Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

被引:0
作者
Ankit Attkan
Virender Ranga
机构
[1] National Institute of Technology,Department of Computer Engineering
来源
Complex & Intelligent Systems | 2022年 / 8卷
关键词
Authentication; Authorization; Session key; Key management system; Key distribution; Artificial intelligence; Blockchain; Sensor networks; IoT security; Cyber-physical systems;
D O I
暂无
中图分类号
学科分类号
摘要
The recent years have garnered huge attention towards the Internet of Things (IoT) because it enables its consumers to improve their lifestyles and professionally keep up with the technological advancements in the cyber-physical world. The IoT edge devices are heterogeneous in terms of the technology they are built on and the storage file formats used. These devices require highly secure modes of mutual authentication to authenticate each other before actually sending the data. Mutual authentication is a very important aspect of peer-to-peer communication. Secure session keys enable these resource-constrained devices to authenticate each other. After successful authentication, a device can be authorized and can be granted access to shared resources. The need for validating a device requesting data transfer to avoid data privacy breaches that may compromise confidentiality and integrity. Blockchain and artificial intelligence (AI) both are extensively being used as an integrated part of IoT networks for security enhancements. Blockchain provides a decentralized mechanism to store validated session keys that can be allotted to the network devices. Blockchain is also used to load balance the stressing edge devices during low battery levels. AI on the other hand provides better learning and adaptiveness towards IoT attacks. The integration of newer technologies in IoT key management yields enhanced security features. In this article, we systematically survey recent trending technologies from an IoT security point of view and discuss traditional key security mechanisms. This article delivers a comprehensive quality study for researchers on authentication and session keys, integrating IoT with blockchain and AI-based authentication in cybersecurity.
引用
收藏
页码:3559 / 3591
页数:32
相关论文
共 298 条
  • [21] Song F(2020)ControlChain: a new stage on the IoT access control authorization Concurr Comput Pract Exp 32 e5238-194
  • [22] Zhu M(2016)Mutual authentication scheme in secure internet of things technology for comfortable lifestyle Sensors 16 20-589
  • [23] Zhou Y(2019)Survey on trust calculation methods in Internet of Things Procedia Comput Sci 161 1300-221
  • [24] You I(2019)A provably secure and lightweight anonymous user authenticated session key exchange scheme for internet of things deployment IEEE Internet Things J 6 8739-40
  • [25] Zhang H(2021)LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT Wirel Netw 27 1389-27
  • [26] Shwartz O(2019)LDAKM-EIoT: lightweight device authentication and key management mechanism for edge-based IoT deployment Sensors 19 5539-202
  • [27] Mathov Y(2019)A Kerberos based secure communication system in smart (internet of things) environment J Comput Theor Nanosci 16 2381-175
  • [28] Bohadana M(2021)Survey of low-power wireless network technologies for the internet of things Autom Control Comput Sci 55 177-213
  • [29] Elovici Y(2021)A blockchain-based architecture for secure and trustworthy operations in the industrial Internet of Things J Ind Inf Integr 21 100190-1129
  • [30] Oren Y(2020)P2P networking based internet of things (IoT) sensor node authentication by Blockchain Peer-to-Peer Netw Appl 13 579-106