Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications

There is a consistent rise in the usage of sensory devices while framing up the Internet-of-Things (IoT), which generates a large portion of data and increases exponential security concerns. IoT vision aims to provide maximum coverage among the objects/things within a diverse ecosystem comprised of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2023-05, Vol.130 (1), p.401-420
Hauptverfasser: Fathima, Nasreen, Banu, Reshma, Ahammed, G. F. Ali
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 420
container_issue 1
container_start_page 401
container_title Wireless personal communications
container_volume 130
creator Fathima, Nasreen
Banu, Reshma
Ahammed, G. F. Ali
description There is a consistent rise in the usage of sensory devices while framing up the Internet-of-Things (IoT), which generates a large portion of data and increases exponential security concerns. IoT vision aims to provide maximum coverage among the objects/things within a diverse ecosystem comprised of different types of devices/nodes, mainly called IoT Node. Compared with traditional networks, IoT provides higher scope to implement configuring proto-cols with scalable performance even in variable traffic and node mobility conditions. However, IoT poses various restrictions when it comes to implementing security policies. It does not adapt traditional complex cryptography-defined security protocol functions due to the bottleneck condition for energy and computational performance problems, which in longer runs affects the communication scenario. An efficient security mechanism is required to be designed to secure the communication between different objects/things with considerable preservation of data privacy in both local and global level of IoT. The study introduces a novel security framework, signature-based authentication schema, which enables a robust message authenticator to verify the message integrity during the data communication process by applying a signature scheme. The concept is modeled using mathematical computation to represent the core signature-based authentication scheme. The study outcome exhibits that the proposed system offers approximately 37.2% of reduced energy fluctuation and 56.3% reduced energy consumption compared with existing approaches over a large-scale IoT deployment test environment.
doi_str_mv 10.1007/s11277-023-10291-w
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2805488288</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2805488288</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-be66bc3eb757655e19a20793053d3945ed9d7ae58c1fc857fd786f91c3ab1f0f3</originalsourceid><addsrcrecordid>eNp9kEtLAzEURoMoWKt_wFXA9WgezSRZ1rcgKFjBXUgzN3V8ZOpNhlJ_vaMV3LkKXM75AoeQQ86OOWP6JHMutK6YkBVnwvJqtUVGXGlRGTl52iYjZoWtasHFLtnL-YWxQbNiRD5vUoEF-gINfWgXqU0Leo9dgKZHoKc-D_dzXzydoU85AtIHCD22ZU19aui0L8-QSht8abtEL9G_w6rDVxo7pN_TmKDQLtLZ87Cc6XS5fPuF8z7Zif4tw8HvOyaPlxezs-vq9u7q5mx6WwXJbanmUNfzIGGula6VAm69YNpKpmQj7URBYxvtQZnAYzBKx0abOloepJ_zyKIck6PN7hK7jx5ycS9dj2n40gnD1MQYYcxAiQ0VsMsZIboltu8e144z993YbRq7obH7aexWgyQ3Uh7gtAD8m_7H-gJp9oHY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2805488288</pqid></control><display><type>article</type><title>Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications</title><source>SpringerLink Journals - AutoHoldings</source><creator>Fathima, Nasreen ; Banu, Reshma ; Ahammed, G. F. Ali</creator><creatorcontrib>Fathima, Nasreen ; Banu, Reshma ; Ahammed, G. F. Ali</creatorcontrib><description>There is a consistent rise in the usage of sensory devices while framing up the Internet-of-Things (IoT), which generates a large portion of data and increases exponential security concerns. IoT vision aims to provide maximum coverage among the objects/things within a diverse ecosystem comprised of different types of devices/nodes, mainly called IoT Node. Compared with traditional networks, IoT provides higher scope to implement configuring proto-cols with scalable performance even in variable traffic and node mobility conditions. However, IoT poses various restrictions when it comes to implementing security policies. It does not adapt traditional complex cryptography-defined security protocol functions due to the bottleneck condition for energy and computational performance problems, which in longer runs affects the communication scenario. An efficient security mechanism is required to be designed to secure the communication between different objects/things with considerable preservation of data privacy in both local and global level of IoT. The study introduces a novel security framework, signature-based authentication schema, which enables a robust message authenticator to verify the message integrity during the data communication process by applying a signature scheme. The concept is modeled using mathematical computation to represent the core signature-based authentication scheme. The study outcome exhibits that the proposed system offers approximately 37.2% of reduced energy fluctuation and 56.3% reduced energy consumption compared with existing approaches over a large-scale IoT deployment test environment.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-023-10291-w</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Authentication ; Communication ; Communications Engineering ; Computer Communication Networks ; Cryptography ; Cybersecurity ; Data communication ; Data transfer (computers) ; Energy consumption ; Engineering ; Internet of Things ; Mathematical analysis ; Messages ; Networks ; Robustness (mathematics) ; Signal,Image and Speech Processing</subject><ispartof>Wireless personal communications, 2023-05, Vol.130 (1), p.401-420</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-be66bc3eb757655e19a20793053d3945ed9d7ae58c1fc857fd786f91c3ab1f0f3</citedby><cites>FETCH-LOGICAL-c319t-be66bc3eb757655e19a20793053d3945ed9d7ae58c1fc857fd786f91c3ab1f0f3</cites><orcidid>0000-0002-7361-8683</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-023-10291-w$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-023-10291-w$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,777,781,27905,27906,41469,42538,51300</link.rule.ids></links><search><creatorcontrib>Fathima, Nasreen</creatorcontrib><creatorcontrib>Banu, Reshma</creatorcontrib><creatorcontrib>Ahammed, G. F. Ali</creatorcontrib><title>Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>There is a consistent rise in the usage of sensory devices while framing up the Internet-of-Things (IoT), which generates a large portion of data and increases exponential security concerns. IoT vision aims to provide maximum coverage among the objects/things within a diverse ecosystem comprised of different types of devices/nodes, mainly called IoT Node. Compared with traditional networks, IoT provides higher scope to implement configuring proto-cols with scalable performance even in variable traffic and node mobility conditions. However, IoT poses various restrictions when it comes to implementing security policies. It does not adapt traditional complex cryptography-defined security protocol functions due to the bottleneck condition for energy and computational performance problems, which in longer runs affects the communication scenario. An efficient security mechanism is required to be designed to secure the communication between different objects/things with considerable preservation of data privacy in both local and global level of IoT. The study introduces a novel security framework, signature-based authentication schema, which enables a robust message authenticator to verify the message integrity during the data communication process by applying a signature scheme. The concept is modeled using mathematical computation to represent the core signature-based authentication scheme. The study outcome exhibits that the proposed system offers approximately 37.2% of reduced energy fluctuation and 56.3% reduced energy consumption compared with existing approaches over a large-scale IoT deployment test environment.</description><subject>Authentication</subject><subject>Communication</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Data communication</subject><subject>Data transfer (computers)</subject><subject>Energy consumption</subject><subject>Engineering</subject><subject>Internet of Things</subject><subject>Mathematical analysis</subject><subject>Messages</subject><subject>Networks</subject><subject>Robustness (mathematics)</subject><subject>Signal,Image and Speech Processing</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNp9kEtLAzEURoMoWKt_wFXA9WgezSRZ1rcgKFjBXUgzN3V8ZOpNhlJ_vaMV3LkKXM75AoeQQ86OOWP6JHMutK6YkBVnwvJqtUVGXGlRGTl52iYjZoWtasHFLtnL-YWxQbNiRD5vUoEF-gINfWgXqU0Leo9dgKZHoKc-D_dzXzydoU85AtIHCD22ZU19aui0L8-QSht8abtEL9G_w6rDVxo7pN_TmKDQLtLZ87Cc6XS5fPuF8z7Zif4tw8HvOyaPlxezs-vq9u7q5mx6WwXJbanmUNfzIGGula6VAm69YNpKpmQj7URBYxvtQZnAYzBKx0abOloepJ_zyKIck6PN7hK7jx5ycS9dj2n40gnD1MQYYcxAiQ0VsMsZIboltu8e144z993YbRq7obH7aexWgyQ3Uh7gtAD8m_7H-gJp9oHY</recordid><startdate>20230501</startdate><enddate>20230501</enddate><creator>Fathima, Nasreen</creator><creator>Banu, Reshma</creator><creator>Ahammed, G. F. Ali</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-7361-8683</orcidid></search><sort><creationdate>20230501</creationdate><title>Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications</title><author>Fathima, Nasreen ; Banu, Reshma ; Ahammed, G. F. Ali</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-be66bc3eb757655e19a20793053d3945ed9d7ae58c1fc857fd786f91c3ab1f0f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Authentication</topic><topic>Communication</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Data communication</topic><topic>Data transfer (computers)</topic><topic>Energy consumption</topic><topic>Engineering</topic><topic>Internet of Things</topic><topic>Mathematical analysis</topic><topic>Messages</topic><topic>Networks</topic><topic>Robustness (mathematics)</topic><topic>Signal,Image and Speech Processing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Fathima, Nasreen</creatorcontrib><creatorcontrib>Banu, Reshma</creatorcontrib><creatorcontrib>Ahammed, G. F. Ali</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Fathima, Nasreen</au><au>Banu, Reshma</au><au>Ahammed, G. F. Ali</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2023-05-01</date><risdate>2023</risdate><volume>130</volume><issue>1</issue><spage>401</spage><epage>420</epage><pages>401-420</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>There is a consistent rise in the usage of sensory devices while framing up the Internet-of-Things (IoT), which generates a large portion of data and increases exponential security concerns. IoT vision aims to provide maximum coverage among the objects/things within a diverse ecosystem comprised of different types of devices/nodes, mainly called IoT Node. Compared with traditional networks, IoT provides higher scope to implement configuring proto-cols with scalable performance even in variable traffic and node mobility conditions. However, IoT poses various restrictions when it comes to implementing security policies. It does not adapt traditional complex cryptography-defined security protocol functions due to the bottleneck condition for energy and computational performance problems, which in longer runs affects the communication scenario. An efficient security mechanism is required to be designed to secure the communication between different objects/things with considerable preservation of data privacy in both local and global level of IoT. The study introduces a novel security framework, signature-based authentication schema, which enables a robust message authenticator to verify the message integrity during the data communication process by applying a signature scheme. The concept is modeled using mathematical computation to represent the core signature-based authentication scheme. The study outcome exhibits that the proposed system offers approximately 37.2% of reduced energy fluctuation and 56.3% reduced energy consumption compared with existing approaches over a large-scale IoT deployment test environment.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-023-10291-w</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0002-7361-8683</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0929-6212
ispartof Wireless personal communications, 2023-05, Vol.130 (1), p.401-420
issn 0929-6212
1572-834X
language eng
recordid cdi_proquest_journals_2805488288
source SpringerLink Journals - AutoHoldings
subjects Authentication
Communication
Communications Engineering
Computer Communication Networks
Cryptography
Cybersecurity
Data communication
Data transfer (computers)
Energy consumption
Engineering
Internet of Things
Mathematical analysis
Messages
Networks
Robustness (mathematics)
Signal,Image and Speech Processing
title Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T23%3A03%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Integrated%20Signing%20Procedure%20Based%20Data%20Transfer%20Security%20and%20Authentication%20Framework%20for%20Internet%20of%20Things%20Applications&rft.jtitle=Wireless%20personal%20communications&rft.au=Fathima,%20Nasreen&rft.date=2023-05-01&rft.volume=130&rft.issue=1&rft.spage=401&rft.epage=420&rft.pages=401-420&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-023-10291-w&rft_dat=%3Cproquest_cross%3E2805488288%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2805488288&rft_id=info:pmid/&rfr_iscdi=true