Abstract
The field of Internet of Things (IoT) has experienced rapid growth, but it has also introduced significant security and privacy challenges. In particular, the authentication and authorization of edge devices pose major concerns due to their limited resources. While various solutions have been proposed, most of them rely on increasing the computing power, storage, and power capabilities of edge devices. However, these solutions are not practical because of the constraints imposed by the small size and cost-effectiveness requirements of IoT edge devices. Some suggestions involve the use of lightweight cryptographic primitives, but not all edge devices have the necessary resources to implement such solutions. This paper presents a novel approach to addressing the authentication and authorization challenges in edge devices by leveraging artificial intelligence (AI). The proposed solution adopts a fog computing model within the framework of a smart home, but it does not depend on the computational or storage capabilities of the edge devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Iot connected devices to reach 20.4 billion by 2020, says gartner. https://which-50.com/iot-connected-devices-reach-20-4-billion-2020-says-gartner/
Columbus, L.: (2017) Internet of things market to reach \$267b by 2020. https://www.forbes.com/sites/louiscolumbus/2017/01/29/internet-of-things-market-to-reach-267b-by-2020/#1a073d14609b
Framingham, M.: Idc forecasts worldwide spending on the internet of things to reach \$772 billion in 2018 (2017). https://www.idc.com/getdoc.jsp?containerId=prUS43295217
Zareen, M.S., Tariq, M.: Internet of things (IoT): the next paradigm shift but whats the delay? In: 17th IEEE International Multi Topic Conference 2014, pp. 143–148, December 2014
El-Mougy, A., Al-Shiab, I., Ibnkahla, M.: Scalable personalized IoT networks. Proc. IEEE 107(4), 695–710 (2019)
Bonomi, F., Milito, R.: Fog computing and its role in the internet of things. In: Proceedings of the MCC Workshop on Mobile Cloud Computing, August 2012
Zareen, M.S., Tahir, S., Akhlaq, M., Aslam, B.: Artificial intelligence/machine learning in IoT for authentication and authorization of edge devices. In: 2019 International Conference on Applied and Engineering Mathematics (ICAEM), pp. 220–224. IEEE (2019)
Roman, R., Lopez, J., Mambo, M., Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680–698 (2018). https://www.sciencedirect.com/science/article/pii/S0167739X16305635
Iorga, M., Feldman, L., Barton, R., Martin, M.J., Goren, N., Mahmoudi, C.: Nist special publication 500–325 - fog computing conceptual model (2018) . https://doi.org/10.6028/NIST.SP.500-325
Ibrahim, M.: Octopus: An edge-fog mutual authentication scheme. Int. J. Netw. Secur. 18, 1089–1101 (2016)
Jia, X., He, D., Kumar, N., Choo, K.K.R.: A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 14(1), 560–571 (2019)
Xiong, L., Peng, D., Peng, T., Liang, H.: An enhanced privacy-aware authentication scheme for distributed mobile cloud computing services. KSII Trans. Internet Inf. Syst. 11, 6169–6187 (2017)
Chiang, M., Zhang, T.: Fog and IoT: an overview of research opportunities. IEEE Internet Things J. 3(6), 854–864 (2016)
Sezer, O.B., Dogdu, E., Ozbayoglu, A.M.: Context-aware computing, learning, and big data in internet of things: a survey. IEEE Internet Things J. 5(1), 1–27 (2018)
Wan, J., Jun, Y., Zhongren, W., Qingsong, H.: Artificial intelligence for cloud-assisted smart factory. IEEE Access 6, 55419–55430 (2018)
Chin, W.S., soo Kim, H., Heo, Y.J., Jang, J.W.: A context-based future network infrastructure for IoT services. In: Procedia Computer Science, vol. 56, pp. 266–270, 2015, the 10th International Conference on Future Networks and Communications (FNC 2015)/The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) Affiliated Workshops. https://www.sciencedirect.com/science/article/pii/S1877050915016889
Blazek, P., Krejcar, O., Jun, D., Kuca, K.: Device security implementation model based on internet of things for a laboratory environment. IFAC-PapersOnLine 49(25), 419–424 (2016). 14th IFAC Conference on Programmable Devices and Embedded Systems PDES 2016. https://www.sciencedirect.com/science/article/pii/S2405896316327240
Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques, 3rd ed. 225 Wyman Street, Waltham, MA 02451, Elsevier, USA (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Zareen, M.S., Tahir, S., Aslam, B. (2024). Authentication and Authorization of IoT Edge Devices Using Artificial Intelligence. In: Puthal, D., Mohanty, S., Choi, BY. (eds) Internet of Things. Advances in Information and Communication Technology. IFIPIoT 2023. IFIP Advances in Information and Communication Technology, vol 683. Springer, Cham. https://doi.org/10.1007/978-3-031-45878-1_32
Download citation
DOI: https://doi.org/10.1007/978-3-031-45878-1_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45877-4
Online ISBN: 978-3-031-45878-1
eBook Packages: Computer ScienceComputer Science (R0)