Skip to main content
Log in

Internet of things-based secure architecture to automate industry

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The internet of things (IoT) represents a transformable breakthrough in the domain of intelligent devices, enabling essential functions such as data collection, management, and efficient storage. It has the potential to drive significant progress in various aspects of daily life, particularly within industrial environments where it can facilitate real-time product monitoring, information management, and status evaluation. Securing the authentication, authorization, and confidentiality of data within interconnected industrial IoT networks is of paramount importance. This study presents a secure lightweight IoT architecture that incorporates wireless sensor networks (WSN). Performance evaluation involves comparing the conventional security solutions with the proposed approach. The results demonstrate a 3% reduction in CPU cycles, 9% less execution time, a 3% decrease in memory capacity requirements, and a 9% improvement in security effectiveness. Additionally, the proposed model achieved enhanced cryptanalysis accuracy, registering at 97.34%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availibility

The data used to support the findings of this study are available from the corresponding author upon request.

Notes

  1. Source https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide

  2. Source https://iot-analytics.com/state-of-the-iot-2020-12-billion-iot-connections-surpassing-non-iot-for-the-first-time/

  3. Source https://developer.samsung.com/codelab/smartthings/device-sdk.html

  4. Source https://www.iotsecurityfoundation.org/reporting-front-row-from-the-iot-security-foundation-launch/

  5. Source https://github.com/mbaddeley/contikipy

  6. Source https://www.cryptopp.com/wiki/SPECK

  7. Source https://www.cryptopp.com/wiki/SIMON

References

  1. Ahmad, R., Alsmadi, I.: Machine learning approaches to IoT security: a systematic literature review. Internet Things 14, 100365 (2021)

    Article  Google Scholar 

  2. Pandey, N.K., Kumar, K., Saini, G., Mishra, A.K.: Security issues and challenges in cloud of things-based applications for industrial automation. Ann. Oper. Res. (2023). https://doi.org/10.1007/s10479-023-05285-7

    Article  Google Scholar 

  3. Bhatia, M., Ahanger, T.A., Manocha, A.: Artificial intelligence based real-time earthquake prediction. Eng. Appl. Artif. Intell. 120, 105856 (2023)

    Article  Google Scholar 

  4. Furkan, Y.Y.: Deep learning in cyber security for internet of things. Master’s thesis, Fen Bilimleri Enstitüsü (2018)

  5. Bhatia, M., Sood, S., Sood, V.: A novel quantum-inspired solution for high-performance energy-efficient data acquisition from IoT networks. J. Ambient. Intell. Humaniz. Comput. 14(5), 5001–5020 (2023)

    Article  Google Scholar 

  6. Li, L., Hu, X., Chen, K., He, K.: The applications of WiFi-based wireless sensor network in internet of things and smart grid. In: 2011 6th IEEE Conference on Industrial Electronics and Applications, pp. 789–793. IEEE (2011)

  7. Anselme, H.E., Tao, F.: A critical overview of industrial internet of things security and privacy issues using a layer-based hacking scenario. IEEE Internet Things J. 10, 21917–21941 (2023)

    Article  Google Scholar 

  8. Shirvani, M.H., Masdari, M.: A survey study on trust-based security in internet of things: challenges and issues. Internet Things 21, 100640 (2023)

    Article  Google Scholar 

  9. Kaur, A., Bhatia, M.: Stochastic game network based model for disaster management in smart industry. J. Ambient. Intell. Humaniz. Comput. 14(5), 5151–5169 (2023)

    Article  Google Scholar 

  10. Aminanto, M.E., Kim, K.: Improving detection of Wi-Fi impersonation by fully unsupervised deep learning. In: International Workshop on Information Security Applications, pp. 212–223. Springer, New York (2017)

  11. Bhatia, M.: Smart information analysis for health quality: decision tree approach. J. Ambient. Intell. Humaniz. Comput. 14(10), 14225–14236 (2023)

    Article  Google Scholar 

  12. Shi, C., Liu, J., Liu, H., Chen, Y.: Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In: Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 1–10 (2017)

  13. Alshahrani, H., Khan, A., Rizwan, M., Reshan, M.S.A., Sulaiman, A., Shaikh, A.: Intrusion detection framework for industrial internet of things using software defined network. Sustainability 15(11), 9001 (2023)

    Article  Google Scholar 

  14. Manocha, A., Sood, S.K., Bhatia, M.: Artificial intelligence-assisted water quality index determination for healthcare. Artif. Intell. Rev. 56(2), 2893–2915 (2023)

    Article  Google Scholar 

  15. Bhatia, M., Sood, S.: Quantum computing-inspired optimal power allocation mechanism in edge computing environment. IEEE Internet Things J. (2024). https://doi.org/10.1109/JIOT.2024.3358900

    Article  Google Scholar 

  16. Bhatia, M.: An AI-enabled secure framework for enhanced elder healthcare. Eng. Appl. Artif. Intell. 131, 107831 (2024)

    Article  Google Scholar 

  17. Azizan, A.H., Mostafa, S.A., Mustapha, A., Foozy, C.F.M., Wahab, M.H.A., Mohammed, M.A., Khalaf, B.A.: A machine learning approach for improving the performance of network intrusion detection systems. Ann. Emerg. Technol. Comput. 5(5), 201–208 (2021)

    Article  Google Scholar 

  18. Ahanger, T.A., Tariq, U., Aldaej, A., Almehizia, A., Bhatia, M.: IoT-inspired smart disaster evacuation framework. IEEE Internet Things J. 11, 12885–12892 (2023)

    Article  Google Scholar 

  19. Edwards, C., et al.: Real-time advanced analytics, automated production systems, and smart industrial value creation in sustainable manufacturing internet of things. J. Self-Gov. Manag. Econ. 9(2), 32–41 (2021)

    Article  Google Scholar 

  20. Manocha, A., Sood, S.K., Bhatia, M.: IoT-DEW computing-inspired real-time monitoring of indoor environment for irregular health prediction. IEEE Trans. Eng. Manag. 71, 1669–1682 (2023)

    Article  Google Scholar 

  21. Churcher, A., Ullah, R., Ahmad, J., Masood, F., Gogate, M., Alqahtani, F., Nour, B., Buchanan, W.J., et al.: An experimental analysis of attack classification using machine learning in IoT networks. Sensors 21(2), 446 (2021)

    Article  Google Scholar 

  22. Manocha, A., Sood, S.K., Bhatia, M.: IoT-digital twin-inspired smart irrigation approach for optimal water utilization. Sustain. Comput. 41, 100947 (2024)

    Google Scholar 

  23. Ling, Z., Luo, J., Yiling, X., Gao, C., Kui, W., Xinwen, F.: Security vulnerabilities of internet of things: a case study of the smart plug system. IEEE Internet Things J. 4(6), 1899–1909 (2017)

    Article  Google Scholar 

  24. Gupta, M., Singh, V.P., Gupta, K.K., Shukla, P.K.: An efficient image encryption technique based on two-level security for internet of things. Multimed. Tools Appl. 10, 1–21 (2022)

    Google Scholar 

  25. Ghaffar, Z., Alshahrani, A., Fayaz, M., Alghamdi, A.M., Gwak, J., et al.: A topical review on machine learning, software defined networking, internet of things applications: research limitations and challenges. Electronics 10(8), 880 (2021)

    Article  Google Scholar 

  26. Mousavi, S.K., Ghaffari, A., Besharat, S., Afshari, H.: Security of internet of things based on cryptographic algorithms: a survey. Wirel. Netw. 27(2), 1515–1555 (2021)

    Article  Google Scholar 

  27. Mao, W., Zhao, Z., Chang, Z., Min, G., Gao. Overview and open issues. In: IEEE Transactions on Industrial Informatics, Energy Efficient Industrial Internet of Things (2021)

  28. Zikria, Y.B., Ali, R., Afzal, M.K., Kim, S.W.: Opportunities, challenges, and solutions, next-generation internet of things (IoT) (2021)

  29. Rehman, A., Haseeb, K., Saba, T., Kolivand, H.: M-SMDM: a model of security measures using green internet of things with cloud integrated data management for smart cities. Environ. Technol. Innov. 24, 101802 (2021)

    Article  Google Scholar 

  30. Nguyen, D.C., Ding, M., Pathirana, P.N., Seneviratne, A., Li, J., Poor, H.V.: Federated learning for internet of things: a comprehensive survey. IEEE Commun. Surv. Tutor. 23(3), 1622–1658 (2021)

    Article  Google Scholar 

  31. Bhatt, S., Ragiri, P.R., et al.: Security trends in internet of things: a survey. SN Appl. Sci. 3(1), 1–14 (2021)

    Google Scholar 

  32. Abiodun, O.I., Abiodun, E.O., Alawida, M., Alkhawaldeh, R.S., Arshad, H.: A review on the security of the internet of things: challenges and solutions. Wirel. Pers. Commun. 119(3), 2603–2637 (2021)

    Article  Google Scholar 

  33. Somasundaram, R., Thirugnanam, M.: Review of security challenges in healthcare internet of things. Wirel. Netw. 27(8), 5503–5509 (2021)

    Article  Google Scholar 

  34. Adil, M., Jan, M.A., Mastorakis, S., Song, H., Jadoon, M.M., Abbas, S., Farouk, A.: Hash-MAC-DSDV: mutual authentication for intelligent IoT-based cyber-physical systems. IEEE Internet Things J. 9(22), 22173–22183 (2021)

    Article  Google Scholar 

  35. Tsai, T.-T., Chuang, Y.-H., Tseng, Y.-M., Huang, S.-S., Hung, Y.-H.: A leakage-resilient ID-based authenticated key exchange protocol with a revocation mechanism. IEEE Access 9, 128633–128647 (2021)

    Article  Google Scholar 

  36. Kang-Di, L., Zeng, G.-Q., Luo, X., Weng, J., Luo, W., Yongdong, W.: Evolutionary deep belief network for cyber-attack detection in industrial automation and control system. IEEE Trans. Ind. Inf. 17(11), 7618–7627 (2021)

    Article  Google Scholar 

  37. Wang, W., Han, J., Cheng, X., Zeng, X.: An energy-efficient crypto-extension design for RISC-V. Microelectron. J. 115, 105165 (2021)

    Article  Google Scholar 

  38. Seyhan, Tu.N.K., Nguyen, S.A., Cengiz, K.: Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. Clust. Comput. 25(3), 1–20 (2021)

    Google Scholar 

  39. Hemamalini, V., Mishra, A.K., Tyagi, A.K., Kakulapati, V.: Artificial intelligence-blockchain-enabled-internet of things-based cloud applications for next-generation society. In: Automated Secure Computing for Next-Generation Systems, pp. 65–82 (2024)

  40. Mittal, S., Singh, D.S., Balakumaran, Hemalatha, K.: Security of internet of things based on cryptographic algorithm. Int. J. Electron. Secur. Digit. Forensics 16(1), 28–39 (2024)

  41. Sayeduzzaman, Md., Hasan, T., Nasser, A.A., Negi, A.: An internet of things-integrated home automation with smart security system. In: Automated Secure Computing for Next-Generation Systems, pp. 243–273 (2024)

Download references

Acknowledgements

This study was conducted at Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia. The authors would like to thank and appreciate the University management for creating a great learning environment for the faculty and researchers.

Funding

The authors extend their appreciation to Prince Sattam bin Abdulaziz University for funding this research work through project number PSAU-2023/01/23595.

Author information

Authors and Affiliations

Authors

Contributions

All the authors have contributed equally to prepare this manuscript.

Corresponding author

Correspondence to Tariq Ahamed Ahanger.

Ethics declarations

Conflict of interest

The authors declare that they have no Conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aljumah, A., Ahanger, T.A. & Ullah, I. Internet of things-based secure architecture to automate industry. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04499-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04499-z

Keywords

Navigation