CFP last date
20 January 2025
Reseach Article

A New Approach to Mitigating Authentication Challenge for an Internet of Things Paradigm

by Adekunle A. Adeyelu, Oyeyemi E. Elusakin, Samera Uga-Otor, Ijeoma Rufina Godwin, Zakka Shirley John
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 8
Year of Publication: 2024
Authors: Adekunle A. Adeyelu, Oyeyemi E. Elusakin, Samera Uga-Otor, Ijeoma Rufina Godwin, Zakka Shirley John
10.5120/ijca2024923434

Adekunle A. Adeyelu, Oyeyemi E. Elusakin, Samera Uga-Otor, Ijeoma Rufina Godwin, Zakka Shirley John . A New Approach to Mitigating Authentication Challenge for an Internet of Things Paradigm. International Journal of Computer Applications. 186, 8 ( Feb 2024), 45-52. DOI=10.5120/ijca2024923434

@article{ 10.5120/ijca2024923434,
author = { Adekunle A. Adeyelu, Oyeyemi E. Elusakin, Samera Uga-Otor, Ijeoma Rufina Godwin, Zakka Shirley John },
title = { A New Approach to Mitigating Authentication Challenge for an Internet of Things Paradigm },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2024 },
volume = { 186 },
number = { 8 },
month = { Feb },
year = { 2024 },
issn = { 0975-8887 },
pages = { 45-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number8/a-new-approach-to-mitigating-authentication-challenge-for-an-internet-of-things-paradigm/ },
doi = { 10.5120/ijca2024923434 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-29T03:28:31.596462+05:30
%A Adekunle A. Adeyelu
%A Oyeyemi E. Elusakin
%A Samera Uga-Otor
%A Ijeoma Rufina Godwin
%A Zakka Shirley John
%T A New Approach to Mitigating Authentication Challenge for an Internet of Things Paradigm
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 8
%P 45-52
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The field of Internet of Things (IoT) has transpired as a field of incredible growth, impact and potential. Its technological advancement has led to the development of smart environments in which heterogeneous smart devices enable shared communication among one another. User authentication is one of the significant factors in the IoT environment as it allows the users to communicate with the devices securely. Integration of authentication technologies with IoT ensures secure data retrieval and robust access control. as the devices send and receive highly sensitive data for different purposes. If an attacker manages to steal or spoof biometric data, they could potentially bypass this factor. This study suggests another approach to securing a system through authentication. The new approach was an adaptation of the three factor (3FA) authentication technique introducing a graphical password alongside the traditional requirements. The algorithm was validated using Burrows, Abadi and Needham (BAN) logic. An informal security analysis was also conducted to verify the authenticity of this system. The algorithm is implemented using the Hypertext pre-Processor (PHP) programming language to build the user application interface for the control of the IoT devices. The implementation of this improved 3FA technique demonstrate highly improved security features when compared to other relevant security schemes

References
  1. F. Restuccia, S. D’Oro, and T. Melodia, “Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking,” IEEE Internet Things J., vol. 5, no. 6, pp. 4829–4842, 2018, doi: 10.1109/JIOT.2018.2846040.
  2. A. Giri, S. Dutta, S. Neogy, K. Dahal, and Z. Pervez, “Internet of things (IoT): A survey on architecture, enabling technologies, applications and challenges,” ACM Int. Conf. Proceeding Ser., 2017, doi: 10.1145/3109761.3109768.
  3. M. G. Samaila, M. Neto, D. A. B. Fernandes, M. M. Freire, and P. R. M. Inácio, “Challenges of securing Internet of Things devices: A survey,” Secur. Priv., vol. 1, no. 2, pp. 1–32, 2018, doi: 10.1002/spy2.20.
  4. B. H. Taher, H. Liu, F. Abedi, H. Lu, A. A. Yassin, and A. J. Mohammed, “A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications,” J. Sensors, vol. 2021, 2021, doi: 10.1155/2021/8871204.
  5. Z. Sharmin, R. M. Noor, T. K. Soon, I. Ahmedy, N. A. Abdullah, and Y. S. Poh, “IoT Based Multidimensional Mushroom Waste Management System in Urban Area,” 2021 3rd Int. Conf. Sustain. Technol. Ind. 4.0, STI 2021, vol. 0, pp. 18–19, 2021, doi: 10.1109/STI53101.2021.9732609.
  6. A. Ullah, M. A. Hossain, N. Zaman, M. Dey, and T. Kundu, “Enhanced Women Safety and Well-Suited Public Bus Management System in Bangladesh Using IoT,” Adv. Internet Things, vol. 09, no. 04, pp. 72–84, 2019, doi: 10.4236/ait.2019.94006.
  7. Shamshad, S., Mahmood, K., & Kumari, S. Comments on “A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things.” In Wireless Personal Communications (Vol. 112, Issue 1). 2020. https://doi.org/10.1007/s11277-020-07038-2
  8. Y. Zhang, J. Xu, Z. Wang, R. Geng, K.R. Choo, J. Perez-Diaz & D. Zhu, “Efficient and Intelligent Attack Detection in Software Defined IoT Networks,” 2020 IEEE Int. Conf. Embed. Softw. Syst. ICESS 2020, 2020, doi: 10.1109/ICESS49830.2020.9301591.
  9. M. Rana, A. Shafiq, L. Altaf, M. Alazab, K. Mahmood, S.A. Chaudry, Y.B. Zikria, “A secure and lightweight authentication scheme for next generation IoT infrastructure,” Comput. Commun., vol. 165, no. November 2020, pp. 85–96, 2021, doi: 10.1016/j.comcom.2020.11.002.
  10. J. Moon, D. Lee, Y. Lee, & D. Won, "Improving biometric-based authentication schemes with smart card revocation/reissue for wireless sensor networks". Sensors (Switzerland), 17(5). 2017, https://doi.org/10.3390/s17050940
  11. M. Fakroon, M. Alshahrani, F. Gebali, & I. Traore, "Secure remote anonymous user authentication scheme for smart home environment", Internet of Things (Netherlands), 9. 2020, https://doi.org/10.1016/j.iot.2020.100158
  12. M. Saqib, B. Jasra, & A. H. Moon. "A lightweight three factor authentication framework for IoT based critical applications", Journal of King Saud University - Computer and Information Sciences, 34(9), 6925–6937, 2022, https://doi.org/10.1016/j.jksuci.2021.07.023
Index Terms

Computer Science
Information Sciences
User authentication
Internet

Keywords

Internet of Things smart devices authentication 3FA BAN logic heterogeneous.