Secure Artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for smart living environment

被引:2
|
作者
Thapliyal, Siddhant [1 ]
Wazid, Mohammad [1 ]
Singh, Devesh Pratap [1 ]
Chauhan, Ramji [1 ]
Mishra, Amit Kumar [2 ]
Das, Ashok Kumar [3 ]
机构
[1] Graph Era Deemed be Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Graph Era Hill Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
关键词
Artificial Intelligence of Things (AIoT); Smart home; Cyber threats; Authentication; Security; PROTOCOL; EXCHANGE; INTERNET; SCHEME;
D O I
10.1016/j.compeleceng.2024.109353
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The use of Internet of Things (IoT) devices in Artificial Intelligence of Things (AIoT) applications has generated significant interest in recent years. AIoT security comes under cybersecurity, which focuses on protecting cloud-based, internet-connected hardware, also known as IoT devices and the networks they are connected to. As the waste of energy is one of the major issues in the world each day, we waste a lot of energy through various sources. A certain light-controlling mechanism can be implemented to reduce the unnecessary power consumption load over the sources. In this paper, a secure artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for a smart living environment is proposed (in short, SAIoT-SL). The unique feature of the proposed SAIoT-SL is that it provides secure data transmissions throughout the communication of servers (i.e., cloud servers), users, and sensors. The conducted security analysis and formal security verification (through Scyther tool) prove the resilience of the proposed SAIoT-SL against various potential attacks. In the end, a practical implementation of the proposed SAIoT-SL is also provided to check its impact on real-world scenarios. In the conducted comparative study, it has been identified that the proposed SAIoT-SL outperformed the other existing techniques.
引用
收藏
页数:15
相关论文
共 34 条
  • [21] An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (04) : 2571 - 2598
  • [22] Analysis of the Challenges of Artificial Intelligence of Things (AIoT) for the Smart Supply Chain (Case Study: FMCG Industries)
    Nozari, Hamed
    Szmelter-Jarosz, Agnieszka
    Ghahremani-Nahr, Javid
    SENSORS, 2022, 22 (08)
  • [23] Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems
    Srinivas, Jangirala
    Das, Ashok Kumar
    Li, Xiong
    Khan, Muhammad Khurram
    Jo, Minho
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (07) : 4425 - 4436
  • [24] An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards
    Jin, Wenting
    Xu, Jing
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 299 - +
  • [25] Provable and secure Two-Party Authenticated Key Agreement (2PAKA) Protocol for Internet of Health Things
    Ashaq Hussain Dar
    M. Tariq Banday
    International Journal of Information Technology, 2025, 17 (1) : 149 - 160
  • [26] A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS
    Ashok Kumar Das
    Vanga Odelu
    Adrijit Goswami
    Journal of Medical Systems, 2015, 39
  • [27] An Improved and Secure Two-factor Dynamic ID Based Authenticated Key Agreement Scheme for Multiserver Environment
    Shreeya Swagatika Sahoo
    Sujata Mohanty
    Banshidhar Majhi
    Wireless Personal Communications, 2018, 101 : 1307 - 1333
  • [28] A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid
    Wang, Cong
    Huo, Peng
    Ma, Maode
    Zhou, Tong
    Zhang, Yiying
    COMPUTING, 2023, 105 (11) : 2511 - 2537
  • [29] PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments
    Wang, Cong
    Li, Xiaohang
    Ma, Maode
    Zhou, Tong
    Xu, Guangquan
    Xiong, Naixue
    Zhang, Yiying
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (05)
  • [30] A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid
    Cong Wang
    Peng Huo
    Maode Ma
    Tong Zhou
    Yiying Zhang
    Computing, 2023, 105 : 2511 - 2537