Holistic Feistel Authenticated Learning-`Based Authorization for Protecting the Internet of Things from Cyber Attacks

被引:0
作者
Robbi Rahim
Manikandan Ramachandran
Prassanna Jayachandran
Hariharan Kalyanaraman
Vidhyacharan Bhaskar
Ambeshwar Kumar
机构
[1] Sekolah Tinggi Ilmu Manajemen Sukma,Department of Management
[2] SASTRA Deemed University,School of Computing
[3] Vellore Institute of Technology,School of Computer Science and Engineering
[4] San Francisco State University,Department of Electrical and Computer Engineering
来源
Wireless Personal Communications | 2022年 / 127卷
关键词
Artificial intelligence (AI); Internet of things (IoT); Holistic feistel authentication; Learning-based authorization; Feed forward learning;
D O I
暂无
中图分类号
学科分类号
摘要
As Artificial Intelligence (AI) and the Internet of Things (IoT) applications become more eminent, business and government organizations have started thinking aggressively about processing and analyzing data. Despite efficient data processing and analyzing, business organizations are faced with several issues, because, with data becoming an organization’s most valuable, data tampering creates the threat of data breaches, and cyberattacks nullify the provisioning of a smarter and more continuous working world. Hence, protecting the advantages that AI applications and IoT devices provide must remain the primary concern for today’s organizations. In this article, Holistic Feistel Authentication and Learning-based Authorization (HFA-LA) method present this for protecting IoT applications against cyberattacks. More specifically, a lightweight authentication approach is designed by exploring the use of Feistel Block Message Authentication by the cloud service manager to identify the authenticated devices. A holistic authentication and authorization approaches is designed. In which Artificial Intelligent Feed Forward Learning and trust management via error measurement are adopted to analyze the IoT applications to access the cloud resources. This new HFA-LA method establish the connections between IoT devices and cloud services and combat against cyberattacks so that the communication latency (i.e., communication time and overhead) is improved, and security risks are well controlled for IoT applications. Simulation is performed with different metrics, such as, communication time, communication overhead, true positive rate, and false-positive rate. The observed results show that the HFA-LA method efficiently improves the true positive rate and reduces the communication time, the overhead and false positive rate more than the state-of-the-art methods.
引用
收藏
页码:3511 / 3532
页数:21
相关论文
共 81 条
[1]  
Hasan M(2019)Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches Internet of Things 7 100059-602
[2]  
Islam MM(2019)CIoT-Net: a scalable cognitive IoT based smart city network architecture Human-centric Computing and Information Sciences 9 29-1032
[3]  
Zarif MII(2018)One-pass-throw-away learning for cybersecurity in streaming non-stationary environments by dynamic stratum network PLoS ONE 13 e0202937-952
[4]  
Hashem MMA(2016)A comprehensive study of security of internet-of-things IEEE Transactions on Emerging Topics in Computing 5 586-972
[5]  
Park J-H(2017)Vulnerabilities of control systems in internet of things applications IEEE Internet of Things Journal 5 1023-915
[6]  
Salim MM(2018)Power-system protection device with IoT-based support for integration in smart environments PLoS ONE 13 e0208168-993
[7]  
Jo JH(2014)Self-adaptive federated authorization infrastructures Journal of Computer and System Sciences 80 935-88
[8]  
Sicato JCS(2014)Software control flow error detection and correlation with system performance deviation Journal of Computer and System Sciences 80 953-12
[9]  
Rathore S(2014)Message matching-based greedy behavior detection in delay tolerant networks Journal of Computer and System Sciences 80 903-71
[10]  
Park JH(2014)A survey of emerging threats in cybersecurity Journal of Computer and System Sciences 80 973-18