Seamless Authentication: For IoT-Big Data Technologies in Smart Industrial Application Systems

Technological developments in communication technologies in the form of hardware and software have made unilateral sensor connectivity over Internet access that facilitates data observation and measurement of physical entities. A technology known as Internet of Things (IoT) is commonly referred to as the connectivity of Internet devices that provides the communication interactivity between the physical and the cyber objects. One of the key objectives of Internet computing is to simplify human activities and improve the user experience and device access. To explore its basic challenges, big data is somehow diversified into smart-data intelligence that transforms the raw semantic data into smart-data. The transformation approaches realize the significance of productivity and financial gain, which in turn offers a better decision-making process and privacy preservation. Moreover, the intelligent system collects raw data from different devices that analyze the extracted information. Since IoT plays a significant role in the development of a new source dataset, a seamless authentication protocol (SAP) is preferably chosen to coalesce data inference, algorithm development, and technological advancement. The comparative analysis proves that the proposed SAP consumes less computation and communication overhead as compared to other authentication schemes.

[1]  Lixiang Li,et al.  An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography , 2015, Multimedia Tools and Applications.

[2]  Jun Li,et al.  Enabling Multi-Carrier Relay Selection by Sensing Fusion and Cascaded ANN for Intelligent Vehicular Communications , 2020 .

[3]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[4]  Ibrar Yaqoob,et al.  Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges , 2017, IEEE Access.

[5]  Fan Wu,et al.  A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[6]  Jacques Bou Abdo Authentication proxy as a service , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).

[7]  Shahid Mumtaz,et al.  Securing Cognitive Radio Networks using blockchains , 2020, Future Gener. Comput. Syst..

[8]  Qi Xie,et al.  Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model , 2017, IEEE Transactions on Information Forensics and Security.

[9]  Fadi Al-Turjman,et al.  IoT-BSFCAN: A smart context-aware system in IoT-Cloud using mobile-fogging , 2020, Future Gener. Comput. Syst..

[10]  Sandip Ray,et al.  The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction , 2016, IEEE Design & Test.

[11]  Jang-Eui Hong,et al.  Failure Detection and Prevention for Cyber-Physical Systems Using Ontology-Based Knowledge Base , 2018, Comput..

[12]  Samiran Chattopadhyay,et al.  An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments , 2020, Sensors.

[13]  L. Javier García-Villalba,et al.  Distributed Data Service for Data Management in Internet of Things Middleware , 2017, Sensors.

[14]  Mohammad Hayajneh,et al.  Data Management for the Internet of Things: Design Primitives and Solution , 2013, Sensors.

[15]  Jürgen Schmidhuber,et al.  Deep learning in neural networks: An overview , 2014, Neural Networks.

[16]  Ramin Yahyapour,et al.  A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications , 2017, 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud).

[17]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[18]  Wade Trappe,et al.  Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.

[19]  Wei Shen,et al.  An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing , 2019, Wirel. Commun. Mob. Comput..

[20]  Michael I. Jordan,et al.  Machine learning: Trends, perspectives, and prospects , 2015, Science.