Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

被引:40
作者
Attkan, Ankit [1 ]
Ranga, Virender [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra 136119, Haryana, India
关键词
Authentication; Authorization; Session key; Key management system; Key distribution; Artificial intelligence; Blockchain; Sensor networks; IoT security; Cyber-physical systems; WIRELESS SENSOR NETWORKS; AUTHENTICATION SCHEME; MUTUAL AUTHENTICATION; INTERNET; MANAGEMENT; CLOUD; DEVICES; MULTIFACTOR; EFFICIENT;
D O I
10.1007/s40747-022-00667-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The recent years have garnered huge attention towards the Internet of Things (IoT) because it enables its consumers to improve their lifestyles and professionally keep up with the technological advancements in the cyber-physical world. The IoT edge devices are heterogeneous in terms of the technology they are built on and the storage file formats used. These devices require highly secure modes of mutual authentication to authenticate each other before actually sending the data. Mutual authentication is a very important aspect of peer-to-peer communication. Secure session keys enable these resource-constrained devices to authenticate each other. After successful authentication, a device can be authorized and can be granted access to shared resources. The need for validating a device requesting data transfer to avoid data privacy breaches that may compromise confidentiality and integrity. Blockchain and artificial intelligence (AI) both are extensively being used as an integrated part of IoT networks for security enhancements. Blockchain provides a decentralized mechanism to store validated session keys that can be allotted to the network devices. Blockchain is also used to load balance the stressing edge devices during low battery levels. AI on the other hand provides better learning and adaptiveness towards IoT attacks. The integration of newer technologies in IoT key management yields enhanced security features. In this article, we systematically survey recent trending technologies from an IoT security point of view and discuss traditional key security mechanisms. This article delivers a comprehensive quality study for researchers on authentication and session keys, integrating IoT with blockchain and AI-based authentication in cybersecurity.
引用
收藏
页码:3559 / 3591
页数:33
相关论文
共 176 条
  • [1] Snowflakes at the Edge: A Study of Variability among NVIDIA Jetson AGX Xavier Boards
    Abdelhafez, Hazem A.
    Halawa, Hassan
    Pattabiraman, Karthik
    Ripeanu, Matei
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL WORKSHOP ON EDGE SYSTEMS, ANALYTICS AND NETWORKING (EDGESYS'21), 2021, : 1 - 6
  • [2] LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
    Abdi Nasib Far, Hossein
    Bayat, Majid
    Kumar Das, Ashok
    Fotouhi, Mahdi
    Pournaghi, S. Morteza
    Doostari, M. A.
    [J]. WIRELESS NETWORKS, 2021, 27 (02) : 1389 - 1412
  • [3] Ahemd MM, 2017, 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), P104, DOI 10.1109/COMTECH.2017.8065757
  • [4] ControlChain: A new stage on the IoT access control authorization
    Ahlert Pinno, Otto Julio
    Abed Gregio, Andre Ricardo
    De Bona, Luis C. E.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (12)
  • [5] Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review
    Ahmed, Afsheen
    Latif, Rabia
    Latif, Seemab
    Abbas, Haider
    Khan, Farrukh Aslam
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (17) : 21947 - 21965
  • [6] A Lightweight Trust Design for IoT Routing
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 552 - 557
  • [7] IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks
    Alani, Mohammed M.
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 140 - 144
  • [8] Systematic Literature Review on IoT-Based Botnet Attack
    Ali, Ihsan
    Ahmed, Abdelmuttlib Ibrahim Abdalla
    Almogren, Ahmad
    Raza, Muhammad Ahsan
    Shah, Syed Attique
    Khan, Anwar
    Gani, Abdullah
    [J]. IEEE ACCESS, 2020, 8 : 212220 - 212232
  • [9] Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain
    Alshahrani, Mohammed
    Traore, Issa
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 156 - 175
  • [10] Aman M.N., 2016, P 2 ACM INT WORKSH I, P10, DOI DOI 10.1145/2899007.2899013