Next Article in Journal
Robust Attitude Estimation for Low-Dynamic Vehicles Based on MEMS-IMU and External Acceleration Compensation
Previous Article in Journal
E-BDL: Enhanced Band-Dependent Learning Framework for Augmented Radar Sensing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Communication

Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things

1
INSA Rouen Normandie, Normandie Université, LITIS UR 4108, 76000 Rouen, France
2
Université Grenoble Alpes, LCIS, 26000 Valence, France
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(14), 4621; https://doi.org/10.3390/s24144621
Submission received: 6 June 2024 / Revised: 13 July 2024 / Accepted: 16 July 2024 / Published: 17 July 2024

Abstract

:
Communication between connected objects in the Internet of Things (IoT) often requires secure and reliable authentication mechanisms to verify identities of entities and prevent unauthorized access to sensitive data and resources. Unlike other domains, IoT offers several advantages and opportunities, such as the ability to collect real-time data through numerous sensors. These data contains valuable information about the environment and other objects that, if used, can significantly enhance authentication processes. In this paper, we propose a novel idea to building opportunistic sensor-based authentication factors by leveraging existing IoT sensors in a system of systems approach. The objective is to highlight the promising prospects of opportunistic authentication factors in enhancing IoT security. We claim that sensors can be utilized to create additional authentication factors, thereby reinforcing existing object-to-object authentication mechanisms. By integrating these opportunistic sensor-based authentication factors into multi-factor authentication schemes, IoT security can be substantially improved. We demonstrate the feasibility and effectivenness of our idea through illustrative experiments in a parking entry scenario, involving both mobile robots and cars, achieving high identification accuracy. We highlight the potential of this novel method to improve IoT security and suggest future research directions for formalizing and comparing our approach with existing techniques.

1. Introduction

The Internet of Things (IoT) is a network of connected objects, including devices, vehicles, and various other entities, often embedded with sensors and actuators. These objects collect and exchange data, enabling numerous applications that improve efficiency and automation. From smart homes that improve comfort and optimize energy based on occupancy to industrial automation systems that optimize production processes, IoT is revolutionizing the way we interact with the world. However, the increasing number of connected devices also brings significant security challenges, particularly in ensuring that communication between IoT objects is secure and reliable.
One of the critical aspects of securing IoT communication is authentication, which is the process of verifying the identity of an entity. Ensuring that communication occurs between authenticated entities prevents unauthorized access to sensitive data and resources. This is particularly important in situations like object-to-object communication, where it is essential to confirm the identities of both objects before any exchange of information or interaction. The diverse and distributed nature of IoT systems heightens the need for robust authentication mechanisms. These systems often operate under constraints that make traditional centralized authentication models less effective [1].
Over the last decade, extensive research has been conducted to address security challenges in IoT and to develop methods to protect against attacks [2,3,4,5]. Authentication has been a focal point of these efforts, as robust authentication mechanisms are essential to mitigate the significant risks of unauthorized access to IoT networks [4,6]. Attackers could impersonate other objects, eavesdrop sensitive information and destroy trust relations between objects. Numerous approaches have been explored, including password-based mechanisms [7,8,9] and advanced biometrics [10]. Multi-Factor Authentication (MFA), which employs several factors to verify an entity, has emerged as a more secure solution [11]. In spite of these advancements, authentication in IoT remains a significant challenge due to the dynamic and heterogeneous nature of IoT environments. IoT devices often have limited computational power and energy resources, making it difficult to implement complex authentication protocols. Additionally, the diversity of devices and communication protocols in IoT networks adds another layer of complexity to the authentication process.
Despite these constraints and challenges, IoT also offers advantages and opportunities that can be leveraged to improve security measures. The extensive deployment of sensors across various IoT environments provides a rich source of data. These sensors continuously collect real-time information about their surroundings and the objects they interact with, which, if utilized effectively, can significantly enhance existing security protocols.
In this paper, we introduce a novel concept aimed at reinforcing IoT authentication mechanisms by leveraging the existing sensors deployed in IoT environments within a System of Systems (SoS) approach. We propose the idea of opportunistic sensor-based authentication factors, which utilizes the data already being collected by these sensors for purposes beyond their primary function. This innovative approach repurposes sensor data to create additional authentication factors, enhancing the security of IoT systems without the need for additional hardware investments.
To demonstrate the potential of our idea, we conducted illustrative experiments in a specific IoT scenario representing a parking entry involving both mobile robots and cars. While the details of these experiments are elaborated in the subsequent sections, the results underscore the feasibility and effectiveness of using opportunistic sensor-based authentication factors. This paper aims to highlight the potential of opportunistically leveraging existing IoT sensors to enhance security through innovative repurposing. By integrating these opportunistic sensor-based factors into multi-factor authentication schemes, we can achieve a higher level of security in IoT environments.
The rest of this paper is organized as follows: Section 2 provides a background of relevant authentication methods in IoT that have been used so far, as well as different types of authentication factors, while Section 3 explains the proposed idea and provides an illustrative scenario. Next, in Section 4 we present the illustrative experiments conducted to demonstrate the proposed idea. At the end, Section 5 and Section 6 provide a discussion and a conclusion over the obtained results with some challenges and some hints for future work.

2. Background and Related Work

Authentication is the process by which an entity (human or machine) proves its identity by providing evidence that it is who it claims to be. These proofs are known as authentication factors. Authentication factors are categorized into three main groups [11]:
  • Knowledge factor: something the user knows, such as a password or PIN.
  • Possession factor: something the user has, such as a security token.
  • Inherent factor: something the user is, such as a fingerprint or facial recognition.
Given the diversity and sensitivity of IoT applications, reinforcing authentication mechanisms is critical. Several approaches have been proposed to enhance the robustness of these mechanisms. In [12], the authors proposed a methodology to select the best authentication factors based on trust values assigned to the factors, as well as the context, security requirements, and associated risks. This approach emphasizes the dynamic and contextual nature of authentication in IoT environments.
Context-aware authentication is another important method. The authors of [13] proposed an authentication method that incorporates the context of the environment in which devices are authenticated. Context-aware authentication adapts the authentication process based on environmental factors such as location and time, thereby increasing security. Location-based authentication utilizes the geographical location of the entity, such as GPS coordinates, to verify its identity [14]. This method adds an additional layer of security by ensuring that authentication is tied to a specific location.
Building a signature of entities involves using patterns related to the entities for authentication. These patterns can be based on behavioral or physical factors, which are part of the inherent factors. Authors in [15] conducted a survey on behavioral biometrics for continuous user authentication in IoT, highlighting how biometric data such as touchscreen dynamics, eye movements, and other behaviors can strengthen authentication mechanisms.
Several studies have explored the use of sensor data to enhance security in IoT systems. For instance, researchers have investigated the use of accelerometer data to authenticate smartphone users based on their phone usage characteristics [16]. Other studies have examined the potential of using environmental noise and light patterns as supplementary authentication factors [17]. While most studies have primarily focused on user authentication, some have investigated the use of Physically Unclonable Functions (PUFs), which leverage the unique physical properties of hardware components to generate cryptographic keys for device authentication [18,19]. These findings suggest the potential for extending such methods to other types of sensors. However, there is a significant research gap in applying behavioral or physical signatures for object-to-object authentication in IoT environments.
In summary, the extensive deployment of sensors in IoT environments presents an opportunity to enhance authentication mechanisms by repurposing sensor data. The following sections will introduce our proposed concept of opportunistic sensor-based authentication factors and show its potential through an illustrative experimental case study.

3. Leveraging IoT Existing Systems for Authentication

In this section, we define the concept of opportunistic authentication factors, providing an understanding of their characteristics and potential applications. To clarify the practicality of these factors, we present an illustrative scenario that effectively demonstrates their advantages. Following this, the subsequent section presents illustrative experiments that reflect the proposed scenario, showing the potential of our new idea through practical examples.

3.1. Proposed Concept: Opportunistic Sensor-Based Authentication Factors

The increasing deployment of IoT devices has led to the widespread availability of various sensors embedded in these devices. These sensors continuously collect data for their primary functions, such as monitoring and control. The core idea of opportunistic sensor-based authentication factors is to leverage the data collected by these existing IoT sensors, which are not typically used for authentication purposes, to reinforce existing authentication mechanisms. This approach repurposes sensor data to serve as supplementary authentication factors, thereby enhancing the security of IoT systems without the need for additional hardware investments. By leveraging existing IoT systems in a SoS approach, we can integrate various independent systems to work together collectively, thereby enhancing the overall security infrastructure. This transformation of sensor data into authentication factors enables a new level of authentication, making it more robust and reliable.
IoT devices are equipped with a variety of sensors, such as cameras, temperature sensors, accelerometers, and light sensors. These sensors gather data continuously about their environment and the objects they interact with. For example, temperature sensors can monitor heat levels, accelerometers can detect motion patterns, and light sensors can measure the intensity of ambient light.
To utilize sensor data for authentication, relevant features must be extracted from the raw data. This involves processing the data to identify unique characteristics that can be used to distinguish between different entities. For example:
  • Visual data: shape patterns and object recognition from camera streams.
  • Temperature data: temperature fluctuations, heat distribution patterns, and thermal signatures from temperature sensors.
  • Motion data: movement patterns, acceleration profiles, and behavioral signatures from accelerometers.
Once the relevant features are extracted, they are used to generate authentication factors. These factors can be integrated into multi-factor authentication schemes, providing an additional layer of security. Moreover, using this kind of information can often be performed without the need for additional communication between objects or with the user. For instance, in a smart home environment, access to a secure area could be authenticated not only by a keypad entry code, but also by opportunistically recognizing the unique walking pattern of an individual detected by floor pressure sensors.
The opportunistic authentication factors are designed to complement existing authentication systems. They do not replace them, but rather enhance them by providing supplementary verification based on opportunistic data. This integration ensures that even if one authentication factor is compromised, the system remains secure due to the presence of additional factors. The proposed concept can be applied to various IoT scenarios. It is flexible enough to adapt to different types of sensors and data sources, making it suitable for a wide range of applications. This flexibility introduces an element of unpredictability, making it more challenging for attackers to predict the authentication factors that will be used.

3.2. Illustrative Scenario

By illustrating the following scenario, we aim to highlight the feasibility and effectiveness of leveraging existing systems and sensor data in the authentication process. The scenario involves a private parking area with access control, where only authorized vehicles are allowed to enter. The verification process of a vehicle is performed at the entry to decide whether the vehicle should be allowed access. Three systems have been deployed in the parking area, each for specific functionalities. Figure 1 (simulated with CARLA [20]) illustrates the scenario at the parking entrance. The following provides a description of the three existing systems.

3.2.1. Description of the Systems

System 1: Barrier management system. Initially deployed to authenticate entering vehicles, the barrier of the parking is managed using a Radio Frequency Identification (RFID) scanner. Each authorized vehicle is equipped with an RFID tag that is scanned at the entry to verify its identity.
System 2: Surveillance system. Deployed to ensure the overall safety of the parking area, including pedestrians and drivers, this system features strategically placed cameras that capture and record images and video footage of different areas. This enables real-time monitoring and enhances security measures.
System 3: Acoustic monitoring system. Deployed for safety reasons, this system detects abnormal sound patterns that may indicate incidents or aggressions. It includes microphones placed in specific locations, and uses signal processing techniques to analyze recorded sounds and identify specific types of sounds or frequencies associated with alarms or other events to ensure security.
In this scenario, the objective of our proposed idea is to reinforce the security of vehicle authentication. We aim to exploit the existing systems, initially deployed for other purposes than authentication, and the data they collect through their embedded sensors. This exploitation provides new opportunistic authentication factors that enhance the currently deployed authentication system.

3.2.2. Utilizing Existing Systems

In this subsection, we explore how existing systems can be repurposed to enhance vehicle authentication. By leveraging data from already deployed acoustic monitoring and surveillance systems, we aim to add new layers of security.
Acoustic monitoring system|Sensors: microphones. While initially designed for safety applications, we propose using this system to strengthen vehicle authentication processes. Microphones placed at parking entrances can capture the engine sounds of vehicles waiting to enter. By comparing these sounds with previously recorded engine sounds of authorized vehicles, we can help in verifying the identity of each vehicle. If the captured sound is sufficiently similar to the known sound of an authorized vehicle, the sound factor is considered validated. This new recording can then be used for future reference. If there is a significant discrepancy between the sounds, it may indicate an unauthorized vehicle or an attempted security breach.
Surveillance system|Sensors: cameras. Surveillance cameras, originally installed for security monitoring, can also enhance vehicle authentication. Various details can be extracted from images of vehicles at the parking entrance. These details can then be compared with information from authorized vehicles to verify identity. If the captured details are sufficiently similar to those of an authorized vehicle, the visual factor is considered validated. Significant discrepancies may suggest an unauthorized vehicle or a potential security threat.

4. Illustrative Experiments

Considering conditions similar to the described illustrative scenario, we evaluate the capacity of these existing IoT systems to reinforce the authentication process by creating signatures of the vehicles entering the parking, even by using simple processing methods. We take advantage of a camera from the surveillance system and a microphone from the acoustic monitoring system. We propose using the information perceived by these sensors to build signatures about the vehicles, that act as an additional authentication level.

4.1. Measuring the Similarity of Engine Sounds

To compare two engine sounds, we were satisfied with employing a simple yet effective signal processing method. Our objective is to demonstrate the feasibility of the proposed mechanism, focusing on the capability of identifying vehicles based on their engine sound rather than proposing the optimal signal processing method. We used the spectral centroid feature (Equation (1)) to determine if two engine sounds are similar. It provides the average frequency or the center of mass of a sound spectrum:
S p e c t r a l C e n t r o i d = f ( n ) M ( n ) M ( n )
where M ( n ) represents the magnitude or weighted frequency value of bin number n, and f ( n ) represents the center frequency at bin n.
With this feature, to find the similarity or dissimilarity between two signals, we calculate the spectral centroid of each signal separately, then calculate the mean of each spectral centroid before computing the Euclidean distance between the two means (Equation (2)):
d i s t a n c e = ( S C 1 ¯ S C 2 ¯ ) 2
where S C 1 ¯ and S C 2 ¯ are the means of the first and second spectral centroids, respectively. As the distance increases, the dissimilarity between the two signals grows, while a distance close to 0 indicates greater similarity.

4.2. Measuring the Similarity of Vehicle Pictures

In our experiments, a series of vehicle images were captured against a consistent background, and the background was then removed to isolate the vehicles. To illustrate the significance and potential of the features extracted from such information, we chose to use the color histogram of the captured images as a feature for authentication. Although color alone may not be a uniquely distinguishing attribute, it can be crucial in identifying significant variations, particularly if a potentially malicious vehicle has a markedly different color. To compare vehicles pictures, color histograms were generated from these isolated vehicle images, representing the distribution of colors for each vehicle. This comparison helps determine if two vehicle images represent the same vehicle based on the distribution of color data. We calculate the Bhattacharyya distance between two normalized color histograms (Equations (3) and (4)):
D B ( P , Q ) = l n ( B C ( P , Q ) )
B C ( P , Q ) = x P ( x ) Q ( x )
where B C represents the Bhattacharyya coefficient, and P and Q are the normalized color histograms of the two vehicle images. B C measures the similarity between the two histograms. A coefficient of 0 indicates that the histograms are identical, while higher values indicate greater dissimilarity.

4.3. Experimental Setup

The experiments were conducted on two different types of vehicles: cars and mobile robots, and in two different environments: an indoor environment for the mobile robots, where it is calm and there is not much noise when recording the engine sounds, and an outdoor environment for the cars, where there is much more noise. The engines sounds were recorded from several distances from the vehicles to obtain realistic data and to detect if small distances can make a significant difference in the comparison. Tests were repeated on several samples of different durations. For example, one test was performed on samples of 5 s, another on samples of 2 s, and another on 1 s samples. Regarding the second test, we captured multiple pictures of each vehicle, varying the camera angle slightly for each shot. The collected data from cameras and microphones are used for feature extraction. The extracted features are used to generate opportunistic authentication factors, integrated with the RFID data into the multi-factor authentication mechanism.

4.4. Results

In this section, we present the results of the illustrative experiments conducted to evaluate the effectiveness of the proposed opportunistic sensor-based authentication factors in the described scenario. The results are divided into two main categories: audio-based factors and visual-based factors.

4.4.1. Audio-Based Results|Engine Sounds

The effectiveness of using engine sounds for vehicle authentication was measured using the spectral centroid feature and the Euclidean distance between spectral centroids of recorded engine sounds. The results are summarized in Table 1 and Figure 2 and Figure 3.
The conducted experiments resulted in a 100% accuracy between the robots (indoor) and an 89% accuracy between the cars (outdoor), utilizing a fixed similarity score threshold of 100. Noting that the outdoor environment contains a significant amount of noise, and Figure 2 and Figure 3 represent the symmetric distances between spectral centroids of different samples of engine sounds for cars and robots, respectively. In these heatmaps, lighter cells represent more similar sounds, while darker cells indicate more different sounds. The distinct clusters of lighter squares diagonally in each heatmap correspond to different vehicles, demonstrating that the engine sounds are consistent within the same vehicle and distinct between different vehicles. Table 1 represents a symmetric distance matrix showing the average distance between all spectral centroids for all the tested vehicles (robots and cars). The diagonal elements of the matrix represent the average distances between different spectral centroid samples of the same vehicle, while the off-diagonal elements represent the distances between different vehicles. From the table, we observe one false positive where the average distance between samples from Car 1 and Car 3 is below 100, as indicated in bold and red. However, it is evident that the average distance between spectral centroids of different vehicles is significantly greater than that between multiple spectral centroid samples from the same vehicle. All diagonal elements were under the fixed threshold, as indicated in bold and black, demonstrating the potential for using such information for authentication purposes.

4.4.2. Visual-Based Results|Color Histograms

The effectiveness of using color histograms for vehicle authentication was measured by calculating the Bhattacharyya distance between the color histograms of captured vehicle images. The results are summarized in Table 2.
The conducted experiments resulted in a 93.7% accuracy when comparing color histograms of several samples for each car, utilizing a fixed similarity score threshold of 0.2. For the robots, a 100% accuracy was achieved. Three of the four chosen cars for this experiment were selected to have similar color characteristics, minimizing potential bias in the results. Similar to the previous table, Table 2 presents a symmetric distance matrix illustrating the average distance between all color histograms for all the tested vehicles. The average distance between color histograms of different vehicles is significantly greater than the average distance between color histograms of different picture samples from the same vehicle, often exceeding twice the value. The only false negative result is observed in Car 3, where the average distance exceeds the fixed threshold, as indicated in bold and red. This discrepancy can be attributed to slight variations in camera angles during the shots.
The results from our illustrative experiments demonstrate the potential of opportunistically using sensors from neighboring systems to propose additional authentication factors as a proof of concept (the code used for our illustrative experiments is available on GitHub: https://github.com/Marc-SA/illustrative_exp_opportunistic_factors (accessed on 16 July 2024)). The experiments using color histograms and spectral centroid for vehicle authentication are illustrative, showing that even simple methods can be used to build new authentication factors. Both methods highlight the potential of leveraging existing sensor data to enhance security. While color histograms can be processed efficiently and implemented using existing camera systems, and the spectral centroid method can analyze engine sounds for authentication, both approaches may be sensitive to various environmental factors. Therefore, their use should be context-aware and ideally part of a multi-factor authentication scheme to ensure robustness and reliability.
In the following section, we discuss the implications of these results, the potential benefits, and the challenges associated with implementing opportunistic authentication factors in IoT systems.

5. Discussion

The concept of opportunistically leveraging existing IoT sensors to create new authentication factors is a promising approach to enhancing the security of IoT systems. The high accuracies achieved in our illustrative experiments with both audio-based and visual-based authentication demonstrate the feasibility and potential of this method. These results validate the integration of opportunistic factors with existing authentication mechanisms to create a robust MFA system. There are several potential benefits to combining opportunistic factors:
  • Increased security: By integrating existing authentication factors, as RFID-based identification in the scenario, with opportunistic factors, such as audio and visual data, the overall security of the authentication system can be significantly enhanced. This multi-factor approach ensures that even if one authentication factor is compromised, additional factors provide robust verification, making unauthorized access much more difficult.
  • Reduced false positives: Utilizing multiple, diverse authentication factors helps reduce the likelihood of false positives. Each factor adds a layer of verification, increasing the overall reliability of the authentication process.
  • Enhanced robustness: A multi-factor authentication system that leverages opportunistic data from existing sensors is more resilient against potential attacks. Attackers would need to compromise multiple authentication factors simultaneously, which is considerably more challenging than targeting a single factor. Additionally, the flexibility of opportunistic factors introduces an element of unpredictability, complicating attackers’ efforts as they would need to bypass multiple, distinct, and not predetermined authentication factors.
This method can be adapted to various types of IoT devices and environments by identifying useful data from different sensors and developing context-aware strategies for their use. By quantifying the energy cost, security efficiency, and latency of each sensor-based authentication factor, we can adapt the opportunistic method to other types of IoT sensors and applications. For example, temperature sensors could detect environmental changes, motion detectors could identify unusual activities, and in an industrial IoT environment, vibration sensors could monitor equipment conditions to detect anomalies that suggest unauthorized access or tampering. Designers of IoT authentication protocols play a crucial role in selecting appropriate sensors, integrating sensor data, and implementing flexible authentication processes that enhance security across diverse applications. However, our experiments with sensor data from two environments showed context-dependence, with indoor results outperforming outdoor ones. This outperformance is due to consistent lighting conditions, fewer weather-related disruptions, and less background noise in indoor environments compared to outdoor settings. This highlights the importance of considering the context in which the sensors operate when evaluating the relevance of each factor.
Furthermore, the ability to build a large set of possible authentication factors provides the system with the flexibility to dynamically adapt to different contexts and threat scenarios. This adaptability allows the system to select the most relevant authentication factors for each specific situation, thus improving the overall security of the IoT environment. Additionally, thoughtful design and context-aware selection strategies are essential for effectively deploying this approach in diverse IoT environments, as these strategies help balance resource demands and security needs.

6. Conclusions

This study presents the novel concept of building opportunistic authentication factors in the IoT domain by leveraging data from existing sensors. Our goal was to demonstrate the potential of these opportunistic factors in enhancing the security and reliability of IoT authentication mechanisms without the need for additional hardware investments. Through illustrative experiments, we showed the feasibility of this approach by using simple methods to analyze data from existing sensors. These experiments validate the idea that opportunistic factors can serve as effective authentication elements, achieving high accuracy rates. The results highlight the potential of integrating these opportunistic factors with existing ones to form a robust MFA system.
While there are numerous constraints and challenges inherent in IoT authentication mechanisms, our approach provides a promising framework for addressing some of these issues. Indeed, by creating a set of possible authentication factors, this approach allows for dynamic selection based on current context and constraints. This selection of factors depends on several key criteria, including but not limited to resource availability, threat level (criticality of the interaction or the exchanged information), trust values, and environmental conditions. For example, when computing power or energy is limited, the system can opt for less demanding factors, and when resources are available, more complex factors can be employed. This adaptability enhances flexibility and interoperability in the IoT environment.
To conclude, building new authentication factors in an opportunistic way by leveraging existing IoT sensors is a promising approach to enhancing IoT security. Future research should focus on extending this approach to a wider range of sensor types and exploring the trade-offs between the cost, power consumption, and security benefits of different authentication factors. Additionally, further studies are needed to validate the effectiveness of opportunistic authentication in diverse real-world scenarios and to develop methodologies for dynamically selecting the most relevant factors based on the context and threat scenario.

Author Contributions

The work presented here was carried out in collaboration between all authors. Conceptualization, M.S., J.-P.J. and L.V.; methodology, M.S., J.-P.J. and L.V.; validation, M.S., J.-P.J. and L.V.; writing—original draft, M.S.; writing—review and editing, J.-P.J. and L.V. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the French National Research Agency (ANR) in the framework of the project MaestrIoT ANR-21-CE23-0016.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available upon request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of Things
RFIDRadio Frequency Identification
SoSSystem of Systems
PUFPhysical Unclonable Function
MFAMulti-Factor Authentication

References

  1. El-Hajj, M.; Fadlallah, A.; Chamoun, M.; Serhrouchni, A. A survey of internet of things (IoT) authentication schemes. Sensors 2019, 19, 1141. [Google Scholar] [CrossRef]
  2. Roman, R.; Zhou, J.; Lopez, J. On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 2013, 57, 2266–2279. [Google Scholar] [CrossRef]
  3. Sicari, S.; Rizzardi, A.; Grieco, L.A.; Coen-Porisini, A. Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. 2015, 76, 146–164. [Google Scholar] [CrossRef]
  4. Meneghello, F.; Calore, M.; Zucchetto, D.; Polese, M.; Zanella, A. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 2019, 6, 8182–8201. [Google Scholar] [CrossRef]
  5. Babun, L.; Denney, K.; Celik, Z.B.; McDaniel, P.; Uluagac, A.S. A survey on IoT platforms: Communication, security, and privacy perspectives. Comput. Netw. 2021, 192, 108040. [Google Scholar] [CrossRef]
  6. Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and security: Challenges and solutions. Appl. Sci. 2020, 10, 4102. [Google Scholar] [CrossRef]
  7. Shah, T.; Venkatesan, S. Authentication of IoT device and IoT server using secure vaults. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 819–824. [Google Scholar]
  8. Renuka, K.; Kumari, S.; Zhao, D.; Li, L. Design of a secure password-based authentication scheme for M2M networks in IoT enabled cyber-physical systems. IEEE Access 2019, 7, 51014–51027. [Google Scholar] [CrossRef]
  9. Atwady, Y.; Hammoudeh, M. A survey on authentication techniques for the internet of things. In Proceedings of the International Conference on Future Networks and Distributed Systems, Cambridge, UK, 19–20 July 2017. [Google Scholar]
  10. Yang, W.; Wang, S.; Sahri, N.M.; Karie, N.M.; Ahmed, M.; Valli, C. Biometrics for internet-of-things security: A review. Sensors 2021, 21, 6163. [Google Scholar] [CrossRef] [PubMed]
  11. Ometov, A.; Bezzateev, S.; Mäkitalo, N.; Andreev, S.; Mikkonen, T.; Koucheryavy, Y. Multi-factor authentication: A survey. Cryptography 2018, 2, 1. [Google Scholar] [CrossRef]
  12. Dasgupta, D.; Roy, A.; Nag, A. Toward the design of adaptive selection strategies for multi-factor authentication. Comput. Secur. 2016, 63, 85–116. [Google Scholar] [CrossRef]
  13. Miettinen, M.; Nguyen, T.D.; Sadeghi, A.R.; Asokan, N. Revisiting context-based authentication in IoT. In Proceedings of the Proceedings of the 55th Annual Design Automation Conference, San Francisco, CA, USA, 24–29 June 2018; pp. 1–6. [Google Scholar]
  14. Zhang, F.; Kondoro, A.; Muftic, S. Location-based authentication and authorization using smart phones. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25–27 June 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 1285–1292. [Google Scholar]
  15. Liang, Y.; Samtani, S.; Guo, B.; Yu, Z. Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective. IEEE Internet Things J. 2020, 7, 9128–9143. [Google Scholar] [CrossRef]
  16. Oğuz, A.; Ertuğrul, Ö.F. Human identification based on accelerometer sensors obtained by mobile phone data. Biomed. Signal Process. Control 2022, 77, 103847. [Google Scholar] [CrossRef]
  17. Wang, C.; Wang, Y.; Chen, Y.; Liu, H.; Liu, J. User authentication on mobile devices: Approaches, threats and trends. Comput. Netw. 2020, 170, 107118. [Google Scholar] [CrossRef]
  18. Mall, P.; Amin, R.; Das, A.K.; Leung, M.T.; Choo, K.K.R. PUF-based authentication and key agreement protocols for IoT, WSNs, and Smart Grids: A comprehensive survey. IEEE Internet Things J. 2022, 9, 8205–8228. [Google Scholar] [CrossRef]
  19. Rahim, K.; Tahir, H.; Ikram, N. Sensor based PUF IoT authentication model for a smart home with private blockchain. In Proceedings of the 2018 International Conference on Applied and Engineering Mathematics (ICAEM), Taxila, Pakistan, 4–5 September 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 102–108. [Google Scholar]
  20. Dosovitskiy, A.; Ros, G.; Codevilla, F.; Lopez, A.; Koltun, V. CARLA: An open urban driving simulator. In Proceedings of the Conference on Robot Learning, PMLR, Mountain View, CA, USA, 13–15 November 2017; pp. 1–16. [Google Scholar]
Figure 1. Illustrative scenario: parking entry.
Figure 1. Illustrative scenario: parking entry.
Sensors 24 04621 g001
Figure 2. Distances between several samples of engine sounds of four different cars.
Figure 2. Distances between several samples of engine sounds of four different cars.
Sensors 24 04621 g002
Figure 3. Distances between several samples of engine sounds of two different robots.
Figure 3. Distances between several samples of engine sounds of two different robots.
Sensors 24 04621 g003
Table 1. Average distance between all the spectral centroids.
Table 1. Average distance between all the spectral centroids.
Robot 1Robot 2Car 1Car 2Car 3Car 4
Robot 143.6467.8951.31078.4980.5720.8
Robot 2467.838.5514.3635.5422.8290.5
Car 1951.3514.317.2131.176.6223.9
Car 21078.4635.5131.116.8110.7343.4
Car 3980.5422.876.6110.772.3280.4
Car 4720.8290.5223.9343.4280.417.9
Note: bold values represent average distances that are true positives, while red ones indicate false positives.
Table 2. Average distance between the color histograms.
Table 2. Average distance between the color histograms.
Robot 1Robot 2Car 1Car 2Car 3Car 4
Robot 10.0380.31----
Robot 20.310.042----
Car 1--0.0690.2220.3820.376
Car 2--0.2220.1450.3420.348
Car 3--0.3820.3420.2240.382
Car 4--0.3760.3480.3820.165
Note: bold values represent average distances that are true positives, while red ones indicate false negatives.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Saideh, M.; Jamont, J.-P.; Vercouter, L. Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things. Sensors 2024, 24, 4621. https://doi.org/10.3390/s24144621

AMA Style

Saideh M, Jamont J-P, Vercouter L. Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things. Sensors. 2024; 24(14):4621. https://doi.org/10.3390/s24144621

Chicago/Turabian Style

Saideh, Marc, Jean-Paul Jamont, and Laurent Vercouter. 2024. "Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things" Sensors 24, no. 14: 4621. https://doi.org/10.3390/s24144621

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop