Securing Consumer Electronics Device Loops in the Internet of Things Through β Control Access Scheme

被引:0
|
作者
Shingari, Nitinkumar [1 ]
Mago, Beenu [2 ]
机构
[1] Banasthali Vidyapith, Dept Comp Sci, Kishnpura 304022, India
[2] Skyline Univ Coll, Sch Comp, Sharjah, U Arab Emirates
关键词
Cybersecurity; consumer electronics; beta control access scheme; injection attacks; security validation; IoT logs; AUTHENTICATION SCHEME; IOT;
D O I
10.1109/TCE.2024.3415157
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the growing dependence of consumer devices on the Internet of Things (IoT), the need for cybersecurity has increased to combat common injection and functional replica threats. Inadequate ports in the consumer electronics network render these devices vulnerable to cyber assaults, requiring strong security measures. This paper presents a new method, the Beta Control Access Scheme (beta-CAS), to strengthen closed IoT-consumer electronics loops. Using a different access control (beta) , this system efficiently fixes corrupted electronic circuits by blocking illegal access and restoring normal control using IoT records. The complex procedure requirements and control flow are carefully observed and guided by dual-layer neural networks. The first layer aims to reduce unwanted access and rapidly terminates the initial control (alpha) when unlawful access is detected. The next processing layer retrieves the most recent control logs from the IoT and then executes an access control reset using the main goal's reverse time. Authentication in this approach depends on traditional key/fingerprint verification for setting up and restoring control of electronic devices. The robust computational procedures for security validation and record retrieval are made possible with IoT, delivering a complete and efficient cybersecurity architecture.
引用
收藏
页码:5154 / 5166
页数:13
相关论文
共 50 条
  • [41] A scheme of access service recommendation for the Social Internet of Things
    Chen, Zhikui
    Ling, Ruochuan
    Huang, Chung-Ming
    Zhu, Xu
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (04) : 694 - 706
  • [42] Device service networks maintenance scheme in the internet of things
    Liu, JianHua
    Tong, WeiQin
    PRZEGLAD ELEKTROTECHNICZNY, 2012, 88 (9B): : 222 - 225
  • [43] Securing Tags to Control Information Flows within the Internet of Things
    Singh, Jatinder
    Pasquier, Thomas F. J. -M.
    Bacon, Jean
    2015 INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN INTERNET OF THINGS (RIOT), 2015,
  • [44] A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things
    Ullah, Syed Sajid
    Oleshchuk, Vladimir
    Pussewalage, Harsha S. Gardiyawasam
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 528 - 539
  • [45] A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things
    Tian, Hongliang
    Tian, Junyuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 1297 - 1310
  • [46] An access control scheme for distributed Internet of Things based on adaptive trust evaluation and blockchain
    Jiang, Wenxian
    Lin, Zerui
    Tao, Jun
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (01):
  • [47] SDACS: Blockchain-Based Secure and Dynamic Access Control Scheme for Internet of Things
    Gong, Qinghua
    Zhang, Jinnan
    Wei, Zheng
    Wang, Xinmin
    Zhang, Xia
    Yan, Xin
    Liu, Yang
    Dong, Liming
    SENSORS, 2024, 24 (07)
  • [48] Congestion control model for securing internet of things data flow
    Quwaider, Muhannad
    Shatnawi, Yousef
    AD HOC NETWORKS, 2020, 106
  • [49] A Novel Access Control Scheme to Construct Fresh Database of Ambient Information in Internet of Things
    Kawamoto, Yuichi
    Nishiyama, Hiroki
    Kato, Nei
    Shimizu, Yoshitaka
    Takahara, Atsushi
    Jiang, Tingting
    2015 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2015, : 914 - 919
  • [50] Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach
    Javaid, Uzair
    Jameel, Furqan
    Javaid, Umair
    Khan, Muhammad Toaha Raza
    Jantti, Riku
    MOBILE INFORMATION SYSTEMS, 2020, 2020 (2020)