Enhancing Security of 5G-Enabled IoT Systems through Advanced Authentication Mechanisms: A Multifaceted Approach
DOI:
https://doi.org/10.56919/usci.2324.025Keywords:
Behavioural, Internet of things IOT, cyber threats, DDoS, Authentication, IDSAbstract
The Internet of Things (IoT) has revolutionized communication among devices, offering unprecedented efficiency and convenience. However, the widespread adoption of IoT has raised significant security concerns, emphasizing the need for robust security measures. This study focuses on the crucial aspect of authentication within the layered architecture of IoT systems. Authentication is foundational to the architecture, ensuring the availability, security, and integrity of IoT services and data. The research evaluates the current state of IoT authentication techniques, highlighting limitations in conventional solutions. To address these shortcomings, an advanced authentication framework is proposed, incorporating cutting-edge technologies such as blockchain, artificial intelligence, and biometrics. The framework employs biometric data for a dynamic and adaptive authentication process, enhancing security and accuracy in user and device identification. Blockchain technology is integrated to establish a decentralized and tamper-resistant identity management system, reducing the risk of unauthorized access and data manipulation. Artificial intelligence continuously adapts authentication processes based on behavioural patterns, bolstering the system's resilience against evolving cyber threats. The study also discusses the practical application of the proposed authentication system, considering resource limitations in IoT devices. It provides insights into the efficiency, scalability, and interoperability of the suggested solution within various IoT ecosystems. The research contributes to the ongoing discourse on IoT security by thoroughly examining enhanced authentication procedures. Organizations can fortify their IoT deployments against a growing array of cyber threats by prioritizing advanced authentication within a layered design, fostering a more secure and reliable IoT ecosystem. Additionally, the study presents a comprehensive overview of the state-of-the-art security in IoT, exploring various designs, enabling technologies, and protocols. It delves into security challenges at each architectural tier, providing an in-depth analysis of attack taxonomies and advanced defenses. The article serves as a valuable resource for researchers and academics in the IoT sector, offering a detailed survey of architectural security, identification of challenges, resolution strategies, and insights into the evolving landscape of IoT. The study provides a comprehensive survey of IoT architectural security, identifying challenges, proposing resolutions, and highlighting changes in the IoT domain. This research aims to enhance the accuracy by 80% of IoT security, fostering a more secure and reliable IoT ecosystem.
References
Aghili, S. F., Mala, H., Schindelhauer, C., Shojafar, M., & Tafazolli, R. (2021). Closed-loop and open-loop authentication protocols for blockchain-based IoT systems. Information Processing & Management, 58(4), 102568. https://doi.org/https://doi.org/10.1016/j.ipm.2021.102568
Ahmad, I., Shahabuddin, S., Kumar, T., Okwuibe, J., Gurtov, A., & Ylianttila, M. (2019). Security for 5G and beyond. IEEE Communications Surveys & Tutorials, 21(4), 3682-3722.
Ahmad, R., & Alsmadi, I. (2021). Machine learning approaches to IoT security: A systematic literature review Internet of Things, 14, 100365. https://doi.org/https://doi.org/10.1016/j.iot.2021.100365
Ali, Z. H., Ali, H. A., & Badawy, M. M. (2015). Internet of Things (IoT): definitions, challenges and recent research directions. International Journal of Computer Applications, 128(1), 37-47.
Alsharif, M. H., Jahid, A., Kelechi, A. H., & Kannadasan, R. (2023). Green IoT: A review and future research directions. Symmetry, 15(3), 757.
Amaral, L. A., Hessel, F. P., Bezerra, E. A., Corrêa, J. C., Longhi, O. B., & Dias, T. F. O. (2011). eCloudRFID – A mobile software framework architecture for pervasive RFID-based applications. Journal of Network and Computer Applications, 34(3), 972-979. https://doi.org/https://doi.org/10.1016/j.jnca.2010.04.005
Benabdessalem, R., Hamdi, M., & Kim, T. H. (2014, 20-23 Dec. 2014). A Survey on Security Models, Techniques, and Tools for the Internet of Things. 2014 7th International Conference on Advanced Software Engineering and Its Applications,
Cerny, T. (2019). Aspect-oriented challenges in system integration with microservices, SOA and IoT. Enterprise Information Systems, 13(4), 467-489. https://doi.org/10.1080/17517575.2018.1462406
Datta, P. M. (2022). Strategic Analytics for Decision-Making. In Global Technology Management 4.0: Concepts and Cases for Managing in the 4th Industrial Revolution (pp. 91-109). Springer.
Dragoni, N., Giallorenzo, S., Lafuente, A. L., Mazzara, M., Montesi, F., Mustafin, R., & Safina, L. (2017). Microservices: Yesterday, Today, and Tomorrow. In M. Mazzara & B. Meyer (Eds.), Present and Ulterior Software Engineering (pp. 195-216). Springer International Publishing. https://doi.org/10.1007/978-3-319-67425-4_12
Fan, Q., Chen, J., Deborah, L. J., & Luo, M. (2021). A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain. Journal of Systems Architecture, 117, 102112. https://doi.org/https://doi.org/10.1016/j.sysarc.2021.102112
Ghosh, A., Mukherjee, A., & Misra, S. (2021). Sega: Secured edge gateway microservices architecture for iiot-based machine monitoring. IEEE Transactions on Industrial Informatics, 18(3), 1949-1956.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645-1660. https://doi.org/https://doi.org/10.1016/j.future.2013.01.010
Javed, A., Malhi, A., Kinnunen, T., & Främling, K. (2020). Scalable IoT Platform for Heterogeneous Devices in Smart Environments. IEEE Access, 8, 211973-211985. https://doi.org/10.1109/ACCESS.2020.3039368
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), 2481-2501. https://doi.org/10.1007/s11276-014-0761-7
Karie, N. M., Sahri, N. M., & Haskell-Dowland, P. (2020, 21-21 April 2020). IoT Threat Detection Advances, Challenges and Future Directions. 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT),
Karie, N. M., Sahri, N. M., Yang, W., Valli, C., & Kebande, V. R. (2021). A Review of Security Standards and Frameworks for IoT-Based Smart Environments. IEEE Access, 9, 121975-121995. https://doi.org/10.1109/ACCESS.2021.3109886
Kebande, V. R., Karie, N. M., & Venter, H. (2018). Adding digital forensic readiness as a security component to the IoT domain.
Khanam, S., Ahmedy, I. B., Idris, M. Y. I., Jaward, M. H., & Sabri, A. Q. B. M. (2020). A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things. IEEE Access, 8, 219709-219743. https://doi.org/10.1109/ACCESS.2020.3037359
Khattak, H. A., Shah, M. A., Khan, S., Ali, I., & Imran, M. (2019). Perception layer security in Internet of Things. Future Generation Computer Systems, 100, 144-164. https://doi.org/https://doi.org/10.1016/j.future.2019.04.038
Kumar, A., Saha, R., Conti, M., Kumar, G., Buchanan, W. J., & Kim, T. H. (2022). A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. Journal of Network and Computer Applications, 204, 103414. https://doi.org/https://doi.org/10.1016/j.jnca.2022.103414
Lai, C., Boi, F., Buschettu, A., & Caboni, R. (2019, 26-28 Aug. 2019). IoT and Microservice Architecture for Multimobility in a Smart City. 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud),
Mirani, A. A., Velasco-Hernandez, G., Awasthi, A., & Walsh, J. (2022). Key Challenges and Emerging Technologies in Industrial IoT Architectures: A Review. Sensors, 22(15).
Moens, P., Bracke, V., Soete, C., Vanden Hautte, S., Nieves Avendano, D., Ooijevaar, T., Devos, S., Volckaert, B., & Van Hoecke, S. (2020). Scalable fleet monitoring and visualization for smart machine maintenance and industrial IoT applications. Sensors, 20(15), 4308.
Piyare, R. (2013). Internet of things: ubiquitous home control and monitoring system using android based smart phone. International journal of Internet of Things, 2(1), 5-11.
Rath, C. K., Mandal, A. K., & Sarkar, A. (2023). Microservice based scalable IoT architecture for device interoperability. Computer Standards & Interfaces, 84, 103697. https://doi.org/https://doi.org/10.1016/j.csi.2022.103697
Said, O., & Masud, M. (2013). Towards internet of things: Survey and future vision. International Journal of Computer Networks, 5(1), 1-17.
Santana, C., Andrade, L., Delicato, F. C., & Prazeres, C. (2021). Increasing the availability of IoT applications with reactive microservices. Service Oriented Computing and Applications, 15(2), 109-126. https://doi.org/10.1007/s11761-020-00308-8
Sarker, I. H., Khan, A. I., Abushark, Y. B., & Alsolami, F. (2023). Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mobile Networks and Applications, 28(1), 296-312.
Stout, W. M. S., & Urias, V. E. (2016, 24-27 Oct. 2016). Challenges to securing the Internet of Things. 2016 IEEE International Carnahan Conference on Security Technology (ICCST),
Ungurean, I., & Gaitan, N. C. (2020). A software architecture for the Industrial Internet of Things—A conceptual model. Sensors, 20(19), 5603.
Yu, X., & Guo, H. (2019). A survey on IIoT security. 2019 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS)
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 UMYU Scientifica
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.