You are on page 1of 4

CO4804 MSc Project | School of Physical Science and Computing | UCLan |

MSc Project Proposal

Name: Course:
Supervisor (lecturer):

Current Modules (and previous modules if Computing or direct entrant)


Do not include level 1 modules. If you are taking the free route list all level 2/3 modules taken. If you
are on a defined course, just list the optional modules taken.

The Project Title


SECURE AND ANONYMOUS ROAMING SCHEME FOR IOT DEVICES ACROSS IP-BASED
NETWORKS

Project Introduction
The efficient services are provided by the development of communication technology to improve the
life quality of human are based on sustainable infrastructures. Due to widely availability of smart
devices, now it is more possible to access different unreachable services and people are allowed to
utilize the information anywhere and anytime. The universal smart society is being built in the form of
smart city where the data is combined using smart devices and for enabling intelligent communication
multiple types of sensor are used. In the smart city, the useful information and resources for remote
operations are provided using universal networks such as management of human resource and
management of enterprise resource by home agent connecting using roaming of foreign agent during
moving of citizen.
The authentication of remote user is required for remotely accessing the multiple authority services
through home agent. In the scheme of remote authentication, the identifier related to user is required for
the verification of legitimation of user. The ID and password are related to the privacy of user can
easily effect when are leaked. Due to such issues, the untracerability and anonymity of user should be
maintained in the process of remote authentication (El-Hajj, M et al., 2017).

Aims and Objectives

In the recent years, different techniques of authentication have been proposed. The scheme of two
factor authentication that uses the password and user ID is used widely. But there are some issues in the
authentication scheme of password based where different attacks can occur by guessing the passwords.
The major technology to overcome the issues of security is based on biometric that is called three
factor authentication method. Each human has unique characteristics such as fingerprints, irises,
geometry of hand and prints of palm. There are some advantages of using three factor authentication
are given: Keys of biometric can never be forgotten or lost, the distribution of biometric keys is not
possible, uniqueness is maintained by biometric keys and biometric keys are not possible to guess.
From all above advantages it can be found that the authentication methods based on biometric are more
CO4804 MSc Project | School of Physical Science and Computing | UCLan |

reliable and secure as compared to the authentication methods of password based. It very difficult to
guess the credentials if we use the combination of password and biometric. In this project the scheme
of three factor authentication will be used because it will show the uniqueness of each user. But there
are some conditions when applying the techniques of biometric based authentication (Atzori, L et
al.,2010). Firstly, the main characteristic of human is biometric and it can never be changed unlike a
password. But there can be some serious issues if the information related to human is leaked. That’s
why the template of original biometric of human should be exported directly. Many different schemes
of authentication based on biometric have been proposed for enhancing the security and for biometrics
extraction of human such as fuzzy extractor and bio hash.

Literature Review
The connected devices are increasing rapidly, forming the (IoT), internet of things. The IoT is larger
network used to connect the actuators and sensors with smart gadgets. Many different domains have
been adopted such as smart grids, transportation, public health, cities, homes, agriculture, and energy
management. The number of challenges are raised by the limitations and requirements of connected
devices. The main challenge is the connectivity challenge to connect the trillions of devices for
communication purposes. Then another challenge is security, used to protect the networks of IoT
because the majority of companies must have to face at least one attack during the whole period by an
anonymous person. And for such attacks, there must be the availability of a tool to get rid of
exploitation of the network. The more alarming security issues are related to the IoT and due to
majority of the companies have adopted this which causes many different threats. For instance, the
device of peacemaker was discovered in the year 2017 used for recalling purposes of Drug
administration and US food of peacemakers of more than 500000 had many security gaps and due to
this hacker could easily control the heartbeat of the device of regulating (Maresch, D et al., 2020).

The requirements of security are highly dependent on its serving applications for the need of integrity,
confidentiality, and authentication that is more dependent on the need for security for the applications.
The key requirement of authentication for IoT is authentication. The trust of participant's devices in the
network of IoT is much important to find out well operation of the network. A very single node can
cause of turning the malicious and through this, the whole system can bring down, can also lead to
disasters The scheme of authentication becomes less applicable and infeasible due to the specific nature
of devices of IoT. The main power design schemes for higher processing and larger memory devices in
cryptographic are not able to use the limited resources of nodes of IoT. The emergence of the scheme
of lightweight authentication occurs due to this behavior and it includes the IoT specific contexts and
also network sensor of wireless that are considered as more suitable for IoT based networks (Ahmed,
M.E et al., 2017).

The traditional internet is used to connect people to their required network. But different approaches
are used by IoT such as it provides the connectivity between Human to Machine or Machine to
Machine to support multiple operations for the specific types of machines of heterogeneous i.e.
locating, identifying, controlling, and monitoring. The massive traffic can occur due to the connection
CO4804 MSc Project | School of Physical Science and Computing | UCLan |

of multiple numbers of devices of type of heterogeneous and due to there is need to deal with big
storage. For the connectivity of different networks, the architectures of TCP/IP are used for a long time
but it does fulfill the need of IoT for different purposes such as security and privacy.
By taking considerations of all risks related to security, there is need to use three-factor authentication
for the prevention of illegal access and the encryption of data when the data is transmitted from one
node of the network to another. The more reliable and secure authentication method is the three-factor
biometric-based authentication other than the method of authentication of the traditional method based
on password.

Method / Proposed Approach


The five modules are included in IOT based network to apply the biometric system. These five
modules are, the biometric sensor used to identify the information, the module of feature extractor used
to create or determine related to unique features that found in the scanned information, the module of
matching used to compare the scanned template with the already placed template, the module of
decision making used to find out that how much percentage is after comparing the two modules and
then finally a module of the database used for storing purposes of templates during enrollment.
The two methods are used to identify the user input. The first method is verification in which the user is
claimed as the specific person through giving user id and then information of the user that is scanned is
compared with the already placed template (Cruz, B et al.,2014). The second method is the
Identification in which the information of the user is scanned in comparison with already stored
templates one by one. The first method is much faster but the operation of the second method is easier.
All of these components are considered when applying the scheme of three factors based on biometric
on IOT based networks. Furthermore, the number of users are also required for the method of
evaluation.

The Gant chart for completion of the project is given below.

Task 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Literature Review

Requirements Gathering

Data Analysis and methods

Discussion

Conclusion

Sharing Draft of Research

Finalizing Report
CO4804 MSc Project | School of Physical Science and Computing | UCLan |

Submission of Final Report

Potential Ethical or Legal Issues


The major drawback of implementing the authentication system of biometrics is the access control on
IOT based networks is limited operating ability. In just one pass, this system can harvest the largest
amount of data and for comparison purposes, the RAM with the largest memory is needed. For any
IoT-based network, this factor is very important to consider and it is much important when the
approach of multi-biometric is used. In this type of biometric, multiple layers of authentication are used
such as voice and facial recognition. To process the ability and speed, the layers of security are used
and a massive amount of data for authentication purposes (Taynitskiy, V et al., 2017).

References:

1. El-Hajj, M., Chamoun, M., Fadlallah, A. and Serhrouchni, A., 2017, October. Analysis
of authentication techniques in the Internet of Things (IoT). In 2017 1st Cyber Security in
Networking Conference (CSNet) (pp. 1-3). IEEE.

2. Atzori, L., Iera, A. and Morabito, G., 2010. The internet of things: A survey. Computer
networks, 54(15), pp.2787-2805.

3. Maresch, D. and Gartner, J., 2020. Make disruptive technological change happen-The
case of additive manufacturing. Technological Forecasting and Social Change, 155, p.119216.

4. Ahmed, M.E. and Kim, H., 2017, April. DDoS attack mitigation in the Internet of
Things using software-defined networking. In 2017 IEEE third international conference on big
data computing service and applications (BigDataService) (pp. 271-276). IEEE.

5. Cruz, B., Gupta, D., Kapoor, A., Haifei, L., McLean, D. and Moreno, F., 2014. Mcafee
labs threats report. McAfee Inc., Santa Clara, CA. Available: http://www. mcafee.
com/us/resources/reports/rp-quarterlythreat-q1-2014. pdf.

6. Taynitskiy, V., Gubar, E. and Zhu, Q., 2017, May. Optimal impulse control of bi-virus
SIR epidemics with application to heterogeneous Internet of Things. In 2017 Constructive
Nonsmooth Analysis and Related Topics (dedicated to the memory of VF Demyanov)
(CNSA) (pp. 1-4). IEEE.

You might also like