Open Access
ARTICLE
Correlation Composition Awareness Model with Pair Collaborative Localization for IoT Authentication and Localization
School of Computer Science and Engineering, VIT-AP University, Amaravathi, Andhra Pradesh, 522241, India
* Corresponding Author: S. Gopikrishnan. Email:
(This article belongs to the Special Issue: Multimedia Encryption and Information Security)
Computers, Materials & Continua 2024, 79(1), 943-961. https://doi.org/10.32604/cmc.2024.048621
Received 13 December 2023; Accepted 29 February 2024; Issue published 25 April 2024
Abstract
Secure authentication and accurate localization among Internet of Things (IoT) sensors are pivotal for the functionality and integrity of IoT networks. IoT authentication and localization are intricate and symbiotic, impacting both the security and operational functionality of IoT systems. Hence, accurate localization and lightweight authentication on resource-constrained IoT devices pose several challenges. To overcome these challenges, recent approaches have used encryption techniques with well-known key infrastructures. However, these methods are inefficient due to the increasing number of data breaches in their localization approaches. This proposed research efficiently integrates authentication and localization processes in such a way that they complement each other without compromising on security or accuracy. The proposed framework aims to detect active attacks within IoT networks, precisely localize malicious IoT devices participating in these attacks, and establish dynamic implicit authentication mechanisms. This integrated framework proposes a Correlation Composition Awareness (CCA) model, which explores innovative approaches to device correlations, enhancing the accuracy of attack detection and localization. Additionally, this framework introduces the Pair Collaborative Localization (PCL) technique, facilitating precise identification of the exact locations of malicious IoT devices. To address device authentication, a Behavior and Performance Measurement (BPM) scheme is developed, ensuring that only trusted devices gain access to the network. This work has been evaluated across various environments and compared against existing models. The results prove that the proposed methodology attains 96% attack detection accuracy, 84% localization accuracy, and 98% device authentication accuracy.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.