Abstract
There is a consistent rise in the usage of sensory devices while framing up the Internet-of-Things (IoT), which generates a large portion of data and increases exponential security concerns. IoT vision aims to provide maximum coverage among the objects/things within a diverse ecosystem comprised of different types of devices/nodes, mainly called IoT Node. Compared with traditional networks, IoT provides higher scope to implement configuring proto-cols with scalable performance even in variable traffic and node mobility conditions. However, IoT poses various restrictions when it comes to implementing security policies. It does not adapt traditional complex cryptography-defined security protocol functions due to the bottleneck condition for energy and computational performance problems, which in longer runs affects the communication scenario. An efficient security mechanism is required to be designed to secure the communication between different objects/things with considerable preservation of data privacy in both local and global level of IoT. The study introduces a novel security framework, signature-based authentication schema, which enables a robust message authenticator to verify the message integrity during the data communication process by applying a signature scheme. The concept is modeled using mathematical computation to represent the core signature-based authentication scheme. The study outcome exhibits that the proposed system offers approximately 37.2% of reduced energy fluctuation and 56.3% reduced energy consumption compared with existing approaches over a large-scale IoT deployment test environment.
Similar content being viewed by others
Availability of Data and Materials
Due to its ethical concerns, supporting data cannot be made openly available.
References
Cai, C., Zheng, R., & Luo, J. (2022). ubiquitous acoustic sensing on commodity IoT Devices: A survey. IEEE Communications Surveys & Tutorials, 24(1), 432–454.
Lv, T., Lin, Z., Huang, P., & Zeng, J. (2018). Optimization of the energy-efficient relay-based massive IoT network. IEEE Internet of Things Journal, 5(4), 3043–3058.
Basharat, M., Ejaz, W., Naeem, M., Khattak, A. M., Anpalagan, A., & Alfandi, O. (2017). Energy efficient resource allocation for NOMA in cellular IoT with energy harvesting. In International conference on emerging technologies, (pp. 1–6).
Shahini, A., Kiani, A., & Ansari, N. (2019). Energy efficient resource allocation in EH-enabled CR networks for IoT. IEEE Internet of Things Journal, 6(2), 3186–3193.
Gyamfi, E., Ansere, J. A., & Xu, L. (2019). ECC based lightweight cybersecurity solution for IoT networks utilising multi-access mobile edge computing. In Fourth international conference on fog and mobile edge computing, (pp. 149–154).
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Elsevier Computer Networks, 54(15), 2787–2805.
Nundloll, V., Porter, B., Blair, G. S., & Emmett, B. (2019). The design and deployment of an end-to-end IoT infrastructure for the 0tural environment. MDPI-Future Internet, 11(6), 129.
Saint, A. (2015). Where next for the internet of things? [information technology internet of things]. Engineering & Technology, 10(1), 72–75.
Hui, J., & Thubert, P. (2011). Compression format for IPv6 datagrams over IEEE 802.15.4-Based Networks, RFC 6282, RFC Editor
Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., and Alexander, R.(2012). RPL: Ipv6 routing protocol for low-power and lossy networks, RFC 6550, RFC Editor
Choo, K. R., Gritzalis, S., & Park, J. H. (2018). Cryptographic solutions for industrial internet-of-things: research challenges and opportunities. IEEE Transactions on Industrial Informatics, 14(8), 3567–3569.
Li, X., Niu, J., Bhuiyan, M. Z. A., Wu, F., Karuppiah, M., & Kumari, S. (2018). A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3599–3609.
Nosouhi, M. R., Sood, K., Grobler, M., & Doss, R. (2022). Towards spoofing resistant next generation IoT networks. IEEE Transactions on Information Forensics and Security, 17, 1669–1683.
Jung, J., Kim, B., Cho, J., & Lee, B. (2022). A secure platform model based on arm platform security architecture for IoT devices. IEEE Internet of Things Journal, 9(7), 5548–5560.
Breitenbacher, D., Homoliak, I., Aung, Y. L., Elovici, Y., & Tippenhauer, N. O. (2022). HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version). IEEE Internet of Things Journal, 9(12), 9640–9658.
Krishnan, P., Jain, K., Buyya, R., Vijayakumar, P., Nayyar, A., Bilal, M., & Song, H. (2022). MUD-based behavioral profiling security framework for software-defined IoT networks. IEEE Internet of Things Journal, 9(9), 6611–6622.
Hameedi, S. S., & Bayat, O. (2022). Improving IoT Data Security and Integrity Using Lightweight Blockchain Dynamic Table. MDPI-Applied Science, 12(18), 9377.
Kathamuthu, N. D., Chinnamuthu, A., Iruthayanathan, N., Ramachandran, M., & Gandomi, A. H. (2022). Deep Q-learning-based neural network with privacy preservation method for secure data transmission in internet of things (IoT) healthcare application. MDPI-Electronics, 11(1), 157.
Panahi, U., & Bayılmış, C. (2023). Enabling secure data transmission for wireless sensor networks based IoT applications. Ain Shams Engineering Journal, 14(2), 101866. https://doi.org/10.1016/j.asej.2022.101866
Premkumar, R., & Sathya Priya, S. (2022). Service Constraint NCBQ trust orient secure transmission with IoT devices for improved data security in cloud using blockchain. Measurement: Sensors, 24, 100486. https://doi.org/10.1016/j.measen.2022.100486
Jyotheeswari, P., & Jeyanthi, N. (2022). Secure data transmission for protecting the users’ privacy in medical internet of things. InderScience-International Journal of Advanced Intelligence Paradigm, 23(1–2), 171–185.
Nagarajan, S. M., Anandhan, P., Muthukumaran, V., Uma, K., & Kumaran, U. (2022). Security framework for IoT and deep belief network-based healthcare system using blockchain technology. InderScience-International Journal of Electronic Business, 17(3), 226–243.
Kamal, M., Parvin, S., Saleem, K., Al-Hamadi, H., & Gawanmeh, A. (2017). Efficient low cost supervisory system for Internet of Things enabled smart home. In IEEE international conference on communications workshops, (pp. 864–869).
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.
Liu, Y., Kuang, Y., Xiao, Y., & Xu, G. (2017). SDN-based data transfer security for Internet of Things. IEEE Internet of Things Journal, 5(1), 257–268.
Ban, H. J., Choi, J., & Kang, N. (2016). Fine-grained support of security services for resource constrained internet of things. International Journal of Distributed Sensor Networks, 12(5), 7824686.
Premnath, S. N., & Haas, Z. J. (2015). Security and privacy in the internet-of-things under time-and-budget-limited adversary model. IEEE Wireless Communications Letters, 4(3), 277–280.
Li, X., Wang, H., Dai, H.-N., Wang, Y., & Zhao, Q. (2016). An analytical study on eavesdropping attacks in wireless nets of things. Mobile Information Systems, 2016, 1–10. https://doi.org/10.1155/2016/4313475
Hou, J.-L., & Yeh, K.-H. (2015). Novel authentication schemes for IoT based healthcare systems. International Journal of Distributed Sensor Networks, 11(11), 183659.
Kodali, R.K., Jain, V., Bose, S., & Boppana, L. (2016). IoT based smart Security and home automation system. In IEEE International conference on computing, communication and Automation, (pp. 1286–1289).
Challa, S., Wazid, M., Das, A. K., Kumar, N., Reddy, A. G., Yoon, E.-J., & Yoo, K.-Y. (2017). Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access, 5, 3028–3043. https://doi.org/10.1109/ACCESS.2017.2676119
Funding
There has been no significant financial support for this work that could have influenced its outcome.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
We wish to confirm that there are no known conflicts of interest associated with this publication.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Fathima, N., Banu, R. & Ahammed, G.F.A. Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications. Wireless Pers Commun 130, 401–420 (2023). https://doi.org/10.1007/s11277-023-10291-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10291-w