Abstract
Internet of things (IoT) is an incipient technology that concentrates on connecting various things or devices to each other. In IoT, user lightweight authentication has become an important issue that is limited in time. Existing authentication techniques increase the data exchange overhead and reduce the network scalability. This paper proposes physical features based key management and authentication technique (PFKMA) for IoT networks. The public key is derived using the best attributes gathered from network traffic data in this methodology. A tag will be created by the trusted third party (TTP) using these features to derive a public key. The overall trust value of each device, which is obtained from the behavior and data trust values, is treated as a distinct characteristic and utilized to generate the private key. When the authenticator gets the requester's tag, message, and signature, the tag is checked for validity first, and then the signature is verified with the tag and the received message. By experimental results, we show that the PFKMA reduces the overhead and enhances the scalability.
Similar content being viewed by others
Availability of data and materials
Not applicable.
Code availability
Not applicable.
Change history
29 July 2021
The original version of this article has been revised: The 2nd author’s biography has been corrected.
References
Ali, I., Sabir, S., & Ullah, Z. (2016). Internet of things security, device authentication and access control: A review. International Journal of Computer Science and Information Security (IJCSIS), 14(8), 456–466.
Lara, E., Aguilar, L., Sanchez, M. A., & García, J. A. (2020). Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial internet of things. Sensors, 20, 501.
Kirubanantham, P., Sankar, S.M.U., Amuthadevi, C. et al. An intelligent web service group-based recommendation system for long-term composition. J Supercomput (2021). https://doi.org/10.1007/s11227-021-03930-1.
El-hajj, M., Fadlallah, A., Chamoun, M., & Serhrouchni, A. (2019). A survey of internet of things (IoT) authentication schemes". Sensors, 19, 1141.
Rahbari, H., Liu, J., & Park, J.-M. (2018). SecureMatch: Scalable authentication and key relegation for IoT using physical-layer techniques. In IEEE conference on communications and network security (CNS).
Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., & Ylianttila, M. (2014). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In IEEE WCNC'14 Track 3 (mobile and wireless networks).
Santos, M. L. B. A., Carneiro, J. C., Franco, A. M. R., Teixeira, F. A., Henriques, M. A. A., & Oliveira, L. B. (2020). "FLAT: Federated lightweight authentication for the internet of things. Ad-Hoc Networks, 107, 102253.
Ostad-Sharif, A., Arshad, H., Nikooghadam, M., & Abbasinezhad-Mood, D. (2019). Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme". Future Generation Computer Systems, 100, 882–892.
Kanisha, B., Mahalakshmi, V., Baskar, M. et al.Smart communication using tri-spectral sign recognition for hearing-impaired people. J Supercomput (2021). https://doi.org/10.1007/s11227-021-03968-1.
Pinto, A., & Costa, R. (2016). Hash-chain-based authentication for IoT. Advances in Distributed Computing and Artificial Intelligence Journal, 5(4), 1–8.
Moosavi, S. R., Gia, T. N., Rahmani, A.-M., Nigussie, E., Virtanen, S., Isoaho, J., & Tenhunen, H. (2015). SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Computer Science, 52, 452–459.
Ferrag, M. A., Maglaras, L., & Derhab, A. (2019). Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends. Hindawi Security and Communication Networks, 2019, 20.
Kumar, M., Kumar, S., Das, M. K., Singh, S., & Budhiraja, R. (2016). Lightweight data security model for IoT applications: A dynamic key approach. In IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData),China.
Baskar, M., Ramkumar, J., Karthikeyan, C., et al. (2021). Low rate DDoS mitigation using real-time multi threshold traffic monitoring system. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02744-y
Thiagarajan, R., Ganesan, R., Anbarasu, V., et al. (2021). Optimised with secure approach in detecting and isolation of malicious nodes in MANET. Wireless Personal Communication. https://doi.org/10.1007/s11277-021-08092-0
Ramkumar, J., Baskar, M., Viswak, M., & Ashish, M. D. (2020). Smart shopping with integrated secure system based on IoT. International Journal of Advanced Science and Technology, 29(5), 301–312.
Karthik, P. C., Sasikumar, J., Baskar, M., et al. (2021). Field equations for incompressible non-viscous fluids using artificial intelligence. The Journal of Supercomputing. https://doi.org/10.1007/s11227-021-03917-y
Funding
Not applicable.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
We authors not having any conflict of interest among ourselves to submit and publish our articles in Wireless Personal Communications journal.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Santhanakrishnan, C., Annapurani, K., Pradeep, S. et al. Physical Features Based Authentication Technique and Key Management for IoT Networks. Wireless Pers Commun 127, 1809–1825 (2022). https://doi.org/10.1007/s11277-021-08724-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08724-5