1. A framework for application-centric Internet of Things authentication
- Author
-
Nitinkumar Shingari and Beenu Mago
- Subjects
Authentication ,Digital signing ,IoT ,Key generation ,Transfer learning ,Technology - Abstract
The Internet of Things (IoT) has various security needs due to its diversified data management and application support. IoT processing platforms provide security guidelines to ensure that data is used correctly and without errors. This study proposes a Secure Tractable Authentication Scheme (STAS) for IoT-integrated real-time applications that considers the impact of data and associated applications. This approach is designed for rigorous user authentication and application signing. To improve service-level security, shared user credentials are validated at different access times. The new and previous properties are validated during the verification process to improve delegation and access. The transfer learning paradigm enables validation by updating and retaining prior authentication sessions as well as the current one. The access session maintains the learning state while increasing the trustworthiness of the verification. Authentication is achieved using tractable session-attached keys generated using normal digital signature processes. By reducing false positives and improving delegation security, end-to-end security between the Internet of Things and user applications is improved. Verification success percentage, service delay, and authentication time are utilized to validate the performance of the suggested technique.
- Published
- 2024
- Full Text
- View/download PDF