Abstract
The heterogeneous nature of the Internet of Things (IoT) requires sophisticated and distributed security schemes for providing reliable communication. However, providing a unanimous security measure is a tedious task for heterogeneous devices is a complex task. This function requires multiple communication and information sharing constraints to be adapted by connected users. In this article, a distributed multi-party security computation framework for ensuring the security level of scalable information sharing and communications in heterogeneous IoT. This computation framework uses synchronized security measures through recurrent verification on different communicating ends of the devices. In this verification process, backpropagation learning verifies end-to-end security and the communication session between the connected devices. MPC is generally subject to a significant overhead for correspondence but has the benefit of being confidential even if pursued until a substantial percentage of the participants are aggressive and coordinated. Secret MPC exchanging will protect the specifications of both models and the training/inference information. The multi-party verification relies on both device and service providers for unanimously synchronizing the different security computations in a less complex manner. This framework is reliable in mitigating man-in-middle and information loss adversaries. The performance of the proposed method is verified using the metrics detection ratio, response rate, delay, and overhead.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ayoade G, El-Ghamry A, Karande V, Khan L, Alrahmawy M, Rashad MZ (2018) Secure data processing for IoT middleware systems. J Supercomput 75(8):4684–4709
Bae WI, Kwak J (2020) Smart card-based secure authentication protocol in multi-server IoT environment. Multimed Tools Appl 79(23):15793–15811
Bu L, Isakov M, Kinsy MA (2019) A secure and robust scheme for sharing confidential information in IoT systems. Ad Hoc Netw 92:101762
Choi J, In Y, Park C, Seok S, Seo H, Kim H (2016) Secure IoT framework and 2D architecture for End-To-End security. J Supercomput 74(8):3521–3535
Dhillon PK, Kalra S (2018) Multi-factor user authentication scheme for IoT-based healthcare services. J Reliable Intell Environ 4(3):141–160
Ghosh A, Chakraborty D, Law A (2018) Artificial intelligence in Internet of things. CAAI Trans Intell Technol 3(4):208–218
Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput Secur 78:126–142
He D, Kumar N, Zeadally S, Vinel A, Yang LT (2017) Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversariesm". IEEE Trans Smart Grid 8(5):2411–2419
Jegadeesan S, Azees M, Kumar PM, Manogaran G, Chilamkurti N, Varatharajan R, Hsu CH (019) An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications. Sustain Cities Soc 49:101522
Jurcut A, Niculcea T, Ranaweera P, Le-Khac N-A (2020) Security considerations for internet of things: a survey. SN Comput Sci 1(4):1–19
Lee H, Kang D, Ryu J, Won D, Kim H, Lee Y (2020) A three-factor anonymous user authentication scheme for Internet of Things environments. J Inf Secur Appl 52:102494
Li Q, Zhu H, Xiong J, Mo R, Ying Z, Wang H (2019a) Fine-grained multi-authority access control in IoT-enabled mHealth. Ann Telecommun 74(7–8):389–400
Li J, Tang X, Wei Z, Wang Y, Chen W, Tan YA (2019) Identity-based multi-recipient public key encryption scheme and its application in IoT. Mobile Networks and Applications
Liu L, Wang H, Zhang Y (2020) Secure IoT data outsourcing with aggregate statistics and fine-grained access control. IEEE Access 8:95057–95067
Melki R, Noura HN, Chehab A (2019) Lightweight multi-factor mutual authentication protocol for IoT devices. Int J Inf Secur 19:679–694
Ostad-Sharif A, Arshad H, Nikooghadam M, Abbasinezhad-Mood D (2019) Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Futur Gener Comput Syst 100:882–892
Pešić S, Ivanović M, Radovanović M, Bădică C (2020) CAAVI-RICS model for observing the security of distributed IoT and edge computing systems. Simul Model Pract Theory 105:102125
Preeth SSL, Dhanalakshmi R, Kumar R, Shakeel PM (2018) An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for WSN-assisted IoT system. J Ambient Intell Humaniz Comput 1–13
Preeth SSL, Dhanalakshmi R, Shakeel PM (2019) An intelligent approach for energy efficient trajectory design for mobile sink based IoT supported wireless sensor networks. Peer-to-Peer Netw Appl 13:1–12
Qadri YA, Ali R, Musaddiq A, Al-Turjman F, Kim DW, Kim SW (2020) The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. Cluster Comput 23(3):2047–65
Qiu J, Fan K, Zhang K, Pan Q, Li H, Yang Y (2019) An efficient multi-message and multi-receiver signcryption scheme for heterogeneous smart mobile IoT. IEEE Access 7:180205–180217
Riad K, Huang T, Ke L (2020) A dynamic and hierarchical access control for IoT in multi-authority cloud storage. J Netw Comput Appl 160:102633
Rizvi S, Pipetti R, Mcintyre N, Todd J, Williams I (2020) Threat model for securing internet of things (IoT) network at device-level. Internet of Things 11:100240
Salimi M, Mala H, Martin H, Peris-Lopez P (2020) Full-resilient memory-optimum multi-party non-interactive key exchange. IEEE Access 8:8821–8833
Santos ML, Carneiro JC, Franco AM, Teixeira FA, Henriques MA, Oliveira LB (2020) FLAT: federated lightweight authentication for the Internet of Things. Ad Hoc Netw 107:102253
Sheron PF, Sridhar KP, Baskar S, Shakeel PM (2020) A decentralized scalable security framework for end-to-end authentication of future IoT communication. Trans Emerg Telecommun Technol 31(12):e3815
Thota C, Sundarasekar R, Manogaran G, Varatharajan R, Priyan MK (2018) Centralized fog computing security platform for iot and cloud in healthcare system. In: Exploring the convergence of big data and the internet of things. IGI Global, USA
Wang D, Bai B, Lei K, Zhao W, Yang Y, Han Z (2019) Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city. IEEE Access 7:54508–54521
Wang L, An H, Chang Z (2020) Security enhancement on a lightweight authentication scheme with anonymity fog computing architecture. IEEE Access 8:97267–97278
Wazid M, Das AK, Bhat V, Vasilakos AV (2020) LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment. J Netw Comput Appl 150:102496
Xi Z et al (2019) Research on underwater wireless sensor network and MAC protocol and location algorithm. IEEE Access 7:56606–56616
Yuan X, Yuan X, Li B, Wang C (2019) Toward secure and scalable computation in internet of things data applications. IEEE Internet Things J 6(2):3753–3763
Zhang P, Durresi M, Durresi A (2018) Multi-access edge computing aided mobility for privacy protection in internet of things. Computing 101(7):729–742
Zhang Y, Ren F, Wu A, Zhang T, Cao J, Zheng D (2019) Certificateless multi-party authenticated encryption for NB-IoT terminals in 5G networks. IEEE Access 7:114721–114730
Zhang H, Yu J, Tian C, Xu G, Gao P, Lin J (2020) Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things. IEEE Internet Things J 7(4):2968–2981
Zhou L, Wang L, Sun Y, Lv P (2018) BeeKeeper: A blockchain-based IoT system with secure storage and homomorphic computation. IEEE Access 6:43472–43488
Acknowledgements
This Project was funded by the Deanship of Scientific Research (DSR), at King Abdulaziz University, Jeddah, under grant no. DF-684-830-1441. The author, therefore, acknowledges with thanks DSR for technical and financial support.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors declare that they have no conflict of interests.
Ethical approval
All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Communicated by Vicente Garcia Diaz.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Al-Otaibi, Y.D. Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices. Soft Comput 25, 12131–12144 (2021). https://doi.org/10.1007/s00500-021-05864-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-021-05864-5