Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things

被引:0
|
作者
Saideh, Marc [1 ]
Jamont, Jean-Paul [2 ]
Vercouter, Laurent [1 ]
机构
[1] Normandie Univ, INSA Rouen Normandie, LITIS UR 4108, F-76000 Rouen, France
[2] Univ Grenoble Alpes, LCIS, F-26000 Valence, France
关键词
internet of things; multi-factor authentication; sensor-based authentication; system of systems; security; object-to-object communication; SECURITY; PRIVACY;
D O I
10.3390/s24144621
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Communication between connected objects in the Internet of Things (IoT) often requires secure and reliable authentication mechanisms to verify identities of entities and prevent unauthorized access to sensitive data and resources. Unlike other domains, IoT offers several advantages and opportunities, such as the ability to collect real-time data through numerous sensors. These data contains valuable information about the environment and other objects that, if used, can significantly enhance authentication processes. In this paper, we propose a novel idea to building opportunistic sensor-based authentication factors by leveraging existing IoT sensors in a system of systems approach. The objective is to highlight the promising prospects of opportunistic authentication factors in enhancing IoT security. We claim that sensors can be utilized to create additional authentication factors, thereby reinforcing existing object-to-object authentication mechanisms. By integrating these opportunistic sensor-based authentication factors into multi-factor authentication schemes, IoT security can be substantially improved. We demonstrate the feasibility and effectivenness of our idea through illustrative experiments in a parking entry scenario, involving both mobile robots and cars, achieving high identification accuracy. We highlight the potential of this novel method to improve IoT security and suggest future research directions for formalizing and comparing our approach with existing techniques.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things
    Amjad, Sana
    Abbas, Shahid
    Abubaker, Zain
    Alsharif, Mohammed H.
    Jahid, Abu
    Javaid, Nadeem
    SENSORS, 2022, 22 (05)
  • [32] P2P networking based internet of things (IoT) sensor node authentication by Blockchain
    Hong, Sunghyuck
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (02) : 579 - 589
  • [33] P2P networking based internet of things (IoT) sensor node authentication by Blockchain
    Sunghyuck Hong
    Peer-to-Peer Networking and Applications, 2020, 13 : 579 - 589
  • [34] Meta-learning meets the Internet of Things: Graph prototypical models for sensor-based human activity recognition
    Zheng, Wenbo
    Yan, Lan
    Gou, Chao
    Wang, Fei-Yue
    INFORMATION FUSION, 2022, 80 : 1 - 22
  • [35] Hybrid deep learning model for wearable sensor-based stress recognition for Internet of Medical Things (IoMT) system
    Singh, Ghanapriya
    Chetia Phukan, Orchid
    Gupta, Rinki
    Nayyar, Anand
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2024, 37 (03)
  • [36] Analysis and Improvement on an Authentication Scheme for Wireless Sensor Networks in Internet of Things Environment
    LI Anqian
    KANG Baoyuan
    ZUO Xinyu
    HUO Yuyan
    NIU Shufang
    SUN Zhu
    WuhanUniversityJournalofNaturalSciences, 2023, 28 (06) : 541 - 552
  • [37] Meta-Material Sensor-Based Internet of Things for Environmental Monitoring by Deep Learning: Design, Deployment, and Implementation
    Liu, Xu
    Hu, Jingzhi
    Zhang, Hongliang
    Di, Boya
    Bian, Kaigui
    Song, Lingyang
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (04) : 2462 - 2476
  • [38] A Survey: Authentication Protocols for Wireless Sensor Network in the Internet of Things; Keys and Attacks
    Alrababah, Doaa
    Al-Shammari, Esraa
    Alsuht, Areej
    2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, : 270 - 276
  • [39] Research and Application of Business Authentication Mechanism Based on Internet of Things
    Yu, Chenghang
    Zhang, Baojun
    2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 1, 2011, 1 : 271 - 277
  • [40] QR Code Based Mutual Authentication Protocol for Internet of Things
    Marktscheffel, Tobias
    Gottschlich, Wolfram
    Popp, Wolfgang
    Werli, Philemon
    Fink, Simon Dominik
    Bilzhause, Arne
    de Meer, Hermann
    2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2016,