Secure Artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for smart living environment

被引:2
|
作者
Thapliyal, Siddhant [1 ]
Wazid, Mohammad [1 ]
Singh, Devesh Pratap [1 ]
Chauhan, Ramji [1 ]
Mishra, Amit Kumar [2 ]
Das, Ashok Kumar [3 ]
机构
[1] Graph Era Deemed be Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Graph Era Hill Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
关键词
Artificial Intelligence of Things (AIoT); Smart home; Cyber threats; Authentication; Security; PROTOCOL; EXCHANGE; INTERNET; SCHEME;
D O I
10.1016/j.compeleceng.2024.109353
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The use of Internet of Things (IoT) devices in Artificial Intelligence of Things (AIoT) applications has generated significant interest in recent years. AIoT security comes under cybersecurity, which focuses on protecting cloud-based, internet-connected hardware, also known as IoT devices and the networks they are connected to. As the waste of energy is one of the major issues in the world each day, we waste a lot of energy through various sources. A certain light-controlling mechanism can be implemented to reduce the unnecessary power consumption load over the sources. In this paper, a secure artificial Intelligence of Things (AIoT)-enabled authenticated key agreement technique for a smart living environment is proposed (in short, SAIoT-SL). The unique feature of the proposed SAIoT-SL is that it provides secure data transmissions throughout the communication of servers (i.e., cloud servers), users, and sensors. The conducted security analysis and formal security verification (through Scyther tool) prove the resilience of the proposed SAIoT-SL against various potential attacks. In the end, a practical implementation of the proposed SAIoT-SL is also provided to check its impact on real-world scenarios. In the conducted comparative study, it has been identified that the proposed SAIoT-SL outperformed the other existing techniques.
引用
收藏
页数:15
相关论文
共 34 条
  • [31] An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems
    Vanga Odelu
    Ashok Kumar Das
    Adrijit Goswami
    Wireless Personal Communications, 2015, 84 : 2571 - 2598
  • [32] Explainable Artificial Intelligence Enabled Intrusion Detection Technique for Secure Cyber-Physical Systems
    Almuqren, Latifah
    Maashi, Mashael S.
    Alamgeer, Mohammad
    Mohsen, Heba
    Hamza, Manar Ahmed
    Abdelmageed, Amgad Atta
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [33] A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
    Mishra, Dheerendra
    Das, Ashok Kumar
    Mukhopadhyay, Sourav
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (18) : 8129 - 8143
  • [34] A secure lightweight anonymous elliptic curve cryptography-based authentication and key agreement scheme for fog assisted-Internet of Things enabled networks
    Verma, Upendra
    Bhardwaj, Diwakar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23)