TY - JOUR
T1 - Deep Learning Enabled Secure IoT Handover Authentication for Blockchain Networks
AU - Salim, Mikail Mohammed
AU - Shanmuganathan, Vimal
AU - Loia, Vincenzo
AU - Park, Jong Hyuk
N1 - Publisher Copyright:
© 2021,Human-centric Computing and Information Sciences.All Rights Reserved
PY - 2021
Y1 - 2021
N2 - Blockchain is an emerging key technology for safeguarding telecommunications networks against rogue base stations. Combining Internet of Things (IoT) devices with a decentralized network secures data transmission from machines to support cloud-based smart city applications. Critical applications such as Smart Healthcare deploy portable IoT devices such as blood pressure monitors, pacemakers, and electrocardiogram (ECG)- supported smartwatches to provide personalized services to users. Devices frequently move between different base stations to improve their coverage in hotspots and wireless link quality. Immutable ledgers in decentralized base stations ensure that data transmission from base stations to data centers is secure; still, it does not guarantee that the received data is from an authorized device. In the IoT layer, impersonation attacks involve a malicious user spoofing an honest user and transmitting manipulated data to the base station. Attackers impersonate legitimate machines during the handover authentication process when devices move from one base station to another. This paper proposes a fast, efficient handover authentication (HO-Auth) scheme using deep learning to authenticate devices and build a user profile-based system for immediate authorization. The channel state information (CSI) of a user’s movement pattern trains the model and detects malicious users spoofing as honest users. The simulation-based analysis shows an initial profile accuracy of 0.91 in identifying a malicious device. The detection accuracy increases to 0.94 as the profile is retrained based on the movement of the user.
AB - Blockchain is an emerging key technology for safeguarding telecommunications networks against rogue base stations. Combining Internet of Things (IoT) devices with a decentralized network secures data transmission from machines to support cloud-based smart city applications. Critical applications such as Smart Healthcare deploy portable IoT devices such as blood pressure monitors, pacemakers, and electrocardiogram (ECG)- supported smartwatches to provide personalized services to users. Devices frequently move between different base stations to improve their coverage in hotspots and wireless link quality. Immutable ledgers in decentralized base stations ensure that data transmission from base stations to data centers is secure; still, it does not guarantee that the received data is from an authorized device. In the IoT layer, impersonation attacks involve a malicious user spoofing an honest user and transmitting manipulated data to the base station. Attackers impersonate legitimate machines during the handover authentication process when devices move from one base station to another. This paper proposes a fast, efficient handover authentication (HO-Auth) scheme using deep learning to authenticate devices and build a user profile-based system for immediate authorization. The channel state information (CSI) of a user’s movement pattern trains the model and detects malicious users spoofing as honest users. The simulation-based analysis shows an initial profile accuracy of 0.91 in identifying a malicious device. The detection accuracy increases to 0.94 as the profile is retrained based on the movement of the user.
KW - Deep learning
KW - Handover authentication
KW - Internet of things
KW - Iot security
UR - http://www.scopus.com/inward/record.url?scp=85121473515&partnerID=8YFLogxK
U2 - 10.22967/HCIS.2021.11.021
DO - 10.22967/HCIS.2021.11.021
M3 - Article
AN - SCOPUS:85121473515
SN - 2192-1962
VL - 11
JO - Human-centric Computing and Information Sciences
JF - Human-centric Computing and Information Sciences
M1 - 21
ER -