4.6 Review

Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

Journal

COMPLEX & INTELLIGENT SYSTEMS
Volume 8, Issue 4, Pages 3559-3591

Publisher

SPRINGER HEIDELBERG
DOI: 10.1007/s40747-022-00667-z

Keywords

Authentication; Authorization; Session key; Key management system; Key distribution; Artificial intelligence; Blockchain; Sensor networks; IoT security; Cyber-physical systems

Ask authors/readers for more resources

The Internet of Things (IoT) has gained significant attention in recent years for its ability to improve lifestyles and keep up with technological advancements. IoT edge devices have different technologies and storage formats, requiring secure mutual authentication for data transmission. Blockchain and AI are integrated into IoT networks for enhanced security, with blockchain storing validated session keys and AI providing better adaptability against attacks.
The recent years have garnered huge attention towards the Internet of Things (IoT) because it enables its consumers to improve their lifestyles and professionally keep up with the technological advancements in the cyber-physical world. The IoT edge devices are heterogeneous in terms of the technology they are built on and the storage file formats used. These devices require highly secure modes of mutual authentication to authenticate each other before actually sending the data. Mutual authentication is a very important aspect of peer-to-peer communication. Secure session keys enable these resource-constrained devices to authenticate each other. After successful authentication, a device can be authorized and can be granted access to shared resources. The need for validating a device requesting data transfer to avoid data privacy breaches that may compromise confidentiality and integrity. Blockchain and artificial intelligence (AI) both are extensively being used as an integrated part of IoT networks for security enhancements. Blockchain provides a decentralized mechanism to store validated session keys that can be allotted to the network devices. Blockchain is also used to load balance the stressing edge devices during low battery levels. AI on the other hand provides better learning and adaptiveness towards IoT attacks. The integration of newer technologies in IoT key management yields enhanced security features. In this article, we systematically survey recent trending technologies from an IoT security point of view and discuss traditional key security mechanisms. This article delivers a comprehensive quality study for researchers on authentication and session keys, integrating IoT with blockchain and AI-based authentication in cybersecurity.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available