Skip to main content

Authentication and Authorization of IoT Edge Devices Using Artificial Intelligence

  • Conference paper
  • First Online:
Internet of Things. Advances in Information and Communication Technology (IFIPIoT 2023)

Abstract

The field of Internet of Things (IoT) has experienced rapid growth, but it has also introduced significant security and privacy challenges. In particular, the authentication and authorization of edge devices pose major concerns due to their limited resources. While various solutions have been proposed, most of them rely on increasing the computing power, storage, and power capabilities of edge devices. However, these solutions are not practical because of the constraints imposed by the small size and cost-effectiveness requirements of IoT edge devices. Some suggestions involve the use of lightweight cryptographic primitives, but not all edge devices have the necessary resources to implement such solutions. This paper presents a novel approach to addressing the authentication and authorization challenges in edge devices by leveraging artificial intelligence (AI). The proposed solution adopts a fog computing model within the framework of a smart home, but it does not depend on the computational or storage capabilities of the edge devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Iot connected devices to reach 20.4 billion by 2020, says gartner. https://which-50.com/iot-connected-devices-reach-20-4-billion-2020-says-gartner/

  2. Columbus, L.: (2017) Internet of things market to reach \$267b by 2020. https://www.forbes.com/sites/louiscolumbus/2017/01/29/internet-of-things-market-to-reach-267b-by-2020/#1a073d14609b

  3. Framingham, M.: Idc forecasts worldwide spending on the internet of things to reach \$772 billion in 2018 (2017). https://www.idc.com/getdoc.jsp?containerId=prUS43295217

  4. Zareen, M.S., Tariq, M.: Internet of things (IoT): the next paradigm shift but whats the delay? In: 17th IEEE International Multi Topic Conference 2014, pp. 143–148, December 2014

    Google Scholar 

  5. El-Mougy, A., Al-Shiab, I., Ibnkahla, M.: Scalable personalized IoT networks. Proc. IEEE 107(4), 695–710 (2019)

    Article  Google Scholar 

  6. Bonomi, F., Milito, R.: Fog computing and its role in the internet of things. In: Proceedings of the MCC Workshop on Mobile Cloud Computing, August 2012

    Google Scholar 

  7. Zareen, M.S., Tahir, S., Akhlaq, M., Aslam, B.: Artificial intelligence/machine learning in IoT for authentication and authorization of edge devices. In: 2019 International Conference on Applied and Engineering Mathematics (ICAEM), pp. 220–224. IEEE (2019)

    Google Scholar 

  8. Roman, R., Lopez, J., Mambo, M., Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680–698 (2018). https://www.sciencedirect.com/science/article/pii/S0167739X16305635

  9. Iorga, M., Feldman, L., Barton, R., Martin, M.J., Goren, N., Mahmoudi, C.: Nist special publication 500–325 - fog computing conceptual model (2018) . https://doi.org/10.6028/NIST.SP.500-325

  10. Ibrahim, M.: Octopus: An edge-fog mutual authentication scheme. Int. J. Netw. Secur. 18, 1089–1101 (2016)

    Google Scholar 

  11. Jia, X., He, D., Kumar, N., Choo, K.K.R.: A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 14(1), 560–571 (2019)

    Article  Google Scholar 

  12. Xiong, L., Peng, D., Peng, T., Liang, H.: An enhanced privacy-aware authentication scheme for distributed mobile cloud computing services. KSII Trans. Internet Inf. Syst. 11, 6169–6187 (2017)

    Google Scholar 

  13. Chiang, M., Zhang, T.: Fog and IoT: an overview of research opportunities. IEEE Internet Things J. 3(6), 854–864 (2016)

    Article  Google Scholar 

  14. Sezer, O.B., Dogdu, E., Ozbayoglu, A.M.: Context-aware computing, learning, and big data in internet of things: a survey. IEEE Internet Things J. 5(1), 1–27 (2018)

    Article  Google Scholar 

  15. Wan, J., Jun, Y., Zhongren, W., Qingsong, H.: Artificial intelligence for cloud-assisted smart factory. IEEE Access 6, 55419–55430 (2018)

    Article  Google Scholar 

  16. Chin, W.S., soo Kim, H., Heo, Y.J., Jang, J.W.: A context-based future network infrastructure for IoT services. In: Procedia Computer Science, vol. 56, pp. 266–270, 2015, the 10th International Conference on Future Networks and Communications (FNC 2015)/The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) Affiliated Workshops. https://www.sciencedirect.com/science/article/pii/S1877050915016889

  17. Blazek, P., Krejcar, O., Jun, D., Kuca, K.: Device security implementation model based on internet of things for a laboratory environment. IFAC-PapersOnLine 49(25), 419–424 (2016). 14th IFAC Conference on Programmable Devices and Embedded Systems PDES 2016. https://www.sciencedirect.com/science/article/pii/S2405896316327240

  18. Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques, 3rd ed. 225 Wyman Street, Waltham, MA 02451, Elsevier, USA (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Sharjeel Zareen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zareen, M.S., Tahir, S., Aslam, B. (2024). Authentication and Authorization of IoT Edge Devices Using Artificial Intelligence. In: Puthal, D., Mohanty, S., Choi, BY. (eds) Internet of Things. Advances in Information and Communication Technology. IFIPIoT 2023. IFIP Advances in Information and Communication Technology, vol 683. Springer, Cham. https://doi.org/10.1007/978-3-031-45878-1_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-45878-1_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-45877-4

  • Online ISBN: 978-3-031-45878-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics