This document presents a research paper that proposes a signature-based data security and authentication framework for Internet of Things (IoT) applications. The paper introduces a novel computational model that establishes a unique authentication process using a simplified encryption strategy. The model considers both local and global IoT environments and implements an authentication mechanism using challenge-response exchanges between communicating nodes. A digital signature is generated using parameters like random seeds, secret keys, prime values, and data packets. Simulation results show that the proposed system offers efficient security and data transmission performance in the presence of unknown adversaries, performing better than commonly used security solutions in vulnerable IoT environments.
Novel authentication framework for securing communication in internet-of-things IJECEIAES
Internet-of-Things (IoT) offers a big boon towards a massive network of connected devices and is considered to offer coverage to an exponential number of the smart appliance in the very near future. Owing to the nascent stage of evolution of IoT, it is shrouded by security loopholes because of various reasons. Review of existing research-based solution highlights the usage of conventional cryptographic-based solution over the traditional mechanism of data forwarding process between IoT nodes and gateway. The proposed system presents a novel solution to this problem by a model that is capable of performing a highly secured and cost-effective authentication process. The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats. The outcome of the model shows better security strength with faster response time and energy saving of the IoT nodes.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Privacy-aware secured discrete framework in wireless sensor networkIJECEIAES
Rapid expansion of wireless sensor network-internet of things (WSN-IoT) in terms of application and technologies has led to wide research considering efficiency and security aspects. Considering the efficiency approach such as data aggregation along with consensus mechanism has been one of the efficient and secure approaches, however, privacy has been one of major concern and it remains an open issue due to low classification and high misclassification rate. This research work presents the privacy and reliable aware discrete (PRD-aggregation) framework to protect and secure the privacy of the node. It works by initializing the particular variable for each node and defining the threshold; further nodes update their state through the functions, and later consensus is developed among the sensor nodes, which further updates. The novelty of PRD is discretized transmission for efficiency and security. PRD-aggregation offers reliability through efficient termination criteria and avoidance of transmission failure. PRD-aggregation framework is evaluated considering the number of deceptive nodes for securing the node in the network. Furthermore, comparative analysis proves the marginal improvisation in terms of discussed parameter against the existing protocol.
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena.
Network security is one of the foremost anxieties of the modern time. Over
the previous years, numerous studies have been accompanied on the
intrusion detection system. However, network security is one of the foremost
apprehensions of the modern era this is due to the speedy development and
substantial usage of altered technologies over the past period. The
vulnerabilities of these technologies security have become a main dispute
intrusion detection system is used to classify unapproved access and unusual
attacks over the secured networks. For the implementation of intrusion
detection system different approaches are used machine learning technique
is one of them. In order to comprehend the present station of application of
machine learning techniques for solving the intrusion discovery anomalies in
internet of thing (IoT) based big data this review paper conducted. Total 55
papers are summarized from 2010 and 2021 which were centering on the
manner of the single, hybrid and collaborative classifier design. This review
paper also includes some of the basic information like IoT, big data, and
machine learning approaches are discussed.
Novel authentication framework for securing communication in internet-of-things IJECEIAES
Internet-of-Things (IoT) offers a big boon towards a massive network of connected devices and is considered to offer coverage to an exponential number of the smart appliance in the very near future. Owing to the nascent stage of evolution of IoT, it is shrouded by security loopholes because of various reasons. Review of existing research-based solution highlights the usage of conventional cryptographic-based solution over the traditional mechanism of data forwarding process between IoT nodes and gateway. The proposed system presents a novel solution to this problem by a model that is capable of performing a highly secured and cost-effective authentication process. The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats. The outcome of the model shows better security strength with faster response time and energy saving of the IoT nodes.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Privacy-aware secured discrete framework in wireless sensor networkIJECEIAES
Rapid expansion of wireless sensor network-internet of things (WSN-IoT) in terms of application and technologies has led to wide research considering efficiency and security aspects. Considering the efficiency approach such as data aggregation along with consensus mechanism has been one of the efficient and secure approaches, however, privacy has been one of major concern and it remains an open issue due to low classification and high misclassification rate. This research work presents the privacy and reliable aware discrete (PRD-aggregation) framework to protect and secure the privacy of the node. It works by initializing the particular variable for each node and defining the threshold; further nodes update their state through the functions, and later consensus is developed among the sensor nodes, which further updates. The novelty of PRD is discretized transmission for efficiency and security. PRD-aggregation offers reliability through efficient termination criteria and avoidance of transmission failure. PRD-aggregation framework is evaluated considering the number of deceptive nodes for securing the node in the network. Furthermore, comparative analysis proves the marginal improvisation in terms of discussed parameter against the existing protocol.
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena.
Network security is one of the foremost anxieties of the modern time. Over
the previous years, numerous studies have been accompanied on the
intrusion detection system. However, network security is one of the foremost
apprehensions of the modern era this is due to the speedy development and
substantial usage of altered technologies over the past period. The
vulnerabilities of these technologies security have become a main dispute
intrusion detection system is used to classify unapproved access and unusual
attacks over the secured networks. For the implementation of intrusion
detection system different approaches are used machine learning technique
is one of them. In order to comprehend the present station of application of
machine learning techniques for solving the intrusion discovery anomalies in
internet of thing (IoT) based big data this review paper conducted. Total 55
papers are summarized from 2010 and 2021 which were centering on the
manner of the single, hybrid and collaborative classifier design. This review
paper also includes some of the basic information like IoT, big data, and
machine learning approaches are discussed.
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSIJCNCJournal
Internet of things (IoT) is the integration of computer-based systems and the physical world in which things
interact with each other. Due to heterogeneity and resource-constrained feature of IoT devices, there are
many privacy and security challenges resulting in many threat vulnerabilities in IoT environments. After
reviewing and analyzing the recent IoT security, privacy, and authentication protocols, we will withdraw
research gaps focused on the elimination of human factors in IoT authentication. In order to fill these
research gaps, this paper proposes a privacy-preserving machine authenticated key agreement based on
IoT, denoted as IoTMAKA. IoTMAKA uses dynamic identity and machine fingerprint to provide security and
privacy. Security analysis shows that IoTMAKA provides anonymity and untraceability, provides freshness,
and is secure against passive and active attacks. IoTMAKA reduces communication overheads by 20% and
computational overheads by 25% on average as compared to the previous related works.
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
Multi-stage secure clusterhead selection using discrete rule-set against unkn...IJECEIAES
Security is the rising concern of the wireless network as there are various forms of reonfigurable network that is arised from it. Wireless sensor network (WSN) is one such example that is found to be an integral part of cyber-physical system in upcoming times. After reviewing the existing system, it can be seen that there are less dominant and robust solutions towards mitigating the threats of upcoming applications of WSN. Therefore, this paper introduces a simple and cost-effective modelling of a security system that offers security by ensuring secure selection of clusterhead during the data aggregation process in WSN. The proposed system also makes construct a rule-set in order to learn the nature of the communication iin order to have a discrete knowledge about the intensity of adversaries. With an aid of simulation-based approach over MEMSIC nodes, the proposed system was proven to offer reduced energy consumption with good data delivery performance in contrast to existing approach.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
A review on machine learning based intrusion detection system for internet of...IJECEIAES
Within an internet of things (IoT) environment, the fundamental purpose of various devices is to gather the abundant amount of data that is being generated and then transmit this data to the predetermined server over the internet. IoT connects billions of objects and the internet to communicate without human intervention. But network security and privacy issues are increasing very fast, in today's world. Because of the prevalence of technological advancement in regular activities, internet security has evolved into a necessary requirement. Because technology is integrated into every aspect of contemporary life, cyberattacks on the internet of things represent a bigger danger than attacks against traditional networks. Researchers have found that combining machine learning techniques into an intrusion detection system (IDS) is an efficient way to get beyond the limitations of conventional IDSs in an IoT context. This research presents a comprehensive literature assessment and develops an intrusion detection system that makes use of machine learning techniques to address security problems in an IoT environment. Along with a comprehensive look at the state of the art in terms of intrusion detection systems for IoT-enabled environments, this study also examines the attributes of approaches, common datasets, and existing methods utilized to construct such systems.
Efficient network management and security in 5G enabled internet of things us...IJECEIAES
The rise of fifth generation (5G) networks and the proliferation of internet- of-things (IoT) devices have created new opportunities for innovation and increased connectivity. However, this growth has also brought forth several challenges related to network management and security. Based on the review of literature it has been identified that majority of existing research work are limited to either addressing the network management issue or security concerns. In this paper, the proposed work has presented an integrated framework to address both network management and security concerns in 5G internet-of-things (IoT) network using a deep learning algorithm. Firstly, a joint approach of attention mechanism and long short-term memory (LSTM) model is proposed to forecast network traffic and optimization of network resources in a, service-based and user-oriented manner. The second contribution is development of reliable network attack detection system using autoencoder mechanism. Finally, a contextual model of 5G-IoT is discussed to demonstrate the scope of the proposed models quantifying the network behavior to drive predictive decision making in network resources and attack detection with performance guarantees. The experiments are conducted with respect to various statistical error analysis and other performance indicators to assess prediction capability of both traffic forecasting and attack detection model.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
Comprehensive Survey on Security Problems and Key Technologies of the Interne...RSIS International
Internet of things (IoT) is a collection of many
interconnected objects, services, humans, and devices that can
communicate, share data, and information to achieve a common
goal in different areas and applications. The vision of IoT is to
enable devices to collaborate with each other on the Internet. IoT
security focuses on authentication and access control protocols.
IoT security is the area with protection connected devices and
networks. There are many key challenges in designing a secure
IoT: Privacy, Authentication, Access Control, Trust,
Confidentiality, Mobile Security, etc. Attacks on IoT security
devices are physical attacks, side channel attacks, cryptanalysis
attacks, software attacks, network attacks. This paper describes
Security Problems of IoT, Security issues and Key Technologies
of IoT.
Comprehensive survey on security problems and key technologies of the interne...RSIS International
Internet of things (IoT) is a collection of many
interconnected objects, services, humans, and devices that can
communicate, share data, and information to achieve a common
goal in different areas and applications. The vision of IoT is to
enable devices to collaborate with each other on the Internet. IoT
security focuses on authentication and access control protocols.
IoT security is the area with protection connected devices and
networks. There are many key challenges in designing a secure
IoT: Privacy, Authentication, Access Control, Trust,
Confidentiality, Mobile Security, etc. Attacks on IoT security
devices are physical attacks, side channel attacks, cryptanalysis
attacks, software attacks, network attacks. This paper describes
Security Problems of IoT, Security issues and Key Technologies
of IoT.
Internet of things-blockchain lightweight cryptography to data security and ...IJECEIAES
The industrial internet of things (IoT) plays a major role in the growth of automation and increasing digital connectivity for machine-to-machine communication. The research community has extensively investigated the possibility of IoT and blockchain integration for the last couple of years. The major research is focused on the benefits of integrating blockchain with IoT. In this work, we first focus on the issue of integrating IoT nodes with blockchain networks, especially for non-real-time IoT nodes that do not have an in-built clock mechanism. As a result, they cannot establish communication with real-time blockchain networks. Another critical security issue is protecting data coming from IoT devices to blockchain networks. Blockchain is enough mature to protect the data in its ecosystem. However, information coming from outside of the world does not have any guarantee of data integrity and security. This paper first addresses the clock synchronization issue of IoT nodes with blockchain using a network time protocol and then proposes an IoT-blockchain light-weight cryptographic (IBLWC) approach to secure the entire IoT-blockchain ecosystem. This paper also presents the performance analysis of IBLWC as a suitable and cost-effective solution that incurs less processing overhead for IoTblockchain-based applications.
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
MEKDA: MULTI-LEVEL ECC BASED KEY DISTRIBUTION AND AUTHENTICATION IN INTERNET ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
More Related Content
Similar to A signature-based data security and authentication framework for internet of things applications
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSIJCNCJournal
Internet of things (IoT) is the integration of computer-based systems and the physical world in which things
interact with each other. Due to heterogeneity and resource-constrained feature of IoT devices, there are
many privacy and security challenges resulting in many threat vulnerabilities in IoT environments. After
reviewing and analyzing the recent IoT security, privacy, and authentication protocols, we will withdraw
research gaps focused on the elimination of human factors in IoT authentication. In order to fill these
research gaps, this paper proposes a privacy-preserving machine authenticated key agreement based on
IoT, denoted as IoTMAKA. IoTMAKA uses dynamic identity and machine fingerprint to provide security and
privacy. Security analysis shows that IoTMAKA provides anonymity and untraceability, provides freshness,
and is secure against passive and active attacks. IoTMAKA reduces communication overheads by 20% and
computational overheads by 25% on average as compared to the previous related works.
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
Multi-stage secure clusterhead selection using discrete rule-set against unkn...IJECEIAES
Security is the rising concern of the wireless network as there are various forms of reonfigurable network that is arised from it. Wireless sensor network (WSN) is one such example that is found to be an integral part of cyber-physical system in upcoming times. After reviewing the existing system, it can be seen that there are less dominant and robust solutions towards mitigating the threats of upcoming applications of WSN. Therefore, this paper introduces a simple and cost-effective modelling of a security system that offers security by ensuring secure selection of clusterhead during the data aggregation process in WSN. The proposed system also makes construct a rule-set in order to learn the nature of the communication iin order to have a discrete knowledge about the intensity of adversaries. With an aid of simulation-based approach over MEMSIC nodes, the proposed system was proven to offer reduced energy consumption with good data delivery performance in contrast to existing approach.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
A review on machine learning based intrusion detection system for internet of...IJECEIAES
Within an internet of things (IoT) environment, the fundamental purpose of various devices is to gather the abundant amount of data that is being generated and then transmit this data to the predetermined server over the internet. IoT connects billions of objects and the internet to communicate without human intervention. But network security and privacy issues are increasing very fast, in today's world. Because of the prevalence of technological advancement in regular activities, internet security has evolved into a necessary requirement. Because technology is integrated into every aspect of contemporary life, cyberattacks on the internet of things represent a bigger danger than attacks against traditional networks. Researchers have found that combining machine learning techniques into an intrusion detection system (IDS) is an efficient way to get beyond the limitations of conventional IDSs in an IoT context. This research presents a comprehensive literature assessment and develops an intrusion detection system that makes use of machine learning techniques to address security problems in an IoT environment. Along with a comprehensive look at the state of the art in terms of intrusion detection systems for IoT-enabled environments, this study also examines the attributes of approaches, common datasets, and existing methods utilized to construct such systems.
Efficient network management and security in 5G enabled internet of things us...IJECEIAES
The rise of fifth generation (5G) networks and the proliferation of internet- of-things (IoT) devices have created new opportunities for innovation and increased connectivity. However, this growth has also brought forth several challenges related to network management and security. Based on the review of literature it has been identified that majority of existing research work are limited to either addressing the network management issue or security concerns. In this paper, the proposed work has presented an integrated framework to address both network management and security concerns in 5G internet-of-things (IoT) network using a deep learning algorithm. Firstly, a joint approach of attention mechanism and long short-term memory (LSTM) model is proposed to forecast network traffic and optimization of network resources in a, service-based and user-oriented manner. The second contribution is development of reliable network attack detection system using autoencoder mechanism. Finally, a contextual model of 5G-IoT is discussed to demonstrate the scope of the proposed models quantifying the network behavior to drive predictive decision making in network resources and attack detection with performance guarantees. The experiments are conducted with respect to various statistical error analysis and other performance indicators to assess prediction capability of both traffic forecasting and attack detection model.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
Comprehensive Survey on Security Problems and Key Technologies of the Interne...RSIS International
Internet of things (IoT) is a collection of many
interconnected objects, services, humans, and devices that can
communicate, share data, and information to achieve a common
goal in different areas and applications. The vision of IoT is to
enable devices to collaborate with each other on the Internet. IoT
security focuses on authentication and access control protocols.
IoT security is the area with protection connected devices and
networks. There are many key challenges in designing a secure
IoT: Privacy, Authentication, Access Control, Trust,
Confidentiality, Mobile Security, etc. Attacks on IoT security
devices are physical attacks, side channel attacks, cryptanalysis
attacks, software attacks, network attacks. This paper describes
Security Problems of IoT, Security issues and Key Technologies
of IoT.
Comprehensive survey on security problems and key technologies of the interne...RSIS International
Internet of things (IoT) is a collection of many
interconnected objects, services, humans, and devices that can
communicate, share data, and information to achieve a common
goal in different areas and applications. The vision of IoT is to
enable devices to collaborate with each other on the Internet. IoT
security focuses on authentication and access control protocols.
IoT security is the area with protection connected devices and
networks. There are many key challenges in designing a secure
IoT: Privacy, Authentication, Access Control, Trust,
Confidentiality, Mobile Security, etc. Attacks on IoT security
devices are physical attacks, side channel attacks, cryptanalysis
attacks, software attacks, network attacks. This paper describes
Security Problems of IoT, Security issues and Key Technologies
of IoT.
Internet of things-blockchain lightweight cryptography to data security and ...IJECEIAES
The industrial internet of things (IoT) plays a major role in the growth of automation and increasing digital connectivity for machine-to-machine communication. The research community has extensively investigated the possibility of IoT and blockchain integration for the last couple of years. The major research is focused on the benefits of integrating blockchain with IoT. In this work, we first focus on the issue of integrating IoT nodes with blockchain networks, especially for non-real-time IoT nodes that do not have an in-built clock mechanism. As a result, they cannot establish communication with real-time blockchain networks. Another critical security issue is protecting data coming from IoT devices to blockchain networks. Blockchain is enough mature to protect the data in its ecosystem. However, information coming from outside of the world does not have any guarantee of data integrity and security. This paper first addresses the clock synchronization issue of IoT nodes with blockchain using a network time protocol and then proposes an IoT-blockchain light-weight cryptographic (IBLWC) approach to secure the entire IoT-blockchain ecosystem. This paper also presents the performance analysis of IBLWC as a suitable and cost-effective solution that incurs less processing overhead for IoTblockchain-based applications.
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
MEKDA: MULTI-LEVEL ECC BASED KEY DISTRIBUTION AND AUTHENTICATION IN INTERNET ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
In this study, using the fuzzy logic method, a stress detection tool was created with body temperature and blood pressure parameters as indicators to determine a person's stress level. This tool uses the LM35DZ sensor to detect body temperature, the MPX5100GP sensor to read blood pressure values, and Arduino Uno as a data processor from sensor readings which are then calculated using the fuzzy logic method as a stress level decisionmaker. The resulting output measures blood pressure, body temperature, and the stress level experienced by a person, which will be displayed on the liquid crystal display. Based on the results of testing the body temperature parameter, the highest error generated was 1.17%, and for the blood pressure parameter, the highest error was 2.5% for systole and 0.93% for diastole. Furthermore, testing the stress level displayed on the tool is compared to the depression, anxiety, and stress scales 42 (DASS 42), a psychological stress measuring instrument. From the results of testing the tool with the questionnaire, the average conformity level is 74%.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Final project report on grocery store management system..pdf
A signature-based data security and authentication framework for internet of things applications
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 3, June 2022, pp. 3298~3308
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i3.pp3298-3308 3298
Journal homepage: http://ijece.iaescore.com
A signature-based data security and authentication framework
for internet of things applications
Nasreen Fathima1
, Reshma Banu2
, Guttur Fakruddin Ali Ahammed3
1
Department of Computer Science and Engineering, ATME College of Engineering, Affiliated to Visvesvaraya Technological
University, Belagavi, India
2
Department of Information Science and Engineering, GSSS Institute of Engineering and Technology for Women, Mysuru, India
3
Department of Computer Science Engineering, Visvesvaraya Technological University Post Graduate Centre, Mysuru, India
Article Info ABSTRACT
Article history:
Received May 6, 2021
Revised Dec 20, 2021
Accepted Jan 11, 2022
Internet of things (IoT) is the next big revolution in modernized network
technologies connecting a massive number of heterogeneous smart appliances
and physical objects. Owing to these technologies' novelty, various issues are
characterized by security concerns are the most prioritized issue. A review of
existing security approaches highlights that they are very particular about the
solution towards a specific attack and cannot resist any unknown attacker.
Therefore, this manuscript presents a novel computational model that
introduces a unique authentication process using a simplified encryption
strategy. The simulated study outcome shows that the proposed system offers
efficient security and efficient data transmission performance in the presence
of an unknown adversary. Hence, the study outcome exhibits better effects
than frequently used security solutions when implemented in a vulnerable IoT
environment.
Keywords:
Authentication
Digital signature
Encryption
Hashing
Internet of things
Public key This is an open access article under the CC BY-SA license.
Corresponding Author:
Nasreen Fathima
Department of Computer Science and Engineering, ATME College of Engineering, Affiliated to
Visvesvaraya Technological University
VTU Main Rd, Visvesvaraya Technological University, Machhe, Belagavi, Karnataka 590018, India
Email: nasreen16fathima@gmail.com
1. INTRODUCTION
Internet of things (IoT) connects various physical objects using a sophisticated network chain [1]. An
IoT is utilized in smart home appliances, elder-care, medical healthcare, transportation, vehicle-to-everything
communication, home automation, and industrial application [2], [3]. However, with the massive connectivity
of many heterogeneous devices and communication protocols, it is equally exposed to the highest degree of
threat [4]. IoT's primary security attacks/issues are privacy, hardware issues, encryption of data, web interface,
less network awareness, insecure software, side-channel attacks, and rogue IoT devices [5]. At present, various
work is being carried out towards securing the communication system to resist multiple attacks [6]–[10], with
each process having its advantages and limiting factors. Authentication is a standard method for ascertaining
the legitimacy of any actor or event present within the communication area. The contribution of the proposed
system is to formulate a proper authentication mechanism with an inclusion of critical practical constraints
while performing data transmission in IoT. Different from existing approach, proposed system provides a
significant balance in offering the algorithm's capability concerning the security and data transmission in IoT.
The novelty of proposed system also resides in its authentication to offer enhanced scalability in its
performance. Therefore, this paper contributes towards a novel computational model capable of performing
secure authentication in IoT to resist a higher degree of threat and better resource retention within the resource-
constrained IoT nodes. The paper's organization is section 1 discusses the study background and its problems.
2. Int J Elec & Comp Eng ISSN: 2088-8708
A signature-based data security and authentication framework for internet of things … (Nasreen Fathima)
3299
The proposed solution followed by elaborating proposed method in section 2. The discussion of the obtained
results is carried out in section 3. Finally, the conclusion is briefed in section 4.
Various works have been carried out towards a secure authentication mechanism in IoT [11]. Security
is of utmost concern when it comes to using IoT in the automation system. Adopting a key agreement protocol
using public-key encryption is proven to resist threats and use light-weight security operations [12]. Use of
XOR function, concatenation, hashing, physically unclonable operation, elliptical curve encryption is reported
to thwart common security intrusion. A study towards adopting a key agreement scheme independent of any
verification table is showcased to offer light-weight authentication schemes [13]. The authentication process
is strongly linked with access rights, which requires an explicit authentication scheme. In the paper, Xue et al.
[14] have used a handover mechanism where the authentication is carried out by satellite making the operation
quite faster. An authentication mechanism to strengthen the privacy factor is carried out by Lai et al. [15],
which associates the secret key with a trusted server for boosting the privacy factor in IoT communication. IoT
consists of static nodes and has mobile nodes, and authenticating mobile nodes is a complicated task. A study
towards addressing such a problem is carried out by Zhang et al. [16], where authentication of vehicular nodes
is carried out. Authentication of the message is carried out towards better privacy preservation, as seen in the
work of Li et al. [17] and Vijayakumar et al. [18]. Furthermore, other studies towards similar privacy problems
in authentication are carried out by Huang et al. [19], Hammi et al. [20], Shin et al. [21], Deeback et al. [22],
and Zhang et al. [23]. Blockchain has been evolved as another robust security alternative for securing data and
assisting in a better authentication process. Studies towards considering blockchain technology explicitly for
authentication purpose is seen in the work [24]–[39]. The next section outlines research problems.
Various approaches are being carried out towards securing the communication addressing mainly
authentication issues in an IoT. The associated problems in the existing system are: i) the existing studies have
focused mainly on the encryption aspect while emphasizing effective resource utilization associated with
resource-constrained IoT nodes; ii) the formation of the IoT nodes and its possible influence on the adversarial
environment leading to the complex form of attacks are not addressed in existing studies; iii) adopting
blockchain demands equal participation of servers for authentication, and it is highly centralized with less
scalability over high-end deployment; iv) there is a lack of any studies which offer a simplified and cost-
effective encryption approach. Usually, the encryption approach is quite iterative and leads to computational
complexity; and v) existing security solutions are developed to address an intrusion's specific event, and hence
its solution is not applicable when the means of attack are changed. Therefore, the existing solution offers less
coverage towards maximum attacks in an IoT.
Different from any existing approaches that only focuses on security over predefined environment,
the proposed system introduces a framework that can offer a robust authentication in the dynamic environment
of an IoT. The present work extends our prior work that has introduced a computational model for securing the
transmission between the sensor nodes and IoT using public-key encryption [40], [41]. This part of the
implementation targets to evolve up with a scheme to offer resistivity against maximum threats. The proposed
study considers two typical environments termed local and global IoT, where secure modeling is carried out.
Each local IoT system consists of one specific application in a single domain. In contrast, all the local IoT
system with heterogeneous communication schemes formulates together to generate a global IoT system. The
global IoT system forms a centralized structure to facilitate communication. Hence, this environment defines
a practical IoT deployment case and introduces various challenges to monitoring the security breach events in
any one node residing within each domain; thereby defining an adversary environment unlike any existing
system. From a practical perspective, all the data centers and sensors formed a local IoT system, while all the
data centers' connectivity will create a global IoT system. The proposed method implements an authentication
mechanism that helps secure all the actors involved in the communication of an IoT. The study uses a challenge
and response to exchange information among the communicating nodes present within the environment. The
model also incorporates both backward and forward secrecy towards the design of a light-weight encryption
process. Figure 1 presents top-down architecture of proposed authentication mechanism where digital signature
and key management plays a significant role. As a novel approach, the methodology presented is non-iterative.
The essential block of operation of the proposed system: i) local level of IoT: the proposed system
considers a group of specific IoT devices that aggregates the data and forwards it to the datacenter. There is a
different group in the simulation area where each group has a distinct underlying communication protocol of
IoT. A specific IoT device is specifically elected within this communication group, which can take the data
from other IoT devices and forward it to the gateway node. Such a node's election is carried out based on the
highest level of resources within the IoT node. Hence, all the communication occurring within a single IoT
node group is termed the given IoT environment's local level; ii) global level of IoT: each local level of IoT is
required to be arranged effectively over an IoT environment to complete the process of data aggregation. The
communication process is carried via a gateway node with all the aggregated data from the main collector IoT
nodes from the local level and then forwards them to the data center's defined storage servers; and iii) data
center: the proposed study considers the data center to collect various rack servers capable of distributed
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 3298-3308
3300
storage. This module is connected to the gateway node via various network peripherals, e.g., switches and
routers. All the incoming data are passed via a gateway node from normal IoT nodes and are stored in a
distributed manner in this data center. Explicit metadata management and indexing mechanism are offered to
ensure faster and accurate retrieval of data.
IoT
Environment
IoT nodes
Core IoT
Nodes
Gateway Node Attacker
Perform Group wise communication
Generate 1st
Secret Key
Generate 2nd
Secret Key
Generate 3rd
Secret Key
Generate 4th
Secret Key
First random seed Primary value
Hashing
Node identity
Second secret key First random seed
3rd secret key
First random
seed
Primary
value
hash
Prime value
node
Data
packet
Final security
attribute
Public key of DC 4th secret key
Final
Signature
4th secret key
First random
seed
Primary value
Data packet Node identity
Figure 1. Proposed architecture of data security and authentication
All the operations mentioned above play a core role in carrying out communication. Owing to the
possibilities of dynamic attacks of unknown types, the proposed system carries out this security operation
mainly on the normal IoT nodes and then on the gateway node before disseminating and store the data over the
distributed storage servers over the cloud environment, i.e., data center. The resource also plays an essential
role in selecting the core IoT nodes that extract information from all the member nodes in a group. Only the
nodes with higher residual energy are considered core IoT nodes, and hence the proposed system performs
consistent monitoring of the nodes with higher residual resources. For security, the proposed system constructs
a novel digital signature that is highly simplified in its operation. Unlike conventional public-key encryption,
the proposed method performs the computation of both public key and private key. Another novelty of the
proposed system is that the generated private key is subjected to four sequential rounds of the encoding process
to develop a full backward and forward secrecy. A digital signature is caused by the proposed system used to
sign the data to be forwarded to the destination node. Unlike an existing digital signature scheme, the proposed
method does not have any extensive inclusion of the parameters. However, it only uses a simplified and smaller
number of parameters, e.g., random seeds, multiple levels of the generation of secret keys, prime values, and a
data packet. The design is carried out so that if attackers somehow bypass the protocol and capture the encoded
data packet or the digital signature, they will not be capable enough to perform cryptanalysis to break the
encoded data or the signed data packet. Simultaneously, the prime emphasis of the proposed system is to offer
maximum resistivity from the maximum form of threats over an IoT environment. Finally, a verification
process is carried out that assesses the data integrity using completely different conditions where the final secret
key and excellent value's hash value is matched with the hash value of the 3rd
level of secret key multiplied by
the hash value of random seed of prime significance. Although this is a very simplified process, attackers will
never retrace the encoding steps and can never access the dynamic data to attack. The following section
discusses the algorithm implementation.
4. Int J Elec & Comp Eng ISSN: 2088-8708
A signature-based data security and authentication framework for internet of things … (Nasreen Fathima)
3301
2. PROPOSED METHOD
The proposed system authenticates the legitimacy of the IoT nodes and gateway nodes and their data
packets using a non-conventional public critical encryption method. The steps of the algorithm as shown in
Figure 2. The algorithm uses a prime value pv considering two random seeds r1 and r2 (Line-2), considering
all the IoT nodes n into consideration (Line-1). The proposed algorithm also finds a key authority, KA, which
constructs two secret keys k1 and k2 (Line-3). The first secret key k1 is carried out by multiplying the first
random seed r1 with prime value pv (Line-4). Unlike the conventional public-key encryption, where the public
key is set as a default key, the proposed system computes the public key by multiplying the second random
seed r2 with prime value pv (Line-5). The proposed method also calculates the second secret key k2 where an
explicit function f1(x) is applied over remaining IoT nodes, i.e. (i-n(id)) (Line-4), and it represents hashing
operation. However, it does not use default hashing, but it generates hashing as f1(x)=pv-n(id). pkt. The
generated second secret-key k2 from Line-4 is further encoded to create the third secret-key k3 (Line-6), where
k3 is the second secret key k2 and first random seed r1. Further encoding was carried out on this generated third
secret key where the fourth secret key is generated by summing up third secret key k3 and product of first
random seed r1, prime value pv, and hash h (Line-7). The algorithm then generates a signature s where a
multiplicative function f2(x) is applied over the input arguments of data packet pkt, IoT nodes n(id), fourth
secret key k4, and product of first random seed r1 with prime value pv (Line-8). Finally, the algorithm generates
an ultimate secret attribute Tatt, a multiplicative function f2(x) of the newly computed public key of data center
pubkeyDC and fourth secret key k4 (Line-9). This mechanism is used by the transmitting nodes where the data
packets are signed before delivering it to the gateway node, and a similar principle is also applied for the
gateway node when it wants to forward it to the data center. The proposed system also delivers the aggregated
data using Accsig(k4, (r1. pV), S) as the last encoding steps. A closer look into the entire algorithmic steps will
show that it offers inter-dependency of multiple key parameters which offers higher degree of security as well
as lower computational overhead owing to its progressive steps. This makes the algorithm feasible to be
executed over resource-constrained IoT nodes with secure connectivity.
Algorithm for secure authentication of IoT nodes
Input: r1/ r2 (Random seeds)
Output: flag (notification message of secure connection)
Start
1. For i=1: n
2. initpv(r1, r2)
3. KAconstruct (k1, k2)
4. (k1, k2)[(r1.pv), f1(1-n(id))]
5. pubkeyDC(r2.pv)
6. k3k2.r1
7. k4k3+(r1.pv.h)
8. Sf2(pkt, n(id), k4, (r1. pv))
9. Tattf2(pubkeyDC, K4)
10. flagsecure msg communication.
11. End
End
Figure 2. Secure authentication of IoT nodes
3. RESULTS AND DISCUSSION
This section demonstrates the experimental results obtained from simulating the formulated
mathematical expressions in a numerical computing environment. The study performed the entire workflow
execution with mathematical computation in MATLAB. The simulation environment modeling, with
parameters as shown in Table 1, depends on a system requirement with a minimum of 4 GB internal memory
and a 1.2 GHz processing speed/clock frequency. It should be equipped with 64-bit Windows operating
systems/x64-based processor architecture.
3.1. Simulation environment
The simulation environment for numerical framework modeling considers a comparison of different
approaches to validate the performance of proposed approach which is now named as S-bAC. The simulation
study is carried out for proposed approach S-bAC with both aggregation and un-aggregation test scenarios, and
also the baseline approach of Challaet et al. [41] under two different conditions of aggregation and
un-aggregation. The prime reason for the adoption of Challa et al. [41] is that 208 researchers adopt it as a
standard implementation framework for secure data aggregation, which is higher than any existing standard
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 3298-3308
3302
research work in similar topics. This is another set of novelty as majority of existing security approaches lacks
comparisons. Table 1 highlights the experimental parameters used in proposed study.
Table 1. Experimental parameters for simulation
Simulation Parameters Initialized Value
Number of IoT-devices (nIoT) 150
IoT: DC component placement coordinates (x,y) (35,65)
Amount of Initial Energy for Activation of IoT-node in Joule 0.10
Number of IoT Gateway nodes 4
Maximum number iteration for workflow execution 500
3.2. Significance of accomplished result
The comparison of the formulated approach is performed with a baseline theoretical modeling of [41]
concerning a performance metric consisting of two distinct parameters viz: i) outcome corresponds to the
number of IoT-node that is no longer active with an increasing round of IoT communication cycle. That means
that the number of IoT dead node computations with progressive communication cycle and ii) the assessment
of remaining energy outcome into consideration with descriptive statistics computation. All the statistical effect
corresponds to the simulation, and the behavioral outcome is further illustrated. It provides the reader much
more insight into the trend of the variation for different performance metrics. To analyze the number of IoT
dead nodes, the simulation in this phase of the study considers 80 rounds of the IoT communication cycle. The
trend of the outcome is observed. The statistical mean, variance, and standard deviation trend are computed
from that outcome, further discussed. Table 2 highlights mean computation of the numerical outcome obtained
for dead IoT nodes for 4-different approaches viz: i) existing system with aggregation i.e., Agg [41], ii)
proposed system with aggregation i.e., Agg-S-bAC, iii) existing system without aggregation i.e., UAgg [41],
and iv) proposed system without aggregation i.e., UAgg-S-bAC.
Table 2. Numerical outcomes of statistical mean in comparative analysis-i
Approaches for Comparison Quantified outcome of the Statistical Mean
Agg-Challaet et al. [41] 18.3750
Agg-S-bAC 12.3750
UAgg- Challaet et al. [41] 35.7500
UAgg- S-bAC 32.8750
The inferencing of the Table 2 shows that the maximum mean value is obtained in [41] when applied
with the UAgg scenario. It shows that the number of dead nodes progressively increases with a growing
communication cycle. Still, nodes start draining energy at early phases of communication, which is also
happened in UAgg-S-bAC, where the mean value computed is 32.8750. However, in the case of Agg-Challaet
[41] and Agg-S-bAC, the IoT nodes start deactivating themselves as a later phase when the IoT communication
cycle reaches the 54th
round. However, among Agg [41] and Agg-S-bAC, Agg-S-bAC attains better
performance outcomes means the node starts draining at further stages of the communication cycle.
Agg-S-bAC outperforms Agg [41] and also other approaches to a greater extent.
Figure 3 shows the outcome of the statistical mean for both approaches. In the paper, Challa et al.
[41] and S-bAC, both approaches are simulated under aggregation and un-aggregation conditions. It shows that
Agg-S-bAC attains a minimum statistical mean value corresponding to IoT dead nodes that indicates that IoT
nodes die with increasing rounds of communication cycle but at a slower pace. The mean computation values
from the descriptive statistics viewpoint also show that it corresponds to the analysis of dead nodes, and here,
the approach Agg-S-bAC attains better performance as due to the light-weight signature-based authentication
schema it achieves considerable communication cost, which positively influences the energy performance of
each IoT devices in both the local IoT and global IoT. Similarly, the study also performed a statistical variance
assessment to check the S-bAC system's consistency while applied during the multi-hop data aggregation and
aggregation phase. Table 3 highlights the statistical variance computation of the numerical outcome obtained
for dead IoT nodes for 4-different approaches: Agg- [41], Agg-S-bAC, UAgg- [41], UAgg- S-bAC.
The result of the variance here indicates how far the data set corresponds to the outcome of IoT dead
nodes spread out from the mean value. If the numerical value of variance is 0, then it indicates that all the data
values are identical. Still, in the case of the proposed study, the highest value of variance corresponds to the
number of IoT dead nodes found in UAgg [41] and the lowest value obtained for Agg-S-bAC. It shows that
the outcome of Agg-S-bAC with the trend of the curve is closer to the mean statistical mean and do not indicate
6. Int J Elec & Comp Eng ISSN: 2088-8708
A signature-based data security and authentication framework for internet of things … (Nasreen Fathima)
3303
data points are much more spread out over the curve of mean, which justifies that the Agg-S-bAC attains
consistent data aggregation performance and chances of packet drops are also significantly lesser as each IoT
node dies slowly with the progressive round of IoT communication cycle. Here the data points nearer to the
mean indicate that the energy performance in the proposed S-bAC is relatively superior.
Figure 3. Visual outcome of the statistical mean computation for the number of IoT dead nodes
Table 3. Numerical outcomes of statistical variance in comparative analysis
Approaches for comparison Quantified outcome of statistical variance
Agg- Challa et al. [41] 1.46e+03
Agg-S-bAC 837.6964
UAgg- Challa et al. [41] 3.13e+03
UAgg- S-bAC 2.84e+03
The visualization corresponds to statistical variance from the analysis of IoT dead nodes shown in
Figure 4 with an extensive comparative study. It also shows that the existing approach of [41], while applied
during the aggregation phase, also attains a better outcome of statistical variance, which marginally differs
from the outcome of Agg-S-bAC. Here an overall analysis and interpretation show that Agg-S-bAC
outperforms all the other approaches. Table 4 highlights standard deviation computation of the numerical
outcome obtained for dead IoT nodes for 4-different approaches: Agg- [41], Agg-S-bAC, UAgg- [41], and
UAgg- S-bAC.
Figure 4. Visualization of statistical variance from analysis of dead IoT nodes w.r.t IoT communication cycle
Table 4 shows a comparative outcome among different approaches concerning the computed standard
deviation. Here, standard deviation indicates how to spread out the data points corresponding to the IoT dead
nodes are, and clear inferencing will reveal how the consistent performance of our proposed Agg-S-bAC and
UAgg-S-bAC yields. The clear inferencing shows that the approach Agg-S-bAC attains superior data
aggregation performance where the prime reason for accomplishing better data aggregation performance is that
the formulated signature-based data authentication mechanism executes simplified steps and minimizes packet
drops, leading to reducing the re-transmission counts. This, along with the simplified execution flow of
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 3298-3308
3304
Agg-S-bAC, eventually resulted in better energy performance for which the IoT nodes die slowly and lately in
the proposed concept. Whereas as already discussed above, in the context of variance, it is quite clear that a
lower value of standard deviation indicates that data points are very close to the mean, which is found in the
case of Agg-S-bAC whereas in both the techniques while applied for un-aggregation phase resulted in spread
out of numerical values over the mean. It also indicates that the light-weight security mechanism of S-bAC
accomplishes better security performance and enhanced energy performance.
Table 4. Numerical outcomes of standard deviation in comparative analysis
Approaches for comparison The quantified outcome of standard deviation
Agg- [41] 3.82e+01
Agg-S-bAC 29.5584
UAgg- [41] 5.59e+01
UAgg- S-bAC 5.33e+01
The visual outcome of statistical standard deviation, as shown in Figure 5 shows that as compared to
UAgg- [41], UAgg- S-bAC, both Agg-S-bAC and Agg- [41] resulted in the better and consistent outcome as
in both the cases, IoT nodes slowly dies with increasing communication cycle. However, Agg-S-bAC attains
superior performance among all. It incorporates the light-weight security mechanism and dynamic IoT gateway
node election process, making the entire communication sustainable for a longer time in both local and global
IoT communication scenarios. Table 5 highlights computation of the numerical outcome obtained for energy
consumption for 4-different approaches: Agg- [41], Agg-S-bAC, UAgg- [41], UAgg- S-bAC.
Figure 5. Visualization of statistical deviation from analysis of dead IoT nodes w.r.t IoT communication
cycle
Table 5 shows the behavioral study of the different approaches for remaining energy performance
corresponding to the statistical mean. In this case, also it can be seen that in the case of Agg-S-bAC, the
remaining energy in each I-node is much more, whereas in the case of Agg- [41], the trend of remaining energy
outcome marginally differs. However, both the approaches do not perform well while applied during the
un-aggregation phases, as shown in Figure 6.
Figure 6 shows the visual outcome corresponds to the statistical mean computed from simulating the
designed framework modeling for different execution workflow scenarios. As highlighted in Figure 4, it
indicates that the light-weight execution workflow of S-bAC and the dynamic election of IoT gateway node
has enhanced the energy-efficient data aggregation in Agg-S-bAC compared to the other experimental
approaches. Table 6 highlights statistical variance computation of the numerical outcome obtained for Energy
Consumption for 4-different approaches: Agg- [41], Agg-S-bAC, UAgg- [41], UAgg- S-bAC.
Table 5. Numerical outcomes of mean of energy in comparative analysis
Approaches for comparison Quantified outcome of the statistical mean of energy
Agg- [41] 6.9639
Agg-S-bAC 7.1479
UAgg- [41] 6.2173
UAgg- S-bAC 6.3009
8. Int J Elec & Comp Eng ISSN: 2088-8708
A signature-based data security and authentication framework for internet of things … (Nasreen Fathima)
3305
Figure 6. Visual outcome of the statistical mean computation for remaining energy of IoT-node
Table 6. Numerical outcomes of variance of energy in comparative analysis
Approaches for comparison Quantified outcome of statistical variance of energy
Agg- [41]v 29.0117
Agg-S-bAC 27.7186
UAgg- [41] 31.1250
UAgg- S-bAC 30.7836
The analysis of statistical variance is also performed for four different types of approaches considering
the formulated framework design where also it is observed that the trend of outcome corresponds to the
remaining energy is relatively superior in the case of Agg-S-bAC among all the approaches, the prime reason
behind the consistent performance is that the system converges towards secure data aggregation with the
dynamic election of IoT gateway node which is energy efficient and do not generate much communication
burden to the system.
Figure 7 shows the visual outcome of the statistical variance computation in this phase of the study,
and the trend of outcome justifies that the proposed Agg-S-bAC outperforms all the other approaches not only
with accomplishing high-level security requirements but also it attains better convergence solution with the
dynamic election of IoT gateway node with a progressive round of communication cycle. Table 7 highlights
standard deviation computation of the numerical outcome obtained for energy consumption for 4-different
approaches: Agg- [41], Agg-S-bAC, UAgg- [41], UAgg- S-bAC.
Figure 7. Visualization of statistical variance from the statistical analysis for energy consumption for
4-different approaches
Table 7. Numerical outcomes of standard deviation of energy in comparative analysis
Approaches for comparison The quantified outcome of statistical standard deviation
Agg- [41] 5.3862
Agg-S-bAC 5.2649
UAgg- [41] 5.5790
UAgg- S-bAC 5.5483
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 3298-3308
3306
The experimental analysis also further extended for computation and visualization of the outcome
corresponds to the standard deviation where it can be seen that in both the cases of Agg- [41] and Agg-S-bAC,
the numerical values obtained for standard deviation is 5.3862 and 5.2649, which indicates that the data points
are not much spread out from the mean, on the other hand, which is relatively higher in the case of UAgg- [41]
and UAgg- S-bAC. Thereby, it can also be claimed with the justification that the proposed approach
Agg-S-bAC attains superior energy performance for low-cost operations of security implementation and
ensures end-to-end data privacy in unknown adversaries in the context of both local and global IoT eco-system.
Figure 8 shows the standard deviation's visual outcome from the statistical analysis for the remaining
energy computation for each IoT-Node. It clearly shows how the system performance of Agg-S-bAC ensures
better energy performance with sustainable routing operations to a greater extent. Hence, it can be seen that
proposed system offers a novel contribution towards evaluation process where statistical approach is used in
comprehensive manner for assessing node performance when the proposed authentication algorithm is applied.
Such approach of evaluation is not reported in existing studies and hence anticipates offering a better flexibility
in framework construction in IoT.
Figure 8. Visualization of standard deviation from the statistical analysis for energy consumption for
4-different approaches
4. CONCLUSION
This paper has discussed a novel signature-based secure authentication mechanism where a simplified
encryption-based approach is used to validate the legitimacy of both IoT nodes and gateway nodes. The
proposed system's novelty/contribution is: i) the proposed encryption method is characterized by less iteration
and more progressive than any existing encryption method; ii) the proposed system retains a higher degree of
resource retention in the presence of adversaries while performing security operations; iii) the proposed
system's overall processing time is just 0.3765 seconds in the Core i3 processor. In comparison, the average of
the existing system is 2.3998 seconds; and iv) the proposed system can resist most authentication and key-
based attacks. The future work will be further towards optimizing the security operation for better security
outcomes. Future work could be inclusion of more number of multiple attackers and dynamic threats present
in communication environment. A strategically model can be further developed which is analyze malicious
behavior on the basis of different resource attribute used in data transmission over an IoT.
REFERENCES
[1] K. Zhao and L. Ge, “A survey on the internet of things security,” In Ninth international conference on computational intelligence
and security, 2013, pp. 663-667, doi: 10.1109/CIS.2013.145.
[2] C. Valmohammadi, “Examining the perception of Iranian organizations on internet of things solutions and applications,” Industrial
and Commercial Training, vol. 48, no. 2, 2016, doi: 10.1108/ICT-07-2015-0045.
[3] K. K. Patel, S. M. Patel, and P. G. Scholar, “Internet of things-IoT: definition, characteristics, architecture, enabling technologies,
application & future challenges,” International Journal of Engineering Science and Computing, vol. 6, no. 5, 2016, doi:
10.4010/2016.1482.
[4] K. Gama, L. Touseau, and D. Donsez, “Combining heterogeneous service technologies for building an internet of things
middleware,” Computer Communications, vol. 35, no. 4, 2012, doi: 10.1016/j.comcom.2011.11.003.
[5] W. M. S. Stout and V. E. Urias, “Challenges to securing the internet of things,” in Proceedings - International Carnahan Conference
on Security Technology, 2016, vol. 0, doi: 10.1109/CCST.2016.7815675.
[6] S. L. Keoh, S. S. Kumar, and H. Tschofenig, “Securing the internet of things: A standardization perspective,” IEEE Internet of
Things Journal, vol. 1, no. 3, 2014, doi: 10.1109/JIOT.2014.2323395.
[7] K. T. Nguyen, M. Laurent, and N. Oualha, “Survey on secure communication protocols for the internet of things,” Ad Hoc Networks,
10. Int J Elec & Comp Eng ISSN: 2088-8708
A signature-based data security and authentication framework for internet of things … (Nasreen Fathima)
3307
vol. 32, 2015, doi: 10.1016/j.adhoc.2015.01.006.
[8] M. Ammar, G. Russello, and B. Crispo, “Internet of things: a survey on the security of IoT frameworks,” Journal of Information
Security and Applications, vol. 38, 2018, doi: 10.1016/j.jisa.2017.11.002.
[9] A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, “Fog computing for the internet of things: security and privacy issues,” IEEE
Internet Computing, vol. 21, no. 2, 2017, doi: 10.1109/MIC.2017.37.
[10] L. Zhou and H. C. Chao, “Multimedia traffic security architecture for the internet of things,” IEEE Network, vol. 25, no. 3, 2011,
doi: 10.1109/MNET.2011.5772059.
[11] N. Fathima, R. Banu, and G. F. A. Ahammed, “An insight of existing research methods towards securing IoT communication
system,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 9, no. 4, 2020, doi:
10.35940/ijitee.d1621.029420.
[12] S. Garg, K. Kaur, G. Kaddoum, and K. K. R. Choo, “Toward secure and provable authentication for internet of things: realizing
industry 4.0,” IEEE Internet of Things Journal, vol. 7, no. 5, 2020, doi: 10.1109/JIOT.2019.2942271.
[13] K. Park et al., “LAKS-NVT: provably secure and lightweight authentication and key agreement scheme without verification table
in medical internet of things,” IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.3005592.
[14] K. Xue, W. Meng, S. Li, D. S. L. Wei, H. Zhou, and N. Yu, “A secure and efficient access and handover authentication protocol
for internet of things in space information networks,” IEEE Internet of Things Journal, vol. 6, no. 3, 2019, doi:
10.1109/JIOT.2019.2902907.
[15] C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen, “CPAL: A conditional privacy-preserving authentication with access
linkability for roaming service,” IEEE Internet of Things Journal, vol. 1, no. 1, 2014, doi: 10.1109/JIOT.2014.2306673.
[16] J. Zhang, H. Zhong, J. Cui, Y. Xu, and L. Liu, “An extensible and effective anonymous batch authentication scheme for smart
vehicular networks,” IEEE Internet of Things Journal, vol. 7, no. 4, 2020, doi: 10.1109/JIOT.2020.2970092.
[17] J. Li, Z. Zhang, L. Hui, and Z. Zhou, “A novel message authentication scheme with absolute privacy for the internet of things
networks,” IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.2976161.
[18] P. Vijayakumar, M. S. Obaidat, M. Azees, S. H. Islam, and N. Kumar, “Efficient and secure anonymous authentication with location
privacy for IoT-based WBANs,” IEEE Transactions on Industrial Informatics, vol. 16, no. 4, 2020, doi: 10.1109/TII.2019.2925071.
[19] P. Huang, L. Guo, M. Li, and Y. Fang, “Practical privacy-preserving ECG-based authentication for IoT-based healthcare,” IEEE
Internet of Things Journal, vol. 6, no. 5, 2019, doi: 10.1109/JIOT.2019.2929087.
[20] B. Hammi, A. Fayad, R. Khatoun, S. Zeadally, and Y. Begriche, “A lightweight ECC-based authentication scheme for internet of
things (IoT),” IEEE Systems Journal, vol. 14, no. 3, 2020, doi: 10.1109/JSYST.2020.2970167.
[21] S. Shin and T. Kwon, “A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks
in 5G-integrated internet of things,” IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.2985719.
[22] B. D. Deebak, F. Al-Turjman, M. Aloqaily, and O. Alfandi, “An authentic-based privacy preservation protocol for smart e-
healthcare systems in iot,” IEEE Access, vol. 7, 2019, doi: 10.1109/ACCESS.2019.2941575.
[23] X. Zhang, C. Liu, S. Poslad, and K. K. Chai, “A provable semi-outsourcing privacy preserving scheme for data transmission from
IoT devices,” IEEE Access, vol. 7, 2019, doi: 10.1109/ACCESS.2019.2925403.
[24] C. Lin, D. He, N. Kumar, X. Huang, P. Vijayakumar, and K. K. R. Choo, “HomeChain: a blockchain-based secure mutual
authentication system for smart homes,” IEEE Internet of Things Journal, vol. 7, no. 2, 2020, doi: 10.1109/JIOT.2019.2944400.
[25] S. Guo, X. Hu, S. Guo, X. Qiu, and F. Qi, “Blockchain meets edge computing: a distributed and trusted authentication system,”
IEEE Transactions on Industrial Informatics, vol. 16, no. 3, 2020, doi: 10.1109/TII.2019.2938001.
[26] Z. Cui et al., “A hybrid blockchain-based identity authentication scheme for multi-WSN,” IEEE Transactions on Services
Computing, vol. 13, no. 2, 2020, doi: 10.1109/TSC.2020.2964537.
[27] A. Gauhar et al., “XDBAuth: blockchain based cross domain authentication and authorization framework for internet of things,”
IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.2982542.
[28] N. Garg, M. Wazid, A. K. Das, D. P. Singh, J. J. P. C. Rodrigues, and Y. Park, “BAKMP-IoMT: design of blockchain enabled
authenticated key management protocol for internet of medical things deployment,” IEEE Access, vol. 8, 2020, doi:
10.1109/ACCESS.2020.2995917.
[29] W. Hu, Y. Hu, W. Yao, and H. Li, “A blockchain-based byzantine consensus algorithm for information authentication of the internet
of vehicles,” IEEE Access, vol. 7, 2019, doi: 10.1109/ACCESS.2019.2941507.
[30] Y. Yao, X. Chang, J. Misic, V. B. Misic, and L. Li, “BLA: Blockchain-assisted lightweight anonymous authentication for distributed
vehicular fog services,” IEEE Internet of Things Journal, vol. 6, no. 2, 2019, doi: 10.1109/JIOT.2019.2892009.
[31] X. Wang, P. Zeng, N. Patterson, F. Jiang, and R. Doss, “An improved authentication scheme for internet of vehicles based on
blockchain technology,” IEEE Access, vol. 7, 2019, doi: 10.1109/ACCESS.2019.2909004.
[32] F. Xie, H. Wen, J. Wu, S. Chen, W. Hou, and Y. Jiang, “Convolution based feature extraction for edge computing access
authentication,” IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, 2020, doi: 10.1109/TNSE.2019.2957323.
[33] S. Chen et al., “Radio frequency fingerprint-based intelligent mobile edge computing for internet of things authentication,” Sensors
(Switzerland), vol. 19, no. 16, 2019, doi: 10.3390/s19163610.
[34] R. F. Liao et al., “Security enhancement for mobile edge computing through physical layer authentication,” IEEE Access, vol. 7,
2019, doi: 10.1109/ACCESS.2019.2934122.
[35] Y. Chen et al., “Clustering based physical-layer authentication in edge computing systems with asymmetric resources,” Sensors
(Switzerland), vol. 19, no. 8, 2019, doi: 10.3390/s19081926.
[36] S. Chen et al., “Internet of things based smart grids supported by intelligent edge computing,” IEEE Access, vol. 7, 2019, doi:
10.1109/ACCESS.2019.2920488.
[37] H. Song, J. Bai, Y. Yi, J. Wu, and L. Liu, “Artificial intelligence enabled internet of things: network architecture and spectrum
access,” IEEE Computational Intelligence Magazine, vol. 15, no. 1, 2020, doi: 10.1109/MCI.2019.2954643.
[38] J. Wu, S. Guo, H. Huang, W. Liu, and Y. Xiang, “Information and communications technologies for sustainable development goals:
State-of-the-art, needs and perspectives,” IEEE Communications Surveys and Tutorials, vol. 20, no. 3, 2018, doi:
10.1109/COMST.2018.2812301.
[39] R. Atat, L. Liu, J. Wu, G. Li, C. Ye, and Y. Yang, “Big data meet cyber-physical systems: a panoramic survey,” IEEE Access,
vol. 6, 2018, doi: 10.1109/ACCESS.2018.2878681.
[40] N. Fathima, R. Banu, and G. F. A. Ahammed, “Modeling of secure communication in internet-of-things for resisting potential
intrusion,” in Advances in Intelligent Systems and Computing, 2019, vol. 1047, doi: 10.1007/978-3-030-31362-3_38.
[41] S. Challa et al., “Secure signature-based authenticated key establishment scheme for future IoT applications,” IEEE Access, vol. 5,
2017, doi: 10.1109/ACCESS.2017.2676119.
11. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 3298-3308
3308
BIOGRAPHIES OF AUTHORS
Nasreen Fathima received Ph.D. degree from Visvesvaraya Technological
University, Belagavi, India in 2022. She has 17 years of teaching experience. She is currently
working as Assistant Professor in the Department of Computer Science and Engineering at the
Academy for Technological & Management Excellence College of Engineering, Mysuru,
India. Her research areas are wireless networks and the Internet of Things. She has published
four papers in International Conference, five papers in International Journal, and five papers
in National Conference. She can be contacted at email: nasreen16fathima@gmail.com.
Reshma Banu Professor and HOD, ISE Dept at GSSSIETW, Mysuru. Has 19 yrs
of Teaching and Research Experience. Won Best HOD of the year by CSI, Best Paper Award
at CSI National Level, Best Accredited Student Branch” by CSI 2017, 2018 and 2019. Young
Scientist Award from AUFAU, VIRA-2016. Delivered talks/guest lectures organized National
competitions talk/Workshop/Conferences/FDP/session/Seminar/student convention. Received
Fund for Best Projects Received VGST Grant, Karnataka, SMYSR. Fund by VTU TEQIP 1.3
in 2020.Organizing/Publication Chair for 5 IEEE International Conference on Electrical
Electronics Communication Computer Technologies & Optimization Techniques 2016-
2019 & 2021. Senior IEEE member, Session Chair/Reviewer for National/International
conferences. Editorial Board member for various Journals. She can be contacted at email:
reshma127banu@gmail.com.
Guttur Fakruddin Ali Ahammed received Ph.D. degree from Sri Krishna
Devaraya University, Anantapur (A.P) in 2011. Presently he is guiding six Ph.D. scholars. He
has 17 years of Academic, Research and Administrative experience and has published more
than fifty research papers in National, International Journals and Conferences. He is currently
working as an Associate Professor, in the Department of Computer Science & Engineering
at VTU Centre for Post Graduate Study, Mysuru. He can be contacted at email:
aliahammed78@gmail.com.