Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The heterogeneous nature of the Internet of Things (IoT) requires sophisticated and distributed security schemes for providing reliable communication. However, providing a unanimous security measure is a tedious task for heterogeneous devices is a complex task. This function requires multiple communication and information sharing constraints to be adapted by connected users. In this article, a distributed multi-party security computation framework for ensuring the security level of scalable information sharing and communications in heterogeneous IoT. This computation framework uses synchronized security measures through recurrent verification on different communicating ends of the devices. In this verification process, backpropagation learning verifies end-to-end security and the communication session between the connected devices. MPC is generally subject to a significant overhead for correspondence but has the benefit of being confidential even if pursued until a substantial percentage of the participants are aggressive and coordinated. Secret MPC exchanging will protect the specifications of both models and the training/inference information. The multi-party verification relies on both device and service providers for unanimously synchronizing the different security computations in a less complex manner. This framework is reliable in mitigating man-in-middle and information loss adversaries. The performance of the proposed method is verified using the metrics detection ratio, response rate, delay, and overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Ayoade G, El-Ghamry A, Karande V, Khan L, Alrahmawy M, Rashad MZ (2018) Secure data processing for IoT middleware systems. J Supercomput 75(8):4684–4709

    Article  Google Scholar 

  • Bae WI, Kwak J (2020) Smart card-based secure authentication protocol in multi-server IoT environment. Multimed Tools Appl 79(23):15793–15811

    Article  Google Scholar 

  • Bu L, Isakov M, Kinsy MA (2019) A secure and robust scheme for sharing confidential information in IoT systems. Ad Hoc Netw 92:101762

    Article  Google Scholar 

  • Choi J, In Y, Park C, Seok S, Seo H, Kim H (2016) Secure IoT framework and 2D architecture for End-To-End security. J Supercomput 74(8):3521–3535

    Article  Google Scholar 

  • Dhillon PK, Kalra S (2018) Multi-factor user authentication scheme for IoT-based healthcare services. J Reliable Intell Environ 4(3):141–160

    Article  Google Scholar 

  • Ghosh A, Chakraborty D, Law A (2018) Artificial intelligence in Internet of things. CAAI Trans Intell Technol 3(4):208–218

    Article  Google Scholar 

  • Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput Secur 78:126–142

    Article  Google Scholar 

  • He D, Kumar N, Zeadally S, Vinel A, Yang LT (2017) Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversariesm". IEEE Trans Smart Grid 8(5):2411–2419

    Article  Google Scholar 

  • Jegadeesan S, Azees M, Kumar PM, Manogaran G, Chilamkurti N, Varatharajan R, Hsu CH (019) An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications. Sustain Cities Soc 49:101522

    Article  Google Scholar 

  • Jurcut A, Niculcea T, Ranaweera P, Le-Khac N-A (2020) Security considerations for internet of things: a survey. SN Comput Sci 1(4):1–19

    Article  Google Scholar 

  • Lee H, Kang D, Ryu J, Won D, Kim H, Lee Y (2020) A three-factor anonymous user authentication scheme for Internet of Things environments. J Inf Secur Appl 52:102494

    Google Scholar 

  • Li Q, Zhu H, Xiong J, Mo R, Ying Z, Wang H (2019a) Fine-grained multi-authority access control in IoT-enabled mHealth. Ann Telecommun 74(7–8):389–400

    Article  Google Scholar 

  • Li J, Tang X, Wei Z, Wang Y, Chen W, Tan YA (2019) Identity-based multi-recipient public key encryption scheme and its application in IoT. Mobile Networks and Applications

  • Liu L, Wang H, Zhang Y (2020) Secure IoT data outsourcing with aggregate statistics and fine-grained access control. IEEE Access 8:95057–95067

    Article  Google Scholar 

  • Melki R, Noura HN, Chehab A (2019) Lightweight multi-factor mutual authentication protocol for IoT devices. Int J Inf Secur 19:679–694

  • Ostad-Sharif A, Arshad H, Nikooghadam M, Abbasinezhad-Mood D (2019) Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Futur Gener Comput Syst 100:882–892

    Article  Google Scholar 

  • Pešić S, Ivanović M, Radovanović M, Bădică C (2020) CAAVI-RICS model for observing the security of distributed IoT and edge computing systems. Simul Model Pract Theory 105:102125

    Article  Google Scholar 

  • Preeth SSL, Dhanalakshmi R, Kumar R, Shakeel PM (2018) An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for WSN-assisted IoT system. J Ambient Intell Humaniz Comput 1–13

  • Preeth SSL, Dhanalakshmi R, Shakeel PM (2019) An intelligent approach for energy efficient trajectory design for mobile sink based IoT supported wireless sensor networks. Peer-to-Peer Netw Appl 13:1–12

    Google Scholar 

  • Qadri YA, Ali R, Musaddiq A, Al-Turjman F, Kim DW, Kim SW (2020) The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. Cluster Comput 23(3):2047–65

  • Qiu J, Fan K, Zhang K, Pan Q, Li H, Yang Y (2019) An efficient multi-message and multi-receiver signcryption scheme for heterogeneous smart mobile IoT. IEEE Access 7:180205–180217

    Article  Google Scholar 

  • Riad K, Huang T, Ke L (2020) A dynamic and hierarchical access control for IoT in multi-authority cloud storage. J Netw Comput Appl 160:102633

    Article  Google Scholar 

  • Rizvi S, Pipetti R, Mcintyre N, Todd J, Williams I (2020) Threat model for securing internet of things (IoT) network at device-level. Internet of Things 11:100240

    Article  Google Scholar 

  • Salimi M, Mala H, Martin H, Peris-Lopez P (2020) Full-resilient memory-optimum multi-party non-interactive key exchange. IEEE Access 8:8821–8833

    Article  Google Scholar 

  • Santos ML, Carneiro JC, Franco AM, Teixeira FA, Henriques MA, Oliveira LB (2020) FLAT: federated lightweight authentication for the Internet of Things. Ad Hoc Netw 107:102253

    Article  Google Scholar 

  • Sheron PF, Sridhar KP, Baskar S, Shakeel PM (2020) A decentralized scalable security framework for end-to-end authentication of future IoT communication. Trans Emerg Telecommun Technol 31(12):e3815

    Google Scholar 

  • Thota C, Sundarasekar R, Manogaran G, Varatharajan R, Priyan MK (2018) Centralized fog computing security platform for iot and cloud in healthcare system. In: Exploring the convergence of big data and the internet of things. IGI Global, USA

  • Wang D, Bai B, Lei K, Zhao W, Yang Y, Han Z (2019) Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city. IEEE Access 7:54508–54521

    Article  Google Scholar 

  • Wang L, An H, Chang Z (2020) Security enhancement on a lightweight authentication scheme with anonymity fog computing architecture. IEEE Access 8:97267–97278

    Article  Google Scholar 

  • Wazid M, Das AK, Bhat V, Vasilakos AV (2020) LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment. J Netw Comput Appl 150:102496

    Article  Google Scholar 

  • Xi Z et al (2019) Research on underwater wireless sensor network and MAC protocol and location algorithm. IEEE Access 7:56606–56616

    Article  Google Scholar 

  • Yuan X, Yuan X, Li B, Wang C (2019) Toward secure and scalable computation in internet of things data applications. IEEE Internet Things J 6(2):3753–3763

    Article  Google Scholar 

  • Zhang P, Durresi M, Durresi A (2018) Multi-access edge computing aided mobility for privacy protection in internet of things. Computing 101(7):729–742

    Article  MathSciNet  Google Scholar 

  • Zhang Y, Ren F, Wu A, Zhang T, Cao J, Zheng D (2019) Certificateless multi-party authenticated encryption for NB-IoT terminals in 5G networks. IEEE Access 7:114721–114730

    Article  Google Scholar 

  • Zhang H, Yu J, Tian C, Xu G, Gao P, Lin J (2020) Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things. IEEE Internet Things J 7(4):2968–2981

    Article  Google Scholar 

  • Zhou L, Wang L, Sun Y, Lv P (2018) BeeKeeper: A blockchain-based IoT system with secure storage and homomorphic computation. IEEE Access 6:43472–43488

    Article  Google Scholar 

Download references

Acknowledgements

This Project was funded by the Deanship of Scientific Research (DSR), at King Abdulaziz University, Jeddah, under grant no. DF-684-830-1441. The author, therefore, acknowledges with thanks DSR for technical and financial support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yasser D. Al-Otaibi.

Ethics declarations

Conflict of interest

All authors declare that they have no conflict of interests.

Ethical approval

All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Communicated by Vicente Garcia Diaz.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Otaibi, Y.D. Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices. Soft Comput 25, 12131–12144 (2021). https://doi.org/10.1007/s00500-021-05864-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-05864-5

Keywords