Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things

被引:0
|
作者
Saideh, Marc [1 ]
Jamont, Jean-Paul [2 ]
Vercouter, Laurent [1 ]
机构
[1] Normandie Univ, INSA Rouen Normandie, LITIS UR 4108, F-76000 Rouen, France
[2] Univ Grenoble Alpes, LCIS, F-26000 Valence, France
关键词
internet of things; multi-factor authentication; sensor-based authentication; system of systems; security; object-to-object communication; SECURITY; PRIVACY;
D O I
10.3390/s24144621
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Communication between connected objects in the Internet of Things (IoT) often requires secure and reliable authentication mechanisms to verify identities of entities and prevent unauthorized access to sensitive data and resources. Unlike other domains, IoT offers several advantages and opportunities, such as the ability to collect real-time data through numerous sensors. These data contains valuable information about the environment and other objects that, if used, can significantly enhance authentication processes. In this paper, we propose a novel idea to building opportunistic sensor-based authentication factors by leveraging existing IoT sensors in a system of systems approach. The objective is to highlight the promising prospects of opportunistic authentication factors in enhancing IoT security. We claim that sensors can be utilized to create additional authentication factors, thereby reinforcing existing object-to-object authentication mechanisms. By integrating these opportunistic sensor-based authentication factors into multi-factor authentication schemes, IoT security can be substantially improved. We demonstrate the feasibility and effectivenness of our idea through illustrative experiments in a parking entry scenario, involving both mobile robots and cars, achieving high identification accuracy. We highlight the potential of this novel method to improve IoT security and suggest future research directions for formalizing and comparing our approach with existing techniques.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Ticket-Based Authentication for Securing Internet of Things
    Shrestha, Anish Prasad
    Islam, S. M. Riazul
    Kwak, Kyung Sup
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 938 - 941
  • [22] An OpenID Based Authentication Service Mechanisms for Internet of Things
    Karim, Ahammad
    Adnan, Muhammad Abdullah
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 687 - 692
  • [23] Meta-IoT: Simultaneous Sensing and Transmission by Meta-Material Sensor-Based Internet of Things
    Hu, Jingzhi
    Zhang, Hongliang
    Di, Boya
    Bian, Kaigui
    Song, Lingyang
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (08) : 6048 - 6063
  • [24] Authentication and Authorization for the Internet of Things
    Kim, Hokeun
    Lee, Edward A.
    IT PROFESSIONAL, 2017, 19 (05) : 27 - 33
  • [25] Secure Authentication on the Internet of Things
    Griffin, Phillip H.
    SOUTHEASTCON 2017, 2017,
  • [26] User Authentication for the Internet of Things
    Stajano, Frank
    Lomas, Mark
    SECURITY PROTOCOLS XXVI, 2018, 11286 : 209 - 213
  • [27] On the Authentication of Devices in the Internet of Things
    Sharaf-Dabbagh, Yaman
    Saad, Walid
    2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2016,
  • [28] An Opportunistic Routing Based on Directional Transmission in the Internet of Underwater Things
    Jiang, Jinfang
    Yan, Qian
    Han, Guangjie
    Wang, Hao
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18) : 16392 - 16403
  • [29] Impact of injection attacks on sensor-based continuous authentication for smartphones
    Gonzalez-Manzano, Lorena
    Mahbub, Upal
    de Fuentes, Jose M.
    Chellappa, Rama
    COMPUTER COMMUNICATIONS, 2020, 163 : 150 - 161
  • [30] Zero-Stop Authentication: Sensor-based real-time authentication system
    Matsumiya, K
    Aoki, S
    Murase, M
    Tokuda, H
    REAL-TIME AND EMBEDDED COMPUTING SYSTEMS AND APPLICATIONS, 2003, 2968 : 296 - 311