Secure Artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for smart living environment

被引:2
|
作者
Thapliyal, Siddhant [1 ]
Wazid, Mohammad [1 ]
Singh, Devesh Pratap [1 ]
Chauhan, Ramji [1 ]
Mishra, Amit Kumar [2 ]
Das, Ashok Kumar [3 ]
机构
[1] Graph Era Deemed be Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Graph Era Hill Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
关键词
Artificial Intelligence of Things (AIoT); Smart home; Cyber threats; Authentication; Security; PROTOCOL; EXCHANGE; INTERNET; SCHEME;
D O I
10.1016/j.compeleceng.2024.109353
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The use of Internet of Things (IoT) devices in Artificial Intelligence of Things (AIoT) applications has generated significant interest in recent years. AIoT security comes under cybersecurity, which focuses on protecting cloud-based, internet-connected hardware, also known as IoT devices and the networks they are connected to. As the waste of energy is one of the major issues in the world each day, we waste a lot of energy through various sources. A certain light-controlling mechanism can be implemented to reduce the unnecessary power consumption load over the sources. In this paper, a secure artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for a smart living environment is proposed (in short, SAIoT-SL). The unique feature of the proposed SAIoT-SL is that it provides secure data transmissions throughout the communication of servers (i.e., cloud servers), users, and sensors. The conducted security analysis and formal security verification (through Scyther tool) prove the resilience of the proposed SAIoT-SL against various potential attacks. In the end, a practical implementation of the proposed SAIoT-SL is also provided to check its impact on real-world scenarios. In the conducted comparative study, it has been identified that the proposed SAIoT-SL outperformed the other existing techniques.
引用
收藏
页数:15
相关论文
共 34 条
  • [11] A secure and efficient certificateless authenticated key agreement protocol for smart healthcare
    Ma, Yuqian
    Ma, Yongliu
    Liu, Yidan
    Cheng, Qingfeng
    COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [12] Lightweight secure authentication and key agreement technique for smart grid
    Kumari, Disuja
    Singh, Karan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 451 - 478
  • [13] Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation
    Sureshkumar, Venkatasamy
    Chinnaraj, P.
    Saravanan, P.
    Amin, Ruhul
    Rodrigues, Joel J. P. C.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (04) : 3470 - 3479
  • [14] Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment
    Khatoon, Shaheena
    Rahman, S. K. Md Mizanur
    Alrubaian, Majed
    Alamri, Atif
    IEEE ACCESS, 2019, 7 : 47962 - 47971
  • [15] Cost-Effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT)
    Mahmood, Khalid
    Obaidat, Mohammad S.
    Shamshad, Salman
    Alenazi, Mohammed J. F.
    Kumar, Gulshan
    Anisi, Mohammad Hossein
    Conti, Mauro
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 23977 - 23984
  • [16] The Giant Leap for Smart Cities: Scaling Up Smart City Artificial Intelligence of Things (AIoT) Initiatives
    Kuguoglu, Berk Kaan
    van der Voort, Haiko
    Janssen, Marijn
    SUSTAINABILITY, 2021, 13 (21)
  • [17] Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment
    Jangirala, Srinivas
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 45 - 65
  • [18] Provably secure three-party authenticated key agreement protocol using smart cards
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    Fu, Xiaoming
    Liu, Hao
    Vasilakos, Athanasios V.
    COMPUTER NETWORKS, 2014, 58 : 29 - 38
  • [19] An Improved and Secure Two-factor Dynamic ID Based Authenticated Key Agreement Scheme for Multiserver Environment
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    Majhi, Banshidhar
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (03) : 1307 - 1333
  • [20] A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS
    Das, Ashok Kumar
    Odelu, Vanga
    Goswami, Adrijit
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (09)