni F., Quasim M.T.
(eds) Smart Cities: A Data Analytics Perspective. Lecture Notes in
Intelligent Transportation and Infrastructure. Springer, Cham.
https://doi.org/10.1007/978-3-030-60922-1_1
[15] Quasim M.T., Khan M.A., Algarni F., Alharthy A., Alshmrani G.M.M.
(2020) Blockchain Frameworks. In: Khan M., Quasim M., Algarni F.,
Alharthi A. (eds) Decentralised Internet of Things. Studies in Big Data, vol
71. Springer, DOI: https://doi.org/10.1007/978-3-030-38677-1
[16] M. T. Quasim, A. A. E. Radwan, G. M. M. Alshmrani and M. Meraj,
"A Blockchain Framework for Secure Electronic Health Records in
Healthcare Industry," 2020 International Conference on Smart
Technologies in Computing, Electrical and Electronics (ICSTCEE),
Bengaluru, 2020, pp. 605-609, doi:
10.1109/ICSTCEE49637.2020.9277193.
[17] A. Mukherjee, P. Goswami, M. A. Khan, L. Manman, L. Yang and P.
Pillai, "Energy Efficient Resource Allocation strategy in Massive IoT
for Industrial 6G Applications," in IEEE Internet of Things Journal,
doi: 10.1109/JIOT.2020.3035608.
[18] S. Verma, S. Kaur, M. A. Khan and P. S. Sehdev, "Towards Green
Communication in 6G-enabled Massive Internet of Things," in IEEE
Internet of Things Journal, doi: 10.1109/JIOT.2020.3038804..
[19] Mohammad Ayoub Khan, et. al, Decentralised IoT, Decenetralised
IoT: A Blockchain perspective, Springer, Studies in BigData, 2020,
DOI: https://doi.org/10.1007/978-3-030-38677-1
[20] Quasim M.T., Khan M.A., Algarni F., Alshahrani M.M. (2021)
Fundamentals of Smart Cities. In: Khan M.A., Algarni F., Quasim M.T.
(eds) Smart Cities: A Data Analytics Perspective. Lecture Notes in
Intelligent Transportation and Infrastructure. Springer, Cham.
https://doi.org/10.1007/978-3-030-60922-1_1Khan, M. A., Quasim,
M. T., Algarni, F., & Alharthi, A. (2020). Decentralised Internet of
Things: A blockchain perspective. https://doi.org/10.1007/978-3-030-
38677-1. ISBN: 978-3-030-38676-4.
[21] S. Yangui, P. Ravindran, O. Bibani, R. H. Glitho, N. B. Hadjalouane,
M. J. Morrow, and P. A. Polakos, “A platform as-a-service for hybrid
cloud/fog environments,” 2016 IEEE International Symposium on
Local and Metropolitan Area Networks (LANMAN), pp. 1–7, 2016.
[22] S. Das, B. Wang, Z. Tingle, and L. J. Camp, 2019.
[23] S. Ibrokhimov, K. L. Hui, A. A. Al-Absi, H. J. Lee, and M. Sain,
“Multi- Factor Authentication in Cyber Physical System: A State of
Art Survey,” Advanced Communication Technology, pp. 279–284,
2019.
[24] I. Vakilinia, S. Cheung, and S. Sengupta, “Sharing Susceptible Pass-
words as Cyber Threat Intelli gence Feed,” Proceedings IEEE
Military Communications Conference MILCOM 2019-Octob, pp.
774–779, 2019.
[25] C. Sudhanshu and N. K, 2015.
[26] D. Dasgupta, A. Roy, and A. Nag, 2017.
[27] A. Acar, W. Liu, R. Beyah, K. Akkaya, and A. S. Uluagac, “A
privacy- preserving multifactor authentication system,” Security and
Privacy, vol. 2, pp. 1–19, 2019.
[28] A. Henricks and H. Kettani, “On Data Protection Using MultiFactor
Authentication,” ACM International Conference Proceeding Series,
pp. 1–4, 2019
Authorized licensed use limited to: Bisha University. Downloaded on July 28,2021 at 11:34:13 UTC from IEEE Xplore. Restrictions apply.
... But their rising prominence also poses security risks. One of the most significant security risks confronting the Internet of Things is device forging or impersonation, which may be prevented via schemes based on a single authentication factor [4]. It is difficult to define a lightweight mutual authentication system that protects against current threats [4]. ...
... One of the most significant security risks confronting the Internet of Things is device forging or impersonation, which may be prevented via schemes based on a single authentication factor [4]. It is difficult to define a lightweight mutual authentication system that protects against current threats [4]. ...
... The authors present a two-factor, lightweight mutual authentication approach for IoT entities, applicable to device, control, aggregation node, gateway, and server levels [4]. The solution uses knowledge-based (passwords or PINs), possession-based (physical tokens or OTP generators), and biometric (facial or fingerprint) authentication elements [4]. ...
Article
Full-text available
The Internet of Things (IoT) phenomenon is centered around linking various devices and objects to the Internet, enabling them to communicate, collect, and exchange data [1]. The IoT needs strong, lightweight, and secure authorization schemes to regulate many devices with varying levels of ability. Quantum-resilient federated Multi-Factor Authentication (QRF-MFA) is a solution presented in this paper to address the above-discussed issues. Featuring quantum-resistant cryptographic protocols, high-speed and low-energy Physically Unclonable Functions (PUFs), decentralized identity management, and optimized communication protocols, QRF-MFA provides a complete solution for secure cross-domain device identification and authentication. This is done by leveraging blockchain technology for immutable and transparent management of identities yet limiting on-chain storage overhead. It also provides secure, lightweight communication well-suited for resource constrained IIoT devices, and it is designed for fog and edge computing environments as well. QRF-MFA eliminates the challenges of current methods by combining security, efficiency, and scalability and delivering a resilient and future-ready solution to secure IIoT authentication.
... As the use of IoT devices and networks grows, prioritizing security becomes crucial to safeguard sensitive data and prevent unauthorized access. A key aspect of securing IoT devices and networks is the implementation of strong authentication protocols and access controls [87]. By using robust authentication mechanisms, such as two factor authentication or biometric verification, the risk of unauthorised access can be significantly reduced [88]. ...
Article
Full-text available
The Internet of Things (IoT) is a rapidly evolving technology that is disrupting industries and transforming lifestyles. This promising technology offers numerous benefits, but it also raises important questions and challenges. This article aims to explore how IoT can revolutionize connectivity and automation in different domains, as well as the challenges and implications to consider for responsible development and adoption of this technology. It provides an in-depth exploration of IoT technology, from its definition and components to its current applications. It also addresses potential security issues associated with IoT and the measures that can be taken to mitigate them. Finally, it explores the various ways in which IoT can be applied to improve our lives. This research aims to contribute to the understanding of the IoT and its potential impact on society.
... Gathering UE identity information and gathering UE network information target information, including credentials of personal data such as e-mail addresses and IDs, and network data such as IP address ranges and domain names, can use the information to make other attacks. In gather UE identity information, the keywords associated with attack include identity, credentials, personal and business accounts, e-mail addresses, employee names [95][96][97][98][99]. In gather UE network information, the keywords associated with attack include administrative data, network domain, gather DNS, network trust dependencies, network topologies, IP addresses, network security appliances [88,[100][101][102][103][104]. ...
Article
Full-text available
Internet of Things (IoT) devices are much closer to users than personal computers used in traditional computing environments. Due to prevalence of IoT devices, even if they are compromised and used in attacks, it is difficult to detect and respond to them. Currently, there has been extensive research on threat modeling for cyberattacks. However, there remains a significant gap in research concerning threat modeling for attacks specially targeting IoT devices within the fifth-generation communication environment. In this paper, we present IoT Targeting-Threat Modeling(I3TM) framework established by analyzing botnets that are appeared before 2021 such as Mirai, Pink etc. Through this framework, we identify tactics and techniques to respond to the attacks. Using the identified tactics and techniques from our proposed framework, we can promptly respond to the newly detected attacks. We constructed a Threat Modeling Framework Keyword-Based Metrics to show extracted keywords from reports, academic papers, and white paper that identifies the features of botnet. We also provide an objective way to apply those keywords to the framework. Our framework is organized to analyze the attack process of botnets that may occur against IoT. The framework derives execution for each tactic for objective analysis based on keywords. In the validation for the framework, I3TM identified eight Tactics from Medusa botnet. If the application of the I3TM framework is continuously accumulated, a baseline of similar attack methods and data will be formed. In future research, we are planning to append mitigations for the attacks targeting IoT to the I3TM framework.
... Due to resource constraints, IoT devices often lack the capacity to support complex security schemes [Roy et al. 2018]. In order to ensure security, it is important to have mechanisms for authentication in place to verify the entities legitimacy [Alnahari and Quasim 2021]. ...
Conference Paper
Full-text available
Authenticity represents an essential facet of information security explored across various Information Systems (IS), including Internet of Things (IoT) devices in Industry 4.0. However, deploying authentication mechanisms in specific IoT devices poses significant challenges, particularly for those with energy, memory, and computational power constraints. Given this context, this ongoing research project aims to compare conventional authentication mechanisms for low-resource IoT devices and identify the most efficient one among them. As an initial result, this paper aims to present our methodological scope and discuss preliminary empirical results derived from a computational experiment using the Non Interactive Zero Knowledge Proofs (NIZKP), algorithm in Arduino Nano. This research seeks to enhance the comprehension of authentication mechanisms in low-resource IoT devices, thus facilitating better decision-making processes in IS settings and contributing to academia and practice.
Chapter
New technologies like blockchain and Internet of Things (IoT) are constantly improving the state-of-the-art in healthcare services. The trend of keeping medical records in digital formats is also increasing the reliance of modern healthcare service providers on these new technologies. This edited book brings a collection of reviews on blockchain and IoT technologies that are driving innovation in digital and smart healthcare systems. The editors bring an academic and practical approach to assist professionals and readers in understanding computerized healthcare solutions. 16 referenced chapters provide knowledge about fundamental framework, research insights, and empirical evidence for effective smart healthcare applications. The chapters also cover benefits and challenges of specific smart health frameworks, giving an informative overview of the subject. Key themes of the book include: 1. Technological Foundations for Smart Healthcare 2. Blockchain Applications in Healthcare 3. Internet of Things (IoT) in Healthcare 4. Artificial Intelligence (AI) Integration 5. Security, Privacy, and Authentication 6. Medical Imaging and Deep Learning 7. Telemedicine The content in the book is designed to help administrators and healthcare professionals to understand the basics of blockchain tech and IoT in smart healthcare systems and strengthen the competitive advantage of their clinics.
Article
Full-text available
In the evolving landscape of smart libraries, this research pioneers an IoT-based low-cost architecture utilizing Software-Defined Networking (SDN). The increasing demand for more efficient and economical solutions in library management, particularly in the realm of RFID-based processes such as authentication, property circulation, and book loans, underscores the significance of this study. Leveraging the collaborative potential of IoT and SDN technologies, our proposed system introduces a fresh perspective to tackle these challenges and advance intelligent library management. In response to the evolving landscape of smart libraries, our research presents an Internet of Things (IoT)-based low-cost architecture utilizing SDN. The exploration of this architectural paradigm arises from a recognized gap in the existing literature, pointing towards the necessity for more efficient and cost-effective solutions in managing library processes. Our proposed algorithm integrates IoT and SDN technologies to intelligently oversee various library activities, specifically targeting RFID-based processes such as authentication, property circulation management, and book loan management. The system's architecture, encompasses components like the data center, SDN controllers, RFID tags, tag readers, and other network sensors. By leveraging the synergy between RFID and SDN, our innovative approach reduces the need for constant operator supervision in libraries. The scalability and software-oriented nature of the architecture cater to extensive library environments. Our study includes a two-phase investigation, combining practical implementation in a small-scale library with a simulation environment using MATLAB 2021. This research not only fills a crucial gap in current knowledge but also lays the foundation for future advancements in the integration of IoT and SDN technologies for intelligent library management.
Conference Paper
Full-text available
Multi-Factor Authentication (MFA) has been around for three decades and now authentication and security has taken priority in securing data. Cyber-attacks have become widely popular and successful because organizations are poorly prepared to handle cyber security operations. These organizations hold critical information about employees, customers and patients. Adding additional security methods like MFA makes it more difficult for attackers to successfully exfiltrate data and cause additional damage. The methods of MFA can be used in combination to successfully secure data and provide adequate authentication practices. In this paper, we discuss the implementations of MFA, privacy behind using more than one authentication method and also the security concerns related to MFA. We also reveal the flaws of MFA systems and discuss how these flaws can result in a security breach.
Chapter
The concept of smart cities is getting popularity day by day. Many countries have started adopting the idea of smart city to improve the quality of life by achieving the recommended level of sustainable development. The smart city is a technologically advanced area which could understand the world by analyzing the data in order to improve living conditions. The underlying technology infrastructure of smart cities are wireless sensor network (WSN), Internet of thing (IoT), RFID, and 6G are among others. Along with the technology, the role of machine learning and data analytics can’t be ignored. The smart cities generate massive amount of data from the monitoring equipments and sensors. Big data analytics is one of the important technologies which is capable of improving intelligent urban facilities. In smart cities large amount of data is continuously received from many sensors, autonomous machines or intelligent IoT devices. The accurate prediction depends on the approaches of data analytics and machine learning techniques. This chapter presents fundamental of smart cities, vertical in smart cities and data analytics approaches.
Chapter
This paper provides a chain of trust model in line with the TCG trust concepts. This model gives a formal definition and proof of trust state, trust root and trust measurement and chain of trust by the concept of Smith’s entity dependence and the assumption that the authenticity can measure the entity’s conduct with accuracy. The model is universal, which can provide a theoretical basis for assessing the existing trusted computing platform, and provide theoretical support for the future research on how to build a more reasonable chain of trust.
Article
Sixth Generation (6G) is envisioned to be a spawned key technology that will support the ubiquitous and seamless connection of a massive number of Internet of Things (IoT) devices. The extremely high data rate, low end-to-end delay, high mobility of IoT devices propel the desideratum of extenuating the concern of reducing the energy consumption i.e., green communication. Hence, in this paper, we address the concern of green communication in 6G-enabled massive IoT devices by following the cluster-based data dissemination in the network. We propose a novel Hybrid Whale Spotted Hyena Optimization (HWSHO) algorithm by synthesizing the Whale Optimizer Algorithm (WOA) with exploitation capabilities of Spotted Hyena Optimizer (SHO). We perform simulation experimental study that shows the supreme performance of our proposed technique over the most recent proposed energy efficient data dissemination methods. The proposed technique is an exemplary solution that could be pertinent to various hostile applications seeking green communication of 6G-enabled IoT devices.
Article
The birth of beyond 5G (B5G) and emerge of 6G has made personal and industrial operations more reliable, efficient, and profitable, accelerating the development of the next-generation Internet of Things (IoT). We know, one of the most important key performance indicators in 6G is smart network architecture, and in massive IoT applications, energy efficient ubiquity networks rely mainly on the intelligence and automation for industrial applications. This paper addresses the energy consumption problem with a massive IoT system model with dynamic network architecture or clustering using a multi-agent system (MAS) for industrial 6G applications. The work uses distributed artificial intelligence (DAI) to cluster the sensor nodes in the system to find the main node and predict its location. The work initially uses the back-propagation neural network (BPNN) and convolutional neural network (CNN), which are respectively introduced for optimization. Furthermore, the work analyze the correlation of mutual clusters to allocate resources to individual nodes in each cluster efficiently. The simulation results show that the proposed method reduces the waste of resources caused by redundant data, improves the energy efficiency of the whole network, along with information preservation.
Conference Paper
With the fast of ultra-fast 5G/6G mobile wireless, Artificial Intelligence (AI), and Big Data analytics, the Internet of Things (IoT) is getting great attention in healthcare industry. The combing of these powerful technologies with the Internet of Things will likely revolutionize the healthcare industry in next few years. The growth of IoT in healthcare industry using these latest technologies will transform the way patients are monitored and treated remotely to improve the productivity of the healthcare industry workers. This paper presents the state-of-the-art research relating to IoT and Health care with focus on hardware requirements, complexity and challenges.