Securing Consumer Electronics Device Loops in the Internet of Things Through β Control Access Scheme

被引:0
|
作者
Shingari, Nitinkumar [1 ]
Mago, Beenu [2 ]
机构
[1] Banasthali Vidyapith, Dept Comp Sci, Kishnpura 304022, India
[2] Skyline Univ Coll, Sch Comp, Sharjah, U Arab Emirates
关键词
Cybersecurity; consumer electronics; beta control access scheme; injection attacks; security validation; IoT logs; AUTHENTICATION SCHEME; IOT;
D O I
10.1109/TCE.2024.3415157
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the growing dependence of consumer devices on the Internet of Things (IoT), the need for cybersecurity has increased to combat common injection and functional replica threats. Inadequate ports in the consumer electronics network render these devices vulnerable to cyber assaults, requiring strong security measures. This paper presents a new method, the Beta Control Access Scheme (beta-CAS), to strengthen closed IoT-consumer electronics loops. Using a different access control (beta) , this system efficiently fixes corrupted electronic circuits by blocking illegal access and restoring normal control using IoT records. The complex procedure requirements and control flow are carefully observed and guided by dual-layer neural networks. The first layer aims to reduce unwanted access and rapidly terminates the initial control (alpha) when unlawful access is detected. The next processing layer retrieves the most recent control logs from the IoT and then executes an access control reset using the main goal's reverse time. Authentication in this approach depends on traditional key/fingerprint verification for setting up and restoring control of electronic devices. The robust computational procedures for security validation and record retrieval are made possible with IoT, delivering a complete and efficient cybersecurity architecture.
引用
收藏
页码:5154 / 5166
页数:13
相关论文
共 50 条
  • [1] Securing the access control policies to the Internet of Things resources through permissioned blockchain
    Rizzardi, Alessandra
    Sicari, Sabrina
    Miorandi, Daniele
    Coen-Porisini, Alberto
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (15):
  • [2] A Device Software Platform for Consumer Electronics Based on the Internet of Things
    Yun, Jaeseok
    Ahn, Il-Yeop
    Sung, Nak-Myung
    Kim, Jaeho
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2015, 61 (04) : 564 - 571
  • [3] Consumer Electronics and the Internet of Things
    Corcoran, Peter
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2014, 3 (03) : 29 - U199
  • [5] A Review of Distributed Access Control for Blockchain Systems Towards Securing the Internet of Things
    Butun, Ismail
    Osterberg, Patrik
    IEEE ACCESS, 2021, 9 : 5428 - 5441
  • [6] Security Scheme for an RFID Access Control based on Internet of Things
    Isidro Alamillo-Montes, Genaro
    Martinez-Cruz, Alfonso
    Feregrino Uribe, Claudia
    2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,
  • [7] An Efficient Authentication and Access Control Scheme for Perception Layer of Internet of Things
    Ye, Ning
    Zhu, Yan
    Wang, Ru-chuan
    Malekian, Reza
    Lin Qiao-min
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (04): : 1617 - 1624
  • [8] Access Control for the Internet of Things
    Fotiou, Nikos
    Kotsonis, Theodore
    Marias, Giannis F.
    Polyzos, George C.
    2016 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2016, : 29 - 38
  • [9] Access Control and the Internet of Things
    Cerf, Vinton G.
    IEEE INTERNET COMPUTING, 2015, 19 (05) : 96 - 97
  • [10] Securing Access to Internet of Medical Things Using a Graphical-Password-Based User Authentication Scheme
    Khan, Mudassar Ali
    Din, Ikram Ud
    Almogren, Ahmad
    SUSTAINABILITY, 2023, 15 (06)