Skip to main content
Top
Published in: Wireless Personal Communications 4/2022

05-09-2022

Holistic Feistel Authenticated Learning-`Based Authorization for Protecting the Internet of Things from Cyber Attacks

Authors: Robbi Rahim, Manikandan Ramachandran, Prassanna Jayachandran, Hariharan Kalyanaraman, Vidhyacharan Bhaskar, Ambeshwar Kumar

Published in: Wireless Personal Communications | Issue 4/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As Artificial Intelligence (AI) and the Internet of Things (IoT) applications become more eminent, business and government organizations have started thinking aggressively about processing and analyzing data. Despite efficient data processing and analyzing, business organizations are faced with several issues, because, with data becoming an organization’s most valuable, data tampering creates the threat of data breaches, and cyberattacks nullify the provisioning of a smarter and more continuous working world. Hence, protecting the advantages that AI applications and IoT devices provide must remain the primary concern for today’s organizations. In this article, Holistic Feistel Authentication and Learning-based Authorization (HFA-LA) method present this for protecting IoT applications against cyberattacks. More specifically, a lightweight authentication approach is designed by exploring the use of Feistel Block Message Authentication by the cloud service manager to identify the authenticated devices. A holistic authentication and authorization approaches is designed. In which Artificial Intelligent Feed Forward Learning and trust management via error measurement are adopted to analyze the IoT applications to access the cloud resources. This new HFA-LA method establish the connections between IoT devices and cloud services and combat against cyberattacks so that the communication latency (i.e., communication time and overhead) is improved, and security risks are well controlled for IoT applications. Simulation is performed with different metrics, such as, communication time, communication overhead, true positive rate, and false-positive rate. The observed results show that the HFA-LA method efficiently improves the true positive rate and reduces the communication time, the overhead and false positive rate more than the state-of-the-art methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hasan, M., Islam, M. M., Zarif, M. I. I., & Hashem, M. M. A. (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things, 7, 100059.CrossRef Hasan, M., Islam, M. M., Zarif, M. I. I., & Hashem, M. M. A. (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things, 7, 100059.CrossRef
2.
go back to reference Park, J.-H., Salim, M. M., Jo, J. H., Sicato, J. C. S., Rathore, S., & Park, J. H. (2019). CIoT-Net: a scalable cognitive IoT based smart city network architecture. Human-centric Computing and Information Sciences, 9(1), 29.CrossRef Park, J.-H., Salim, M. M., Jo, J. H., Sicato, J. C. S., Rathore, S., & Park, J. H. (2019). CIoT-Net: a scalable cognitive IoT based smart city network architecture. Human-centric Computing and Information Sciences, 9(1), 29.CrossRef
3.
go back to reference Thakong, M., Phimoltares, S., Jaiyen, S., & Lursinsap, C. (2018). One-pass-throw-away learning for cybersecurity in streaming non-stationary environments by dynamic stratum network. PLoS ONE, 13(9), e0202937.CrossRef Thakong, M., Phimoltares, S., Jaiyen, S., & Lursinsap, C. (2018). One-pass-throw-away learning for cybersecurity in streaming non-stationary environments by dynamic stratum network. PLoS ONE, 13(9), e0202937.CrossRef
4.
go back to reference Mosenia, A., & Jha, N. K. (2016). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586–602.CrossRef Mosenia, A., & Jha, N. K. (2016). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586–602.CrossRef
5.
go back to reference Radisavljevic-Gajic, V., Park, S., & Chasaki, D. (2017). Vulnerabilities of control systems in internet of things applications. IEEE Internet of Things Journal, 5(2), 1023–1032.CrossRef Radisavljevic-Gajic, V., Park, S., & Chasaki, D. (2017). Vulnerabilities of control systems in internet of things applications. IEEE Internet of Things Journal, 5(2), 1023–1032.CrossRef
6.
go back to reference Liu, X., Qian, C., Hatcher, W. G., Hansong, X., Liao, W., & Wei, Y. (2019). Secure internet of things (IoT)-based smart-world critical infrastructures: Survey. IEEE Access: Case Study and Research Opportunities. Liu, X., Qian, C., Hatcher, W. G., Hansong, X., Liao, W., & Wei, Y. (2019). Secure internet of things (IoT)-based smart-world critical infrastructures: Survey. IEEE Access: Case Study and Research Opportunities.
7.
go back to reference Machidon, O. M., Stanca, C., Ogrutan, P., Gerigan, C., & Aciu, L. (2018). Power-system protection device with IoT-based support for integration in smart environments. PLoS ONE, 13(12), e0208168.CrossRef Machidon, O. M., Stanca, C., Ogrutan, P., Gerigan, C., & Aciu, L. (2018). Power-system protection device with IoT-based support for integration in smart environments. PLoS ONE, 13(12), e0208168.CrossRef
8.
go back to reference Bailey, C., Chadwick, D. W., & de Lemos, R. (2014). Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80(5), 935–952.MathSciNetCrossRefMATH Bailey, C., Chadwick, D. W., & de Lemos, R. (2014). Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80(5), 935–952.MathSciNetCrossRefMATH
9.
go back to reference Shalan, A., & Zulkernine, M. (2014). Software control flow error detection and correlation with system performance deviation. Journal of Computer and System Sciences, 80(5), 953–972.MathSciNetCrossRefMATH Shalan, A., & Zulkernine, M. (2014). Software control flow error detection and correlation with system performance deviation. Journal of Computer and System Sciences, 80(5), 953–972.MathSciNetCrossRefMATH
10.
go back to reference Xie, Y., & Wang, G. (2014). Message matching-based greedy behavior detection in delay tolerant networks. Journal of Computer and System Sciences, 80(5), 903–915.MathSciNetCrossRefMATH Xie, Y., & Wang, G. (2014). Message matching-based greedy behavior detection in delay tolerant networks. Journal of Computer and System Sciences, 80(5), 903–915.MathSciNetCrossRefMATH
11.
go back to reference Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973–993.MathSciNetCrossRefMATH Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973–993.MathSciNetCrossRefMATH
12.
go back to reference Abomhara, M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65–88.CrossRef Abomhara, M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65–88.CrossRef
13.
go back to reference Maglaras, L., Ferrag, M.A., Derhab, A., Mukherjee, M., Janicke, H. & Rallis, S. (2019). Threats, protection and attribution of cyber attacks on critical infrastructures. arXiv preprint arXiv:1901.03899. Maglaras, L., Ferrag, M.A., Derhab, A., Mukherjee, M., Janicke, H. & Rallis, S. (2019). Threats, protection and attribution of cyber attacks on critical infrastructures. arXiv preprint arXiv:​1901.​03899.
14.
go back to reference Park, M., Han, J., Oh, H., & Lee, K. (2019). Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness. Wireless Communications and Mobile Computing, 2019, 1–12. Park, M., Han, J., Oh, H., & Lee, K. (2019). Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness. Wireless Communications and Mobile Computing, 2019, 1–12.
15.
go back to reference Hyman, B., Alisha, Z., & Gordon, S. (2019). Secure controls for smart cities; applications in intelligent transportation systems and smart buildings. International Journal of Science and Engineering Applications, 8(6), 167–71.CrossRef Hyman, B., Alisha, Z., & Gordon, S. (2019). Secure controls for smart cities; applications in intelligent transportation systems and smart buildings. International Journal of Science and Engineering Applications, 8(6), 167–71.CrossRef
16.
go back to reference Spathoulas, G., & Katsikas, S. (2019). Towards a secure industrial internet of things. Security and privacy trends in the industrial internet of things (pp. 29–45). Cham: Springer.CrossRef Spathoulas, G., & Katsikas, S. (2019). Towards a secure industrial internet of things. Security and privacy trends in the industrial internet of things (pp. 29–45). Cham: Springer.CrossRef
17.
go back to reference Zubiaga, A., Procter, R., & Maple, C. (2018). A longitudinal analysis of the public perception of the opportunities and challenges of the Internet of Things. PLoS ONE, 13(12), e0209472.CrossRef Zubiaga, A., Procter, R., & Maple, C. (2018). A longitudinal analysis of the public perception of the opportunities and challenges of the Internet of Things. PLoS ONE, 13(12), e0209472.CrossRef
18.
go back to reference Wu, Xu., & Li, F. (2017). A multi-domain trust management model for supporting RFID applications of IoT. PLoS ONE, 12(7), e0181124.CrossRef Wu, Xu., & Li, F. (2017). A multi-domain trust management model for supporting RFID applications of IoT. PLoS ONE, 12(7), e0181124.CrossRef
19.
go back to reference Dilek, S., Çakır, H., & Aydın, M. (2015). Applications of artificial intelligence techniques to combating cyber crimes: A review. arXiv preprint arXiv:1502.03552. Dilek, S., Çakır, H., & Aydın, M. (2015). Applications of artificial intelligence techniques to combating cyber crimes: A review. arXiv preprint arXiv:​1502.​03552.
20.
go back to reference Elsaeidy, A., Elgendi, I., Munasinghe, K. S., Sharma, D., & Jamalipour, A. (2017). A smart city cyber security platform for narrowband networks. In 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–6. IEEE. Elsaeidy, A., Elgendi, I., Munasinghe, K. S., Sharma, D., & Jamalipour, A. (2017). A smart city cyber security platform for narrowband networks. In 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–6. IEEE.
21.
go back to reference Baker, T., Asim, M., MacDermott, Á., Iqbal, F., Kamoun, F., Shah, B., Alfandi, O., & Hammoudeh, M. (2019). A secure fog-based platform for SCADA-based IoT critical infrastructure. Software: Practice and Experience., 50(5), 503–18. Baker, T., Asim, M., MacDermott, Á., Iqbal, F., Kamoun, F., Shah, B., Alfandi, O., & Hammoudeh, M. (2019). A secure fog-based platform for SCADA-based IoT critical infrastructure. Software: Practice and Experience., 50(5), 503–18.
22.
go back to reference Tahir, H., Tahir, R., & McDonald-Maier, K. (2018). On the security of consumer wearable devices in the internet of things. PLoS ONE, 13(4), e0195487.CrossRef Tahir, H., Tahir, R., & McDonald-Maier, K. (2018). On the security of consumer wearable devices in the internet of things. PLoS ONE, 13(4), e0195487.CrossRef
23.
go back to reference Weems, C. F., Ahmed, I., Richard III, G. G., Russell, J. D., & Neill, E. L. (2018). Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior. PLoS ONE, 13(12), e0207408.CrossRef Weems, C. F., Ahmed, I., Richard III, G. G., Russell, J. D., & Neill, E. L. (2018). Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior. PLoS ONE, 13(12), e0207408.CrossRef
24.
go back to reference Chen, Y.-Z., Huang, Z.-G., Shouhuai, Xu., & Lai, Y.-C. (2015). Spatiotemporal patterns and predictability of cyberattacks. PLoS ONE, 10(5), e0124472.CrossRef Chen, Y.-Z., Huang, Z.-G., Shouhuai, Xu., & Lai, Y.-C. (2015). Spatiotemporal patterns and predictability of cyberattacks. PLoS ONE, 10(5), e0124472.CrossRef
25.
go back to reference Díaz López, D., Uribe, M. B., Cely, C. S., Torres, A. V., Guataquira, N. M., Castro, S. M., Nespoli, P. & Mármol, F. G. (2018) Shielding IoT against cyber-attacks: An event-based approach using SIEM. Wireless Communications and Mobile Computing. Díaz López, D., Uribe, M. B., Cely, C. S., Torres, A. V., Guataquira, N. M., Castro, S. M., Nespoli, P. & Mármol, F. G. (2018) Shielding IoT against cyber-attacks: An event-based approach using SIEM. Wireless Communications and Mobile Computing.
26.
go back to reference Mihoub, A., Fredj, O. B., Cheikhrouhou, O., Derhab, A., & Krichen, M. (2022). Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Computers and Electrical Engineering, 98, 1–12.CrossRef Mihoub, A., Fredj, O. B., Cheikhrouhou, O., Derhab, A., & Krichen, M. (2022). Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Computers and Electrical Engineering, 98, 1–12.CrossRef
27.
go back to reference Rana, M. M., & Bo, R. (2019). IoT-based improved human motion estimations method Under cyber attacks. IEEE Internet of Things Journal IoT, 6(6), 2327-4662(c). Rana, M. M., & Bo, R. (2019). IoT-based improved human motion estimations method Under cyber attacks. IEEE Internet of Things Journal IoT, 6(6), 2327-4662(c).
28.
go back to reference Samy, A., Haining, Y., & Zhang, H. (2020). Fog-based attack detection framework for internet of things using deep learning. IEEE Access, 8, 74571–85.CrossRef Samy, A., Haining, Y., & Zhang, H. (2020). Fog-based attack detection framework for internet of things using deep learning. IEEE Access, 8, 74571–85.CrossRef
29.
go back to reference Rana, M. M. (2019). IoT-based electric vehicle state estimation andcontrol algorithms under cyber attacks. IEEE Internet of Things Journal IoT, 7(2), 2327–4662. Rana, M. M. (2019). IoT-based electric vehicle state estimation andcontrol algorithms under cyber attacks. IEEE Internet of Things Journal IoT, 7(2), 2327–4662.
30.
go back to reference Jahromi, A. N., Karimipour, H., Dehghantanha, A., & Choo, K. K. R. (2021). Toward detection and attribution of cyber-attacks in IoT-enabled cyber-physical systems. IEEE Internet of Things Journal, 8(17), 1–11.CrossRef Jahromi, A. N., Karimipour, H., Dehghantanha, A., & Choo, K. K. R. (2021). Toward detection and attribution of cyber-attacks in IoT-enabled cyber-physical systems. IEEE Internet of Things Journal, 8(17), 1–11.CrossRef
Metadata
Title
Holistic Feistel Authenticated Learning-`Based Authorization for Protecting the Internet of Things from Cyber Attacks
Authors
Robbi Rahim
Manikandan Ramachandran
Prassanna Jayachandran
Hariharan Kalyanaraman
Vidhyacharan Bhaskar
Ambeshwar Kumar
Publication date
05-09-2022
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09930-5

Other articles of this Issue 4/2022

Wireless Personal Communications 4/2022 Go to the issue