Smart City Gnosys

Smart city article details

Title Lightweight Internet Of Things Device Authentication, Encryption, And Key Distribution Using End-To-End Neural Cryptosystems
ID_Doc 35266
Authors Sun Y.; Lo F.P.-W.; Lo B.
Year 2022
Published IEEE Internet of Things Journal, 9, 16
DOI http://dx.doi.org/10.1109/JIOT.2021.3067036
Abstract Device authentication, encryption, and key distribution are of vital importance to any Internet of Things (IoT) systems, such as the new smart city infrastructures. This is due to the concern that attackers could easily exploit the lack of strong security in IoT devices to gain unauthorized access to the system or to hijack IoT devices to perform denial-of-service attacks on other networks. With the rise of fog and edge computing in IoT systems, increasing numbers of IoT devices have been equipped with computing capabilities to perform data analysis with deep learning technologies. Deep learning on edge devices can be deployed in numerous applications, such as local cardiac arrhythmia detection on a smart sensing patch, but it is rarely applied to device authentication and wireless communication encryption. In this article, we propose a novel lightweight IoT device authentication, encryption, and key distribution approach using neural cryptosystems and binary latent space. The neural cryptosystems adopt three types of end-to-end encryption schemes: 1) symmetric; 2) public-key; and 3) without keys. A series of experiments was conducted to test the performance and security strength of the proposed neural cryptosystems. The experimental results demonstrate the potential of this novel approach as a promising security and privacy solution for the next-generation of IoT systems. © 2014 IEEE.
Author Keywords Authentication; binary latent space; cryptography; deep learning; encryption; Internet of Things (IoT)


Similar Articles


Id Similarity Authors Title Published
47748 View0.877Ghaffari A.; Jelodari N.; pouralish S.; derakhshanfard N.; Arasteh B.Securing Internet Of Things Using Machine And Deep Learning Methods: A SurveyCluster Computing, 27, 7 (2024)
34139 View0.874Selvam R.; Velliangiri S.Iotsdl: Internet Of Things Security For Deep Learning Techniques-A Research Perspectives2023 International Conference on Computer Communication and Informatics, ICCCI 2023 (2023)
35256 View0.874Rana M.; Mamun Q.; Islam R.Lightweight Cryptography In Iot Networks: A SurveyFuture Generation Computer Systems, 129 (2022)
23845 View0.864Mishra K.; Dutta T.Enhancing Iot Security Through Deep Learning: A Comprehensive StudyLecture Notes in Electrical Engineering, 1194 (2024)
23732 View0.863dos Santos F.C.; Duarte-Figueiredo F.; De Grande R.E.; dos Santos A.L.Enhancing A Fog-Oriented Iot Authentication And Encryption Platform Through Deep Learning-Based Attack DetectionInternet of Things (Netherlands), 27 (2024)
33773 View0.863Iqbal A.; Aman M.N.; Sikdar B.Iot Device Authentication Via Ram Trace Analysis: A Representation Learning FrameworkProceedings - IEEE Global Communications Conference, GLOBECOM (2024)
16774 View0.861Bairwa A.; Soni V.; Hemrajani P.; Kushwaha S.S.; Bohra M.K.Cryptographic Hash Functions And Attack Complexity AnalysisMachine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (2022)
30732 View0.859Amine M.S.; Nada F.A.; Hosny K.M.Improved Model For Intrusion Detection In The Internet Of ThingsScientific Reports, 15, 1 (2025)
32899 View0.858Sarker I.H.; Khan A.I.; Abushark Y.B.; Alsolami F.Internet Of Things (Iot) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions And Research DirectionsMobile Networks and Applications, 28, 1 (2023)
5489 View0.857Sarker K.U.A Systematic Review On Lightweight Security Algorithms For A Sustainable Iot InfrastructureDiscover Internet of Things, 5, 1 (2025)