Article
Mathematics
Lili Jiang, Hui Cui
Summary: Based on attribute-based encryption (ABE), this paper proposes two private and mutual authentication protocols to protect the privacy of IoT devices. The first protocol is a three-message key exchange protocol, following the public-key encryption mode of the Internet Key Exchange (IKE). The second protocol is a one-round key exchange protocol, providing simplicity and efficiency in message communication between participants. Both protocols can be proven secure in the defined model. Finally, the two protocols are implemented in an open source framework.
Article
Computer Science, Information Systems
Dharminder Dharminder, Challa Bhageeratha Reddy, Ashok Kumar Das, Youngho Park, Sajjad Shaukat Jamal
Summary: This article presents an efficient lattice-based authenticated key exchange protocol for IoT-enabled smart devices. The protocol utilizes the reconciliation mechanism and is shown to be robust against various attacks through detailed security analysis. Simulation results in the NS-3 simulator demonstrate superior security, lower computational cost, and comparable communication cost compared to competing schemes.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Xuyang Ding, Xiaoxiang Wang, Ying Xie, Fagen Li
Summary: With the rapid development of IoT, the security issue has become more prominent, particularly in terms of the high resource costs of identity authentication protocols and the difficulty of keeping up with device upgrades. This article proposes an anonymous authentication protocol based on elliptic curve and signcryption techniques to reduce communication and computation costs for IoT devices.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Muhammad Tanveer, Ghulam Abbas, Ziaul Haq Abbas, Muhammad Bilal, Amrit Mukherjee, Kyung Sup Kwak
Summary: This article introduces a lightweight user AKE scheme (LAKE-6SH) for smart home networks, which establishes private session keys between users and network entities to achieve authenticity of RUs using the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. The scheme has been informally validated to be secure against various security attacks, and further validated formally through the random oracle model and Scyther validation. Additionally, LAKE-6SH is shown to provide better security features with low communication and computational overheads.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Shuai Chen, Bing Li, Ziheng Chen, Yan Zhang, Caicai Wang, Cheng Tao
Summary: This article introduces a lightweight protocol based on Shamir's secret sharing for preserving the privacy of physical unclonable function (PUF) in the Internet of Things (IoT). Protocol A randomizes the mappings between challenges and responses to resist machine learning attacks, while Protocol B realizes a mutual authentication protocol without exposing the response.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Automation & Control Systems
B. D. Deebak, Fida Hussain Memon, Sunder Ali Khowaja, Kapal Dev, Weizheng Wang, Nawab Muhammad Faseeh Qureshi
Summary: Cognitive-inspired Internet of Medical Things (CI-IoMT) combines cognitive science and artificial intelligence to analyze data generated by IoT devices and design smart communication systems for ubiquitous services. However, conventional protocols used in IoMT are vulnerable to quantum-computer attacks, necessitating an efficient CI-IoMT scheme for access privacy, preservation, and trust guarantee. This article proposes an identity-based seamless privacy preservation (IB-SPP) scheme that uses fast user authentication to shorten access timing. Simulation analysis shows that the proposed IB-SPP scheme has shorter response time and requires less data volume compared to existing schemes.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Chemistry, Multidisciplinary
Radoslaw Bulat, Marek R. Ogiela
Summary: The IoT is a specific type of network with unique communication challenges. A review and study of authentication methods for use in this context has resulted in a proposed preliminary algorithm. This algorithm encodes various factors into a single data vector to authenticate users in dispersed environments. Personalized protocols show potential in the IoT world, although further testing is needed for industry optimization.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Information Systems
Xu Yang, Xun Yi, Ibrahim Khalil, Junwei Luo, Elisa Bertino, Surya Nepal, Xinyi Huang
Summary: The article proposes a lightweight authentication scheme for mobile-edge computing-enabled Wireless Body Area Networks (WBANs) that provides robust security through comprehensive security analysis and is evaluated for performance in terms of computation, communication, and storage costs. The evaluation results demonstrate significant reductions in computation and communication costs compared to four other related schemes.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Jiangfeng Sun, Fazlullah Khan, Junxia Li, Mohammad Dahman Alshehri, Ryan Alturki, Mohammad Wedyan
Summary: This article presents a mutual authentication scheme for devices-to-server and vice versa in the operational Internet of Medical Things to ensure secure communication sessions among multiple mobile devices and servers. By introducing an offline phase for registration process, blocking potential intruder devices, and using encryption and decryption schemes, data reliability is ensured during communication sessions.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Engineering, Electrical & Electronic
D. S. Gupta, A. Karati, W. Saad, D. B. da Costa
Summary: This paper proposes a novel certificateless data authentication protocol for secure communication in the Internet of Vehicle (IoV) systems. The protocol utilizes lattice cryptography to resist quantum attack and employs a reliable blockchain mechanism for vehicles' trustworthiness in batch data verification. Rigorous formal analysis and performance analysis demonstrate the protocol's ability to ensure security and efficiency.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Computer Science, Information Systems
Jiani Fan, Wenzhuo Yang, Ziyao Liu, Jiawen Kang, Dusit Niyato, Kwok-Yan Lam, Hongyang Du
Summary: A smart city is a concept that aims to better serve residents through new technology. This article focuses on four major smart city domains: smart utility, smart transportation, smart homes, and smart healthcare. However, the existing smart city IoT solutions often lack appropriate security strategies. The objective of this article is to provide application designers with the missing security link they may need in order to improve their security designs.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Muhammad Nauman Khan, Asha Rao, Seyit Camtepe
Summary: The Internet of Things (IoT) is a growing technology that connects the cyber and physical worlds, with applications in various fields. However, the security challenges in IoT stem from the limited capabilities of smart devices. Lightweight cryptographic protocols address this issue but introduce vulnerabilities that require adaptive security protocols to cater to the asymmetric nature of IoT systems.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Muhammad Asad Saleem, Zahid Ghaffar, Khalid Mahmood, Ashok Kumar Das, Joel J. P. C. Rodrigues, Muhammad Khurram Khan
Summary: The Internet of Things has brought convenience to mobile services, but it is essential to ensure information security. Current authentication protocols are mostly inadequate for meeting new security requirements, highlighting the need for the development of protocols suitable for the IoT environment.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang
Summary: The research proposes the first identity-based redactable signature scheme for IoT applications, aiming to address the requirements of integrity and source authentication in healthcare data sharing with selective disclosure control. The scheme reduces costs associated with public-key infrastructure and proves its security in the random oracle model.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Xuefei Yin, Song Wang, Muhammad Shahzad, Jiankun Hu
Summary: Identity authentication is crucial in the IoT environment, with fingerprint authentication being a popular method to overcome password weaknesses. A proposed privacy-preserving fingerprint authentication system for IoT devices can effectively mitigate attacks, achieve equivalent accuracy to traditional systems, and be deployed on low-cost smart cards.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Teng Li, Ya Jiang, Chi Lin, Mohammad S. S. Obaidat, Yulong Shen, Jianfeng Ma
Summary: Propose DeepAG, a framework that utilizes system logs to detect threats and predict attack paths. DeepAG leverages transformer models to detect APT attack sequences and utilizes LSTM network for bi-directional attack path prediction. It also constructs attack graphs and offers mechanisms for adapting to new attack patterns.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Information Systems
Yanrong Lu, Ding Wang, Mohammad S. Obaidat, Pandi Vijayakumar
Summary: Cyber-physical system (CPS) combined with artificial intelligence (AI) is used to extract information from the large volumes of data in the Industrial Internet of Things (IIoT). However, the traditional host-centric communication model of the current Internet faces challenges due to the increasing data traffic and number of IIoT devices. To address this, we propose an information-centric networking (ICN)-based system model that processes data closer to the edge in CPS. We also propose an edge-assisted authentication scheme in CPS to protect against unauthorized access and reduce workload for resource-constrained devices.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Pooja Verma, Daya Sagar Gupta
Summary: The Intelligent Healthcare System aims to collect and analyze health information for improved and cost-effective medical treatment. However, privacy and security issues remain major challenges. To address these challenges, an efficient data authentication and aggregation protocol is introduced.
COMPUTER COMMUNICATIONS
(2023)
Article
Automation & Control Systems
Maryam Zia, Mohammad S. Obaidat, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, Shehzad Ashraf Chaudhry
Summary: Wireless Body Area Network (WBAN) is a crucial application of IoT, used to gather healthcare information from patients. Ensuring the security of this sensitive information is crucial. This article presents a secure and lightweight authentication protocol for WBAN, which outperforms other competing protocols in terms of scalability, security, and lightweight design. The protocol is proven to be resistant to major attacks and offers improved computation and communication costs efficiency of 20.3% and 12.3% respectively compared to competing protocols. The protocol's practical performance is also evaluated using the NS3 simulation tool.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Yuanyan Xie, Yu Guo, Zhenqiang Mi, Yang Yang, Mohammad S. Obaidat
Summary: This article proposes an edge-assisted instance segmentation method for resource-limited IoT devices. It offloads computation-intensive tasks from IoT devices to edge servers to speed up the inference processes. A data compression method and an adaptive computation offloading strategy are proposed to reduce communication cost and optimize latency requirements under volatile network conditions. Experimental results show that the method achieves lower latency with a slight drop in accuracy compared to existing methods.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Khan Muhammad, Hayat Ullah, Mohammad S. Obaidat, Amin Ullah, Arslan Munir, Muhammad Sajjad, Victor Hugo C. de Albuquerque
Summary: This article proposes an efficient deep-learning-based framework for multiperson salient soccer event recognition in the IoT-enabled FinTech. The framework performs event recognition through frames preprocessing, frame-level discriminative features extraction, and high-level events recognition in soccer videos. The results validate the suitability of the proposed framework for salient event recognition in Nx-IoT environments.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Ke Wang, Chien-Ming Chen, Mohammad S. Obaidat, Saru Kumari, Sachin Kumar, Jinyi Long
Summary: In recent years, voice-interaction-based control systems have gained attention for implementing IIoT technologies in industrial control systems. The development of automated semantic understanding is important for remote voice control and intelligent management and control. Sorting technologies are crucial in voice-interaction-enabled industrial central control systems. Deep learning methods have been popular for optimizing conventional retrieval-based question answering. This study proposes three deep semantic sorting models based on deep learning, which outperformed state-of-the-art text matching methods in candidate document sorting.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Engineering, Multidisciplinary
Zahid Ghaffar, Salman Shamshad, Khalid Mahmood, Mohammad S. Obaidat, Saru Kumari, Muhammad Khurram Khan
Summary: Cloud storage services require cost-effective, independent, and scalable functionality for efficient data management. Cloud repositories offer a convenient way to manage and access critical data. This article presents a secure authentication protocol that utilizes symmetric encryption and decryption algorithms to control data accessibility by cloud servers. The proposed protocol has been formally evaluated using the Random Oracle Model and implemented on the PythonAnywhere online cloud server, demonstrating its robustness against various attacks and its superior performance compared to related protocols.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Article
Robotics
Yuanyan Xie, Yu Guo, Zhenqiang Mi, Xiaokun Wang, Yang Yang, Mohammad S. S. Obaidat
Summary: This letter presents a novel indoor visual re-localization method for long-term autonomous robots. It proposes a scene graph model that incorporates object-level features and semantic relationships to overcome the influence of dynamic objects. The developed visual re-localization method, based on the scene graph model, adopts graph matching technologies to incorporate pairwise object interactions as important features for re-localization and designs a feature reweighting strategy to reduce the impact of outliers in dynamic scenes. The proposed method has been verified in both simulation environments and real-world scenarios, showing higher robustness to diverse object changes and comparable performance to state-of-the-art methods under illumination changes.
IEEE ROBOTICS AND AUTOMATION LETTERS
(2023)
Correction
Telecommunications
Pooja Verma, Daya Sagar Gupta
WIRELESS PERSONAL COMMUNICATIONS
(2023)
Article
Engineering, Multidisciplinary
Khalid Mahmood, Mohammad S. Obaidat, Zahid Ghaffar, Bander A. Alzahrani, Salman Shamshad, Muhammad Asad Saleem, Shafiq Hussain
Summary: This article introduces a cost-effective and secure authenticated scheme for cloud-assisted remote wearable health monitoring system and showcases its resistance against known security threats.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Article
Computer Science, Information Systems
Chun-I Fan, Hsin-Nan Kuo, Yung-Sheng Tu, Yuan-Chi Chei, Chu-Chia Chuang, Yu-Chun Tseng, Arijit Karati
Summary: Cloud gaming is a new trend in gameplay where users' actions are sent to the gaming server through the internet, game software data is processed in the cloud server, and the gaming screen is sent to the user's computer. It prevents users from spending money on unnecessary hardware upgrades and allows the same game to run on multiple platforms. The increasing popularity of 5G mobile network offers faster internet speed and reduced energy usage, making cloud gaming a more enjoyable experience. However, ensuring safe data access in the cloud and defending against network assaults are important challenges addressed in this paper, which proposes a robust system for secure and authentic game access through the cloud.
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING
(2023)
Article
Computer Science, Hardware & Architecture
Tajinder Singh, Madhu Kumari, Daya Sagar Gupta
Summary: This research proposes an approach inspired by context-based persuasion analysis for sentiment analysis to address the challenges in real-time series prediction and decision making using Bayesian belief network. The study highlights the importance of considering the impact of sentimental contextual polarity in social media and uses various techniques such as pre-processing, dependency parsing, and Bayesian network learning to analyze sentiment polarity. The findings emphasize the complexity and context-dependent mechanism behind sentiment analysis in social media.
NEW GENERATION COMPUTING
(2023)
Article
Engineering, Multidisciplinary
Jiankang Ren, Zheng Wang, Chi Lin, Mohammad S. Obaidat, Hongrui Xie, Haihui Zhu, Chunxiao Liu, Kaiwen Wang, Guozhen Tan
Summary: With the increasing use of common-off-the-shelf components and the drive towards remote communication, security has become a key consideration in embedded real-time systems. This article introduces an enhanced online randomized scheduling strategy, which breaks the deterministic task execution pattern to counteract timing side-channel attacks.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Proceedings Paper
Computer Science, Information Systems
Arijit Karati, Yu-Sheng Chang, Ting-Yu Chen
Summary: Public-key based authentication and key agreement (AKA) protocols have attracted attention for providing secure access. Existing three-factor AKA protocols often have reduced security, so finding a balance between security and usability and countering cloning risks is a challenge. To address this, we propose a lightweight three-factor AKA protocol for mobile devices that utilizes physical unclonable functions and extended chaotic maps.
PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023
(2023)