Skip to main content
Log in

Physical Features Based Authentication Technique and Key Management for IoT Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

This article has been updated

Abstract

Internet of things (IoT) is an incipient technology that concentrates on connecting various things or devices to each other. In IoT, user lightweight authentication has become an important issue that is limited in time. Existing authentication techniques increase the data exchange overhead and reduce the network scalability. This paper proposes physical features based key management and authentication technique (PFKMA) for IoT networks. The public key is derived using the best attributes gathered from network traffic data in this methodology. A tag will be created by the trusted third party (TTP) using these features to derive a public key. The overall trust value of each device, which is obtained from the behavior and data trust values, is treated as a distinct characteristic and utilized to generate the private key. When the authenticator gets the requester's tag, message, and signature, the tag is checked for validity first, and then the signature is verified with the tag and the received message. By experimental results, we show that the PFKMA reduces the overhead and enhances the scalability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig.1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Availability of data and materials

Not applicable.

Code availability

Not applicable.

Change history

  • 29 July 2021

    The original version of this article has been revised: The 2nd author’s biography has been corrected.

References

  1. Ali, I., Sabir, S., & Ullah, Z. (2016). Internet of things security, device authentication and access control: A review. International Journal of Computer Science and Information Security (IJCSIS), 14(8), 456–466.

  2. Lara, E., Aguilar, L., Sanchez, M. A., & García, J. A. (2020). Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial internet of things. Sensors, 20, 501.

    Article  Google Scholar 

  3. Kirubanantham, P., Sankar, S.M.U., Amuthadevi, C. et al. An intelligent web service group-based recommendation system for long-term composition. J Supercomput (2021). https://doi.org/10.1007/s11227-021-03930-1.

  4. El-hajj, M., Fadlallah, A., Chamoun, M., & Serhrouchni, A. (2019). A survey of internet of things (IoT) authentication schemes". Sensors, 19, 1141.

    Article  Google Scholar 

  5. Rahbari, H., Liu, J., & Park, J.-M. (2018). SecureMatch: Scalable authentication and key relegation for IoT using physical-layer techniques. In IEEE conference on communications and network security (CNS).

  6. Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., & Ylianttila, M. (2014). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In IEEE WCNC'14 Track 3 (mobile and wireless networks).

  7. Santos, M. L. B. A., Carneiro, J. C., Franco, A. M. R., Teixeira, F. A., Henriques, M. A. A., & Oliveira, L. B. (2020). "FLAT: Federated lightweight authentication for the internet of things. Ad-Hoc Networks, 107, 102253.

    Article  Google Scholar 

  8. Ostad-Sharif, A., Arshad, H., Nikooghadam, M., & Abbasinezhad-Mood, D. (2019). Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme". Future Generation Computer Systems, 100, 882–892.

    Article  Google Scholar 

  9. Kanisha, B., Mahalakshmi, V., Baskar, M. et al.Smart communication using tri-spectral sign recognition for hearing-impaired people. J Supercomput (2021). https://doi.org/10.1007/s11227-021-03968-1.

  10. Pinto, A., & Costa, R. (2016). Hash-chain-based authentication for IoT. Advances in Distributed Computing and Artificial Intelligence Journal, 5(4), 1–8.

    Google Scholar 

  11. Moosavi, S. R., Gia, T. N., Rahmani, A.-M., Nigussie, E., Virtanen, S., Isoaho, J., & Tenhunen, H. (2015). SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Computer Science, 52, 452–459.

    Article  Google Scholar 

  12. Ferrag, M. A., Maglaras, L., & Derhab, A. (2019). Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends. Hindawi Security and Communication Networks, 2019, 20.

    Google Scholar 

  13. Kumar, M., Kumar, S., Das, M. K., Singh, S., & Budhiraja, R. (2016). Lightweight data security model for IoT applications: A dynamic key approach. In IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData),China.

  14. Baskar, M., Ramkumar, J., Karthikeyan, C., et al. (2021). Low rate DDoS mitigation using real-time multi threshold traffic monitoring system. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02744-y

    Article  Google Scholar 

  15. Thiagarajan, R., Ganesan, R., Anbarasu, V., et al. (2021). Optimised with secure approach in detecting and isolation of malicious nodes in MANET. Wireless Personal Communication. https://doi.org/10.1007/s11277-021-08092-0

    Article  Google Scholar 

  16. Ramkumar, J., Baskar, M., Viswak, M., & Ashish, M. D. (2020). Smart shopping with integrated secure system based on IoT. International Journal of Advanced Science and Technology, 29(5), 301–312.

    Google Scholar 

  17. Karthik, P. C., Sasikumar, J., Baskar, M., et al. (2021). Field equations for incompressible non-viscous fluids using artificial intelligence. The Journal of Supercomputing. https://doi.org/10.1007/s11227-021-03917-y

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Santhanakrishnan.

Ethics declarations

Conflict of interest

We authors not having any conflict of interest among ourselves to submit and publish our articles in Wireless Personal Communications journal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Santhanakrishnan, C., Annapurani, K., Pradeep, S. et al. Physical Features Based Authentication Technique and Key Management for IoT Networks. Wireless Pers Commun 127, 1809–1825 (2022). https://doi.org/10.1007/s11277-021-08724-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08724-5

Keywords

Navigation