Abstract
The internet of things (IoT) represents a transformable breakthrough in the domain of intelligent devices, enabling essential functions such as data collection, management, and efficient storage. It has the potential to drive significant progress in various aspects of daily life, particularly within industrial environments where it can facilitate real-time product monitoring, information management, and status evaluation. Securing the authentication, authorization, and confidentiality of data within interconnected industrial IoT networks is of paramount importance. This study presents a secure lightweight IoT architecture that incorporates wireless sensor networks (WSN). Performance evaluation involves comparing the conventional security solutions with the proposed approach. The results demonstrate a 3% reduction in CPU cycles, 9% less execution time, a 3% decrease in memory capacity requirements, and a 9% improvement in security effectiveness. Additionally, the proposed model achieved enhanced cryptanalysis accuracy, registering at 97.34%.
Similar content being viewed by others
Data availibility
The data used to support the findings of this study are available from the corresponding author upon request.
Notes
References
Ahmad, R., Alsmadi, I.: Machine learning approaches to IoT security: a systematic literature review. Internet Things 14, 100365 (2021)
Pandey, N.K., Kumar, K., Saini, G., Mishra, A.K.: Security issues and challenges in cloud of things-based applications for industrial automation. Ann. Oper. Res. (2023). https://doi.org/10.1007/s10479-023-05285-7
Bhatia, M., Ahanger, T.A., Manocha, A.: Artificial intelligence based real-time earthquake prediction. Eng. Appl. Artif. Intell. 120, 105856 (2023)
Furkan, Y.Y.: Deep learning in cyber security for internet of things. Master’s thesis, Fen Bilimleri Enstitüsü (2018)
Bhatia, M., Sood, S., Sood, V.: A novel quantum-inspired solution for high-performance energy-efficient data acquisition from IoT networks. J. Ambient. Intell. Humaniz. Comput. 14(5), 5001–5020 (2023)
Li, L., Hu, X., Chen, K., He, K.: The applications of WiFi-based wireless sensor network in internet of things and smart grid. In: 2011 6th IEEE Conference on Industrial Electronics and Applications, pp. 789–793. IEEE (2011)
Anselme, H.E., Tao, F.: A critical overview of industrial internet of things security and privacy issues using a layer-based hacking scenario. IEEE Internet Things J. 10, 21917–21941 (2023)
Shirvani, M.H., Masdari, M.: A survey study on trust-based security in internet of things: challenges and issues. Internet Things 21, 100640 (2023)
Kaur, A., Bhatia, M.: Stochastic game network based model for disaster management in smart industry. J. Ambient. Intell. Humaniz. Comput. 14(5), 5151–5169 (2023)
Aminanto, M.E., Kim, K.: Improving detection of Wi-Fi impersonation by fully unsupervised deep learning. In: International Workshop on Information Security Applications, pp. 212–223. Springer, New York (2017)
Bhatia, M.: Smart information analysis for health quality: decision tree approach. J. Ambient. Intell. Humaniz. Comput. 14(10), 14225–14236 (2023)
Shi, C., Liu, J., Liu, H., Chen, Y.: Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In: Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 1–10 (2017)
Alshahrani, H., Khan, A., Rizwan, M., Reshan, M.S.A., Sulaiman, A., Shaikh, A.: Intrusion detection framework for industrial internet of things using software defined network. Sustainability 15(11), 9001 (2023)
Manocha, A., Sood, S.K., Bhatia, M.: Artificial intelligence-assisted water quality index determination for healthcare. Artif. Intell. Rev. 56(2), 2893–2915 (2023)
Bhatia, M., Sood, S.: Quantum computing-inspired optimal power allocation mechanism in edge computing environment. IEEE Internet Things J. (2024). https://doi.org/10.1109/JIOT.2024.3358900
Bhatia, M.: An AI-enabled secure framework for enhanced elder healthcare. Eng. Appl. Artif. Intell. 131, 107831 (2024)
Azizan, A.H., Mostafa, S.A., Mustapha, A., Foozy, C.F.M., Wahab, M.H.A., Mohammed, M.A., Khalaf, B.A.: A machine learning approach for improving the performance of network intrusion detection systems. Ann. Emerg. Technol. Comput. 5(5), 201–208 (2021)
Ahanger, T.A., Tariq, U., Aldaej, A., Almehizia, A., Bhatia, M.: IoT-inspired smart disaster evacuation framework. IEEE Internet Things J. 11, 12885–12892 (2023)
Edwards, C., et al.: Real-time advanced analytics, automated production systems, and smart industrial value creation in sustainable manufacturing internet of things. J. Self-Gov. Manag. Econ. 9(2), 32–41 (2021)
Manocha, A., Sood, S.K., Bhatia, M.: IoT-DEW computing-inspired real-time monitoring of indoor environment for irregular health prediction. IEEE Trans. Eng. Manag. 71, 1669–1682 (2023)
Churcher, A., Ullah, R., Ahmad, J., Masood, F., Gogate, M., Alqahtani, F., Nour, B., Buchanan, W.J., et al.: An experimental analysis of attack classification using machine learning in IoT networks. Sensors 21(2), 446 (2021)
Manocha, A., Sood, S.K., Bhatia, M.: IoT-digital twin-inspired smart irrigation approach for optimal water utilization. Sustain. Comput. 41, 100947 (2024)
Ling, Z., Luo, J., Yiling, X., Gao, C., Kui, W., Xinwen, F.: Security vulnerabilities of internet of things: a case study of the smart plug system. IEEE Internet Things J. 4(6), 1899–1909 (2017)
Gupta, M., Singh, V.P., Gupta, K.K., Shukla, P.K.: An efficient image encryption technique based on two-level security for internet of things. Multimed. Tools Appl. 10, 1–21 (2022)
Ghaffar, Z., Alshahrani, A., Fayaz, M., Alghamdi, A.M., Gwak, J., et al.: A topical review on machine learning, software defined networking, internet of things applications: research limitations and challenges. Electronics 10(8), 880 (2021)
Mousavi, S.K., Ghaffari, A., Besharat, S., Afshari, H.: Security of internet of things based on cryptographic algorithms: a survey. Wirel. Netw. 27(2), 1515–1555 (2021)
Mao, W., Zhao, Z., Chang, Z., Min, G., Gao. Overview and open issues. In: IEEE Transactions on Industrial Informatics, Energy Efficient Industrial Internet of Things (2021)
Zikria, Y.B., Ali, R., Afzal, M.K., Kim, S.W.: Opportunities, challenges, and solutions, next-generation internet of things (IoT) (2021)
Rehman, A., Haseeb, K., Saba, T., Kolivand, H.: M-SMDM: a model of security measures using green internet of things with cloud integrated data management for smart cities. Environ. Technol. Innov. 24, 101802 (2021)
Nguyen, D.C., Ding, M., Pathirana, P.N., Seneviratne, A., Li, J., Poor, H.V.: Federated learning for internet of things: a comprehensive survey. IEEE Commun. Surv. Tutor. 23(3), 1622–1658 (2021)
Bhatt, S., Ragiri, P.R., et al.: Security trends in internet of things: a survey. SN Appl. Sci. 3(1), 1–14 (2021)
Abiodun, O.I., Abiodun, E.O., Alawida, M., Alkhawaldeh, R.S., Arshad, H.: A review on the security of the internet of things: challenges and solutions. Wirel. Pers. Commun. 119(3), 2603–2637 (2021)
Somasundaram, R., Thirugnanam, M.: Review of security challenges in healthcare internet of things. Wirel. Netw. 27(8), 5503–5509 (2021)
Adil, M., Jan, M.A., Mastorakis, S., Song, H., Jadoon, M.M., Abbas, S., Farouk, A.: Hash-MAC-DSDV: mutual authentication for intelligent IoT-based cyber-physical systems. IEEE Internet Things J. 9(22), 22173–22183 (2021)
Tsai, T.-T., Chuang, Y.-H., Tseng, Y.-M., Huang, S.-S., Hung, Y.-H.: A leakage-resilient ID-based authenticated key exchange protocol with a revocation mechanism. IEEE Access 9, 128633–128647 (2021)
Kang-Di, L., Zeng, G.-Q., Luo, X., Weng, J., Luo, W., Yongdong, W.: Evolutionary deep belief network for cyber-attack detection in industrial automation and control system. IEEE Trans. Ind. Inf. 17(11), 7618–7627 (2021)
Wang, W., Han, J., Cheng, X., Zeng, X.: An energy-efficient crypto-extension design for RISC-V. Microelectron. J. 115, 105165 (2021)
Seyhan, Tu.N.K., Nguyen, S.A., Cengiz, K.: Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. Clust. Comput. 25(3), 1–20 (2021)
Hemamalini, V., Mishra, A.K., Tyagi, A.K., Kakulapati, V.: Artificial intelligence-blockchain-enabled-internet of things-based cloud applications for next-generation society. In: Automated Secure Computing for Next-Generation Systems, pp. 65–82 (2024)
Mittal, S., Singh, D.S., Balakumaran, Hemalatha, K.: Security of internet of things based on cryptographic algorithm. Int. J. Electron. Secur. Digit. Forensics 16(1), 28–39 (2024)
Sayeduzzaman, Md., Hasan, T., Nasser, A.A., Negi, A.: An internet of things-integrated home automation with smart security system. In: Automated Secure Computing for Next-Generation Systems, pp. 243–273 (2024)
Acknowledgements
This study was conducted at Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia. The authors would like to thank and appreciate the University management for creating a great learning environment for the faculty and researchers.
Funding
The authors extend their appreciation to Prince Sattam bin Abdulaziz University for funding this research work through project number PSAU-2023/01/23595.
Author information
Authors and Affiliations
Contributions
All the authors have contributed equally to prepare this manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no Conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Aljumah, A., Ahanger, T.A. & Ullah, I. Internet of things-based secure architecture to automate industry. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04499-z
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10586-024-04499-z