Skip to main content

Advertisement

Log in

Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

There is a consistent rise in the usage of sensory devices while framing up the Internet-of-Things (IoT), which generates a large portion of data and increases exponential security concerns. IoT vision aims to provide maximum coverage among the objects/things within a diverse ecosystem comprised of different types of devices/nodes, mainly called IoT Node. Compared with traditional networks, IoT provides higher scope to implement configuring proto-cols with scalable performance even in variable traffic and node mobility conditions. However, IoT poses various restrictions when it comes to implementing security policies. It does not adapt traditional complex cryptography-defined security protocol functions due to the bottleneck condition for energy and computational performance problems, which in longer runs affects the communication scenario. An efficient security mechanism is required to be designed to secure the communication between different objects/things with considerable preservation of data privacy in both local and global level of IoT. The study introduces a novel security framework, signature-based authentication schema, which enables a robust message authenticator to verify the message integrity during the data communication process by applying a signature scheme. The concept is modeled using mathematical computation to represent the core signature-based authentication scheme. The study outcome exhibits that the proposed system offers approximately 37.2% of reduced energy fluctuation and 56.3% reduced energy consumption compared with existing approaches over a large-scale IoT deployment test environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Availability of Data and Materials

Due to its ethical concerns, supporting data cannot be made openly available.

References

  1. Cai, C., Zheng, R., & Luo, J. (2022). ubiquitous acoustic sensing on commodity IoT Devices: A survey. IEEE Communications Surveys & Tutorials, 24(1), 432–454.

    Article  Google Scholar 

  2. Lv, T., Lin, Z., Huang, P., & Zeng, J. (2018). Optimization of the energy-efficient relay-based massive IoT network. IEEE Internet of Things Journal, 5(4), 3043–3058.

    Article  Google Scholar 

  3. Basharat, M., Ejaz, W., Naeem, M., Khattak, A. M., Anpalagan, A., & Alfandi, O. (2017). Energy efficient resource allocation for NOMA in cellular IoT with energy harvesting. In International conference on emerging technologies, (pp. 1–6).

  4. Shahini, A., Kiani, A., & Ansari, N. (2019). Energy efficient resource allocation in EH-enabled CR networks for IoT. IEEE Internet of Things Journal, 6(2), 3186–3193.

    Article  Google Scholar 

  5. Gyamfi, E., Ansere, J. A., & Xu, L. (2019). ECC based lightweight cybersecurity solution for IoT networks utilising multi-access mobile edge computing. In Fourth international conference on fog and mobile edge computing, (pp. 149–154).

  6. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Elsevier Computer Networks, 54(15), 2787–2805.

    Article  MATH  Google Scholar 

  7. Nundloll, V., Porter, B., Blair, G. S., & Emmett, B. (2019). The design and deployment of an end-to-end IoT infrastructure for the 0tural environment. MDPI-Future Internet, 11(6), 129.

    Article  Google Scholar 

  8. Saint, A. (2015). Where next for the internet of things? [information technology internet of things]. Engineering & Technology, 10(1), 72–75.

    Article  Google Scholar 

  9. Hui, J., & Thubert, P. (2011). Compression format for IPv6 datagrams over IEEE 802.15.4-Based Networks, RFC 6282, RFC Editor

  10. Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., and Alexander, R.(2012). RPL: Ipv6 routing protocol for low-power and lossy networks, RFC 6550, RFC Editor

  11. Choo, K. R., Gritzalis, S., & Park, J. H. (2018). Cryptographic solutions for industrial internet-of-things: research challenges and opportunities. IEEE Transactions on Industrial Informatics, 14(8), 3567–3569.

    Article  Google Scholar 

  12. Li, X., Niu, J., Bhuiyan, M. Z. A., Wu, F., Karuppiah, M., & Kumari, S. (2018). A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3599–3609.

    Article  Google Scholar 

  13. Nosouhi, M. R., Sood, K., Grobler, M., & Doss, R. (2022). Towards spoofing resistant next generation IoT networks. IEEE Transactions on Information Forensics and Security, 17, 1669–1683.

    Article  Google Scholar 

  14. Jung, J., Kim, B., Cho, J., & Lee, B. (2022). A secure platform model based on arm platform security architecture for IoT devices. IEEE Internet of Things Journal, 9(7), 5548–5560.

    Article  Google Scholar 

  15. Breitenbacher, D., Homoliak, I., Aung, Y. L., Elovici, Y., & Tippenhauer, N. O. (2022). HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version). IEEE Internet of Things Journal, 9(12), 9640–9658.

    Article  Google Scholar 

  16. Krishnan, P., Jain, K., Buyya, R., Vijayakumar, P., Nayyar, A., Bilal, M., & Song, H. (2022). MUD-based behavioral profiling security framework for software-defined IoT networks. IEEE Internet of Things Journal, 9(9), 6611–6622.

    Article  Google Scholar 

  17. Hameedi, S. S., & Bayat, O. (2022). Improving IoT Data Security and Integrity Using Lightweight Blockchain Dynamic Table. MDPI-Applied Science, 12(18), 9377.

    Article  Google Scholar 

  18. Kathamuthu, N. D., Chinnamuthu, A., Iruthayanathan, N., Ramachandran, M., & Gandomi, A. H. (2022). Deep Q-learning-based neural network with privacy preservation method for secure data transmission in internet of things (IoT) healthcare application. MDPI-Electronics, 11(1), 157.

    Google Scholar 

  19. Panahi, U., & Bayılmış, C. (2023). Enabling secure data transmission for wireless sensor networks based IoT applications. Ain Shams Engineering Journal, 14(2), 101866. https://doi.org/10.1016/j.asej.2022.101866

    Article  Google Scholar 

  20. Premkumar, R., & Sathya Priya, S. (2022). Service Constraint NCBQ trust orient secure transmission with IoT devices for improved data security in cloud using blockchain. Measurement: Sensors, 24, 100486. https://doi.org/10.1016/j.measen.2022.100486

    Article  Google Scholar 

  21. Jyotheeswari, P., & Jeyanthi, N. (2022). Secure data transmission for protecting the users’ privacy in medical internet of things. InderScience-International Journal of Advanced Intelligence Paradigm, 23(1–2), 171–185.

    Article  Google Scholar 

  22. Nagarajan, S. M., Anandhan, P., Muthukumaran, V., Uma, K., & Kumaran, U. (2022). Security framework for IoT and deep belief network-based healthcare system using blockchain technology. InderScience-International Journal of Electronic Business, 17(3), 226–243.

    Article  Google Scholar 

  23. Kamal, M., Parvin, S., Saleem, K., Al-Hamadi, H., & Gawanmeh, A. (2017). Efficient low cost supervisory system for Internet of Things enabled smart home. In IEEE international conference on communications workshops, (pp. 864–869).

  24. Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.

    Article  Google Scholar 

  25. Liu, Y., Kuang, Y., Xiao, Y., & Xu, G. (2017). SDN-based data transfer security for Internet of Things. IEEE Internet of Things Journal, 5(1), 257–268.

    Article  Google Scholar 

  26. Ban, H. J., Choi, J., & Kang, N. (2016). Fine-grained support of security services for resource constrained internet of things. International Journal of Distributed Sensor Networks, 12(5), 7824686.

    Article  Google Scholar 

  27. Premnath, S. N., & Haas, Z. J. (2015). Security and privacy in the internet-of-things under time-and-budget-limited adversary model. IEEE Wireless Communications Letters, 4(3), 277–280.

    Article  Google Scholar 

  28. Li, X., Wang, H., Dai, H.-N., Wang, Y., & Zhao, Q. (2016). An analytical study on eavesdropping attacks in wireless nets of things. Mobile Information Systems, 2016, 1–10. https://doi.org/10.1155/2016/4313475

    Article  Google Scholar 

  29. Hou, J.-L., & Yeh, K.-H. (2015). Novel authentication schemes for IoT based healthcare systems. International Journal of Distributed Sensor Networks, 11(11), 183659.

    Article  Google Scholar 

  30. Kodali, R.K., Jain, V., Bose, S., & Boppana, L. (2016). IoT based smart Security and home automation system. In IEEE International conference on computing, communication and Automation, (pp. 1286–1289).

  31. Challa, S., Wazid, M., Das, A. K., Kumar, N., Reddy, A. G., Yoon, E.-J., & Yoo, K.-Y. (2017). Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access, 5, 3028–3043. https://doi.org/10.1109/ACCESS.2017.2676119

    Article  Google Scholar 

Download references

Funding

There has been no significant financial support for this work that could have influenced its outcome.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nasreen Fathima.

Ethics declarations

Conflict of interest

We wish to confirm that there are no known conflicts of interest associated with this publication.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fathima, N., Banu, R. & Ahammed, G.F.A. Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications. Wireless Pers Commun 130, 401–420 (2023). https://doi.org/10.1007/s11277-023-10291-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10291-w

Keywords

Navigation