4.8 Article

An Efficient, Accountable, and Privacy-Preserving Access Control Scheme for Internet of Things in a Sharing Economy Environment

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 7, Issue 7, Pages 6634-6646

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.2975140

Keywords

Logic gates; Access control; Privacy; Servers; Internet of Things; Authentication; Anonymous authentication; mobility; privacy-preserving access control; service accountability; sharing economy

Funding

  1. National Natural Science Foundation of China [61972371]
  2. Youth Innovation Promotion Association Chinese Academy of Sciences [2016394]

Ask authors/readers for more resources

The Internet of Things (IoT) has set off a new information technology revolution due to its convenience and efficiency. An IoT enables sharing economy, as more people are willing to share their own things (mostly mobile devices) to leverage the under-used value. In such a situation where owners and users are often not familiar with each other, an efficient access control mechanism is needed to deal with the trust issue and support service accountability to help owners accurately get their deserved profits. Besides, in such a sharing economy environment, the mobility of most shared IoT devices and their privacy preserving should also be taken into account. Regrettably, the existing schemes cannot achieve all of the aforementioned goals simultaneously and only few schemes were implemented to evaluate the claimed performance. In this article, we propose an efficient, accountable, and privacy-preserving access control solution for IoT in a sharing economy environment. In our scheme, we utilize the one-time signature to achieve anonymous authentication and let gateways store the signatures as service credentials for accountability. Meanwhile, we adopt the identity-based authentication to exclude malicious gateways and shared devices from the system and design a specialized protocol for those devices moving with the users. We conduct a detailed security analysis to show that our scheme can effectively defend against potential attacks, and also implement a prototype system to demonstrate that our design is indeed an efficient one.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

Predicting users' behavior using mouse movement information: an information foraging theory perspective

Amit Kumar Jaiswal, Prayag Tiwari, M. Shamim Hossain

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

Convolutional neural network-based models for diagnosis of breast cancer

Mehedi Masud, Amr E. Eldin Rashed, M. Shamim Hossain

Summary: Breast cancer is a common and deadly disease affecting millions of women worldwide. Researchers have proposed various convolutional neural network models to assist in diagnostic process. However, the lack of standard models and large datasets for training and validation remains a challenge. This study explores the use of transfer learning and evaluates eight pre-trained models on ultrasound images of breast cancers, as well as introduces a custom convolutional neural network that outperforms the pre-trained models.

NEURAL COMPUTING & APPLICATIONS (2022)

Article Computer Science, Artificial Intelligence

Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach

Heena Rathore, Amr Mohamed, Mohsen Guizani, Shailendra Rathore

Summary: This paper introduces a machine learning approach called NueroFATH for the physical assessment of athletes. It uses neural networks and fuzzy c-means techniques to predict the potential of athletes winning medals. The study also identifies important physical characteristics related to the assessment results.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Theory & Methods

AI-enabled remote monitoring of vital signs for COVID-19: methods, prospects and challenges

Honnesh Rohmetra, Navaneeth Raghunath, Pratik Narang, Vinay Chamola, Mohsen Guizani, Naga Rajiv Lakkaniga

Summary: The COVID-19 pandemic has overwhelmed healthcare systems and posed risks to healthcare professionals. Remote monitoring of patient symptoms using machine learning and deep learning techniques offers a promising solution, utilizing common devices like smartphones.

COMPUTING (2023)

Article Computer Science, Artificial Intelligence

A deep learning-based approach for fault diagnosis of current-carrying ring in catenary system

Yuwen Chen, Bin Song, Yuan Zeng, Xiaojiang Du, Mohsen Guizani

Summary: This study proposes a fault diagnosis method for the current-carrying ring based on an improved CenterNet model in the Industrial Internet of Things. By using attention modules and weighted loss, the accuracy of fault diagnosis for the current-carrying rings is improved.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

Res-CovNet: an internet of medical health things driven COVID-19 framework using transfer learning

Mangena Venu Madhavan, Aditya Khamparia, Deepak Gupta, Sagar Pande, Prayag Tiwari, M. Shamim Hossain

Summary: Major countries are facing difficulties due to the COVID-19 pandemic. Existing medical practices, such as PCR and RT-PCR, may result in false positives and false negatives when identifying COVID-19 symptoms. CT imaging or X-rays of the lungs can provide more accurate identification of patients with COVID-19 symptoms. Automating the identification of COVID-19 using feasible technology can improve facilities. The Res-CovNet framework is a hybrid methodology that integrates different platforms into a single platform to identify and classify pneumonia and COVID-19 cases.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Computer Science, Hardware & Architecture

On Softwarization of Intelligence in 6G Networks for Ultra-Fast Optimal Policy Selection: Challenges and Opportunities

Sherief Hashima, Zubair Md Fadlullah, Mostafa M. Fouda, Ehab Mahmoud Mohamed, Kohei Hatano, Basem M. ElHalawany, Mohsen Guizani

Summary: This article introduces the concept of intelligent softwareization in 6G networks to address the impact of dynamically changing environments on reliability. Through evaluation in multiple scenarios and the use of optimal strategies to meet various demands, the results show promising performance.

IEEE NETWORK (2023)

Article Computer Science, Information Systems

Decentralized Renewable Resource Redistribution and Optimization for Beyond 5G Small Cell Base Stations: A Machine Learning Approach

Praveen Gorla, Mohammad Saif, Vinay Chamola, Biplab Sikdar, Mohsen Guizani

Summary: This article presents a novel machine learning-based framework for intelligent resource provisioning mechanisms for micro-grid connected green small cell base stations. By using prediction and energy flow control mechanisms, the article proposes an algorithmic implementation for redistribution of renewable resources, improving the resource management and traffic provisioning capability of small cell base stations.

IEEE SYSTEMS JOURNAL (2023)

Article Engineering, Civil

C-HealthIER: A Cooperative Health Intelligent Emergency Response System for C-ITS

Moayad Aloqaily, Haya Elayan, Mohsen Guizani

Summary: The advancement of wireless connectivity in smart cities enhances connections between key elements, and the federated intelligent health monitoring systems in autonomous vehicles contribute to improving quality of life. This study proposes C-HealthIER, a cooperative health intelligent emergency response system that monitors passengers' health and conducts cooperative behavior to reduce emergency treatment time and distance by sharing information between vehicles and infrastructure.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Multidisciplinary

Optimal User-Edge Assignment in Hierarchical Federated Learning Based on Statistical Properties and Network Topology Constraints

Naram Mhaisen, Alaa Awad Abdellatif, Amr Mohamed, Aiman Erbad, Mohsen Guizani

Summary: Distributed learning algorithms aim to utilize diverse data stored at users' devices to learn a global phenomena. However, when the data is strongly skewed, the performance of the global model can decrease. To tackle this issue, the paper proposes a hierarchical learning system that optimizes user-edge assignment to improve model accuracy.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Information Systems

LightTrust: Lightweight Trust Management for Edge Devices in Industrial Internet of Things

Ikram Ud Din, Aniqa Bano, Kamran Ahmad Awan, Ahmad Almogren, Ayman Altameem, Mohsen Guizani

Summary: The increasing usage of the Internet has improved the quality of trust in the Internet of Things (IoT). Trust plays a crucial role in providing a secure environment for users to share private information and enable easy and trustworthy data exchange among IoT devices. Trust management is essential for secure data transmission in a large-scale IoT network, and a lightweight approach called LightTrust is proposed to address security issues in Industrial IoT nodes. LightTrust utilizes a centralized trust agent to generate and manage trust certificates, and direct observations and recommendations are used to develop trust between nodes. Comparative simulations demonstrate the effectiveness and resilience of the proposed approach.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Electrical & Electronic

A Stream-Aware MPQUIC Scheduler for HTTP Traffic in Mobile Networks

Yitao Xing, Kaiping Xue, Yuan Zhang, Jiangping Han, Jian Li, David S. L. Wei, Ruidong Li, Qibin Sun, Jun Lu

Summary: The QUIC protocol is designed to improve HTTP traffic, and its extension, MPQUIC, provides higher bandwidth and smoother network handover. However, some issues in the existing MPQUIC, such as packet scheduling and managing dynamic network paths, hinder the improvement of HTTP traffic. This paper proposes a stream-aware per-packet scheduler, HBES, to address these issues and improve the performance of MPQUIC in mobile networks by providing fair bandwidth allocation and mitigating HoL blocking and excessive buffer usage.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2023)

Article Computer Science, Information Systems

Achieving Flexible and Lightweight Multipath Congestion Control Through Online Learning

Rui Zhuang, Jiangping Han, Kaiping Xue, Jian Li, David S. L. Wei, Ruidong Li, Qibin Sun, Jun Lu

Summary: The upgrade of network devices to be equipped with multiple network interfaces allows for the improvement of network throughput performance through multipath transmission protocols, especially MPTCP. However, the current mostly used MPTCP protocols have a common limitation of being rigid and conservative, leading to poor performance in realistic scenarios due to the dynamic nature of networks. In this paper, a lightweight multipath congestion control algorithm called MP-OL is proposed, which models congestion control as a multi-armed bandit problem and adjusts the sending rate of each subflow flexibly and adaptively through online learning. Experimental results have shown that MP-OL achieves significant improvements in fairness, link utilization, and resilience to non-congestion loss, making it suitable for various network scenarios and unstable network conditions.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2023)

Article Computer Science, Hardware & Architecture

An Online Learning Assisted Packet Scheduler for MPTCP in Mobile Networks

Yitao Xing, Kaiping Xue, Yuan Zhang, Jiangping Han, Jian Li, David S. L. Wei

Summary: Multipath TCP (MPTCP) aims to utilize multiple network paths for improved throughput and robustness, particularly in mobile networks. However, the challenge lies in effectively distributing packets over unstable and heterogeneous paths to devices with limited buffers. Existing packet scheduling algorithms have not achieved desired performance in dynamic scenarios, such as mobile networks. In this paper, an Online-Learning Assisted Packet Scheduler (OLAPS) is proposed to address this problem by modeling it as a multi-armed bandit problem. OLAPS adaptsively learns from network conditions and provides the highest possible throughput in a dynamic environment. The evaluation of OLAPS shows improved throughput performance compared to other in-kernel schedulers.

IEEE-ACM TRANSACTIONS ON NETWORKING (2023)

Article Computer Science, Hardware & Architecture

Motivating Learners in Multiorchestrator Mobile Edge Learning: A Stackelberg Game Approach Motiver les apprenants dans le cadre d'un apprentissage mobile multi-orchestrateur: Une approche par le jeu de Stackelberg

Mhd Saria Allahham, Amr Mohamed, Aiman Erbad, Mohsen Guizani

Summary: Mobile edge learning (MEL) is a learning paradigm that enables distributed training of machine learning models over heterogeneous edge devices. This study proposes an incentive mechanism to motivate the participation of edge devices in the training process and evaluates its performance through numerical experiments.

IEEE CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING (2023)

No Data Available