1
|
Khan MA, Din IU, Majali T, Kim BS. A Survey of Authentication in Internet of Things-Enabled Healthcare Systems. Sensors (Basel) 2022; 22:s22239089. [PMID: 36501799 PMCID: PMC9738756 DOI: 10.3390/s22239089] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/06/2022] [Revised: 11/19/2022] [Accepted: 11/20/2022] [Indexed: 06/12/2023]
Abstract
The Internet of medical things (IoMT) provides an ecosystem in which to connect humans, devices, sensors, and systems and improve healthcare services through modern technologies. The IoMT has been around for quite some time, and many architectures/systems have been proposed to exploit its true potential. Healthcare through the Internet of things (IoT) is envisioned to be efficient, accessible, and secure in all possible ways. Even though the personalized health service through IoT is not limited to time or location, many associated challenges have emerged at an exponential pace. With the rapid shift toward IoT-enabled healthcare systems, there is an extensive need to examine possible threats and propose countermeasures. Authentication is one of the key processes in a system's security, where an individual, device, or another system is validated for its identity. This survey explores authentication techniques proposed for IoT-enabled healthcare systems. The exploration of the literature is categorized with respect to the technology deployment region, as in cloud, fog, and edge. A taxonomy of attacks, comprehensive analysis, and comparison of existing authentication techniques opens up possible future directions and paves the road ahead.
Collapse
Affiliation(s)
- Mudassar Ali Khan
- Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan
| | - Ikram Ud Din
- Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan
| | - Tha’er Majali
- Department of Management Information Systems, Applied Science Private University, Shafa Badran, Amman 11937, Jordan
| | - Byung-Seo Kim
- Department of Software and Communications Engineering, Hongik University, Sejong 30016, Republic of Korea
| |
Collapse
|
2
|
Ali W, Din IU, Almogren A, Kim BS. A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks. Sensors (Basel) 2022; 22:s22062269. [PMID: 35336439 PMCID: PMC8950649 DOI: 10.3390/s22062269] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/03/2021] [Revised: 03/01/2022] [Accepted: 03/14/2022] [Indexed: 12/02/2022]
Abstract
Despite the benefits of smart grids, concerns about security and privacy arise when a large number of heterogeneous devices communicate via a public network. A novel privacy-preserving method for smart grid-based home area networks (HAN) is proposed in this research. To aggregate data from diverse household appliances, the proposed approach uses homomorphic Paillier encryption, Chinese remainder theorem, and one-way hash function. The privacy in Internet of things (IoT)-enabled smart homes is one of the major concerns of the research community. In the proposed scheme, the sink node not only aggregates the data but also enables the early detection of false data injection and replay attacks. According to the security analysis, the proposed approach offers adequate security. The smart grid distributes power and facilitates a two-way communications channel that leads to transparency and developing trust.
Collapse
Affiliation(s)
- Wajahat Ali
- Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan;
| | - Ikram Ud Din
- Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan;
- Correspondence: (I.U.D.); (B.-S.K.)
| | - Ahmad Almogren
- Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia;
| | - Byung-Seo Kim
- Department of Software and Communications Engineering, Hongik University, Sejong 30016, Korea
- Correspondence: (I.U.D.); (B.-S.K.)
| |
Collapse
|
3
|
Kausar N, Din IU, Khan MA, Almogren A, Kim BS. GRA-PIN: A Graphical and PIN-Based Hybrid Authentication Approach for Smart Devices. Sensors (Basel) 2022; 22:s22041349. [PMID: 35214251 PMCID: PMC8962968 DOI: 10.3390/s22041349] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/05/2022] [Revised: 02/02/2022] [Accepted: 02/07/2022] [Indexed: 02/01/2023]
Abstract
In many smart devices and numerous digital applications, authentication mechanisms are widely used to validate the legitimacy of users’ identification. As a result of the increased use of mobile devices, most people tend to save sensitive and secret information over such devices. Personal Identification Number (PIN)-based and alphanumeric passwords are simple to remember, but at the same time, they are vulnerable to hackers. Being difficult to guess and more user-friendly, graphical passwords have grown in popularity as an alternative to all such textual passwords. This paper describes an innovative, hybrid, and much more robust user authentication approach, named GRA-PIN (GRAphical and PIN-based), which combines the merits of both graphical and pin-based techniques. The feature of simple arithmetic operations (addition and subtraction) is incorporated in the proposed scheme, through which random passwords are generated for each login attempt. In the study, we have conducted a comparative study between the GRA-PIN scheme with existing PIN-based and pattern-based (swipe-based) authentications approaches using the standard Software Usability Scale (SUS). The usability score of GRA-PIN was analyzed to be as high as 94%, indicating that it is more reliable and user friendly. Furthermore, the security of the proposed scheme was challenged through an experiment wherein three different attackers, having a complete understanding of the proposed scheme, attempted to crack the technique via shoulder surfing, guessing, and camera attack, but they were unsuccessful.
Collapse
Affiliation(s)
- Nabeela Kausar
- Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan; (N.K.); (M.A.K.)
| | - Ikram Ud Din
- Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan; (N.K.); (M.A.K.)
- Correspondence: (I.U.D.); (B.-S.K.)
| | - Mudassar Ali Khan
- Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan; (N.K.); (M.A.K.)
| | - Ahmad Almogren
- Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia;
| | - Byung-Seo Kim
- Department of Software and Communications Engineering, Hongik University, Sejong 30016, Korea
- Correspondence: (I.U.D.); (B.-S.K.)
| |
Collapse
|
4
|
Awan KA, Din IU, Almogren A, Kim BS, Altameem A. vTrust: An IoT-Enabled Trust-Based Secure Wireless Energy Sharing Mechanism for Vehicular Ad Hoc Networks. Sensors (Basel) 2021; 21:7363. [PMID: 34770672 PMCID: PMC8587153 DOI: 10.3390/s21217363] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/28/2021] [Revised: 11/01/2021] [Accepted: 11/02/2021] [Indexed: 11/29/2022]
Abstract
Vehicular Ad hoc Network (VANET) is a modern concept that enables network nodes to communicate and disseminate information. VANET is a heterogeneous network, due to which the VANET environment exposes to have various security and privacy challenges. In the future, the automobile industry will progress towards assembling electric vehicles containing energy storage batteries employing these resources to travel as an alternative to gasoline/petroleum. These vehicles may have the capability to share their energy resources upon the request of vehicles having limited energy resources. In this article, we have proposed a trust management-based secure energy sharing mechanism, named vTrust, which computes the trust degree of nodes to authenticate nodes. The proposed mechanism is a multi-leveled centralized approach utilizing both the infrastructure and vehicles to sustain a secure environment. The proposed vTrust can aggregate and propagate the degree of trust to enhance scalability. The node that requests to obtain the energy resources may have to maintain a specified level of trust threshold for earning resources. We have also evaluated the performance of the proposed mechanism against several existing approaches and determine that the proposed mechanism can efficiently manage a secure environment during resource sharing by maintaining average malicious nodes detection of 91.3% and average successful energy sharing rate of 89.5%, which is significantly higher in comparison to the existing approaches.
Collapse
Affiliation(s)
- Kamran Ahmad Awan
- Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan; (K.A.A.); (I.U.D.)
| | - Ikram Ud Din
- Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan; (K.A.A.); (I.U.D.)
| | - Ahmad Almogren
- Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia
| | - Byung-Seo Kim
- Department of Software and Communication Engineering, Hongik University, Sejong 30016, Korea
| | - Ayman Altameem
- Department of Natural and Engineering Sciences, College of Applied Studies and Community Services, King Saud University, Riyadh 11543, Saudi Arabia;
| |
Collapse
|
5
|
Khattak HA, Tehreem K, Almogren A, Ameer Z, Din IU, Adnan M. Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities. Journal of Information Security and Applications 2020. [DOI: 10.1016/j.jisa.2020.102615] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
|
6
|
Awan KA, Ud Din I, Almogren A, Almajed H. AgriTrust-A Trust Management Approach for Smart Agriculture in Cloud-based Internet of Agriculture Things. Sensors (Basel) 2020; 20:s20216174. [PMID: 33138295 PMCID: PMC7662657 DOI: 10.3390/s20216174] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/28/2020] [Revised: 10/14/2020] [Accepted: 10/26/2020] [Indexed: 02/04/2023]
Abstract
Internet of Things (IoT) provides a diverse platform to automate things where smart agriculture is one of the most promising concepts in the field of Internet of Agriculture Things (IoAT). Due to the requirements of more processing power for computations and predictions, the concept of Cloud-based smart agriculture is proposed for autonomic systems. This is where digital innovation and technology helps to improve the quality of life in the area of urbanization expansion. For the integration of cloud in smart agriculture, the system is shown to have security and privacy challenges, and most significantly, the identification of malicious and compromised nodes along with a secure transmission of information between sensors, cloud, and base station (BS). The identification of malicious and compromised node among soil sensors communicating with the BS is a notable challenge in the BS to cloud communications. The trust management mechanism is proposed as one of the solutions providing a lightweight approach to identify these nodes. In this article, we have proposed a novel trust management mechanism to identify malicious and compromised nodes by utilizing trust parameters. The trust mechanism is an event-driven process that computes trust based on the pre-defined time interval and utilizes the previous trust degree to develop an absolute trust degree. The system also maintains the trust degree of a BS and cloud service providers using distinct approaches. We have also performed extensive simulations to evaluate the performance of the proposed mechanism against several potential attacks. In addition, this research helps to create friendlier environments and efficient agricultural productions for the migration of people to the cities.
Collapse
Affiliation(s)
- Kamran Ahmad Awan
- Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan; (K.A.A.); (I.U.D.)
| | - Ikram Ud Din
- Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan; (K.A.A.); (I.U.D.)
| | - Ahmad Almogren
- Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia;
- Correspondence:
| | - Hisham Almajed
- Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia;
| |
Collapse
|
7
|
Haseeb K, Ud Din I, Almogren A, Islam N. An Energy Efficient and Secure IoT-Based WSN Framework: An Application to Smart Agriculture. Sensors (Basel) 2020; 20:s20072081. [PMID: 32272801 PMCID: PMC7180437 DOI: 10.3390/s20072081] [Citation(s) in RCA: 74] [Impact Index Per Article: 18.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/09/2020] [Revised: 03/21/2020] [Accepted: 04/04/2020] [Indexed: 11/25/2022]
Abstract
Wireless sensor networks (WSNs) have demonstrated research and developmental interests in numerous fields, like communication, agriculture, industry, smart health, monitoring, and surveillance. In the area of agriculture production, IoT-based WSN has been used to observe the yields condition and automate agriculture precision using various sensors. These sensors are deployed in the agricultural environment to improve production yields through intelligent farming decisions and obtain information regarding crops, plants, temperature measurement, humidity, and irrigation systems. However, sensors have limited resources concerning processing, energy, transmitting, and memory capabilities that can negatively impact agriculture production. Besides efficiency, the protection and security of these IoT-based agricultural sensors are also important from malicious adversaries. In this article, we proposed an IoT-based WSN framework as an application to smart agriculture comprising different design levels. Firstly, agricultural sensors capture relevant data and determine a set of cluster heads based on multi-criteria decision function. Additionally, the strength of the signals on the transmission links is measured while using signal to noise ratio (SNR) to achieve consistent and efficient data transmissions. Secondly, security is provided for data transmission from agricultural sensors towards base stations (BS) while using the recurrence of the linear congruential generator. The simulated results proved that the proposed framework significantly enhanced the communication performance as an average of 13.5% in the network throughput, 38.5% in the packets drop ratio, 13.5% in the network latency, 16% in the energy consumption, and 26% in the routing overheads for smart agriculture, as compared to other solutions.
Collapse
Affiliation(s)
- Khalid Haseeb
- Department of Computer Science, Islamia College Peshawar, Peshawar 25000, Pakistan; (K.H.); (N.I.)
| | - Ikram Ud Din
- Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan;
| | - Ahmad Almogren
- Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia
- Correspondence:
| | - Naveed Islam
- Department of Computer Science, Islamia College Peshawar, Peshawar 25000, Pakistan; (K.H.); (N.I.)
| |
Collapse
|
8
|
Asmat H, Din IU, Ullah F, Talha M, Khan M, Guizani M. ELC: Edge Linked Caching for content updating in information-centric Internet of Things. Computer Communications 2020; 156:174-182. [DOI: 10.1016/j.comcom.2020.03.049] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
9
|
Islam N, Faheem Y, Din IU, Talha M, Guizani M, Khalil M. A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services. Future Generation Computer Systems 2019; 100:569-578. [DOI: 10.1016/j.future.2019.05.059] [Citation(s) in RCA: 22] [Impact Index Per Article: 4.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
10
|
Jan B, Farman H, Khan M, Talha M, Din IU. Designing a Smart Transportation System: An Internet of Things and Big Data Approach. IEEE Wireless Commun 2019; 26:73-79. [DOI: 10.1109/mwc.2019.1800512] [Citation(s) in RCA: 17] [Impact Index Per Article: 3.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
11
|
Khan S, Islam N, Jan Z, Ud Din I, Rodrigues JJPC. A novel deep learning based framework for the detection and classification of breast cancer using transfer learning. Pattern Recognit Lett 2019. [DOI: 10.1016/j.patrec.2019.03.022] [Citation(s) in RCA: 145] [Impact Index Per Article: 29.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/24/2022]
|
12
|
Awan KA, Din IU, Zareei M, Talha M, Guizani M, Jadoon SU. HoliTrust-A Holistic Cross-Domain Trust Management Mechanism for Service-Centric Internet of Things. IEEE Access 2019; 7:52191-52201. [DOI: 10.1109/access.2019.2912469] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|