AI-Driven Multi-Factor Authentication and Dynamic Trust Management for Securing Massive Machine Type Communication in 6G Networks

Authors

  • P. Hussain Basha Assistant professor, Department of Computer Science and Engineering, PACE Institute of Technology & Science.Ongole.AP, India
  • G. Prathyusha Department of Computer Science ,Sri Padmavati Mahila Visvavidyalayam. Tirupati
  • Dunna Nikitha Rao Department of computer science , Sri Padmavati mahila visvavidyalayam, Tirupati, India
  • Vellaturi Gopikrishna Asst. Professor, Department of Information Technology, MLR Institute of Technology, Hyderabad
  • Prasadu Peddi Associate Professor , Dept of CSE & IT , Shri Jagdishprasad Jhabarmal Tibrewala University, Jhunjhunu, Rajasthan.India
  • V. Saritha Department of Computer Science and Engineering ,Sri Padmavati Mahila Visvavidyalayam, Tirupati, India

Keywords:

AI-driven authentication, dynamic trust management, 6G networks, massive machine type communication, behavioural profiling, deep learning, multi-factor authentication, IoT security

Abstract

With the advent of the 6G era on the horizon, the widespread adoption of massive machine-type communication (MTC) presents novel security concerns about preserving data integrity and confidentiality during transmission across a vast network of interconnected devices. To tackle these challenges, this research paper presents a novel AI-based multi-factor authentication and dynamic trust management system designed to enhance machine-type communications (MTC) security in 6G networks. This study presents a novel behavioural profiling model that utilizes artificial intelligence techniques to effectively accommodate machine-type devices’ varied capabilities and resource limitations. Simulated data is created to replicate diverse scenarios, encompassing variations in network conditions, device attributes, environmental influences, application workloads, and security protocols. The efficacy of the suggested solution is assessed by conducting six simulation rounds, wherein the outcomes reveal diverse levels of accuracy in implementing multi-factor authentication (MFA), ranging from 0.47 to 0.55. The system demonstrates stability in various simulation scenarios, indicating its ability to adapt to dynamic network environments and device behaviour. The utilization of AI-driven multi-factor authentication and dynamic trust management system shows significant potential in enhancing the security of Machine Type Communications (MTC) within the context of 6G networks. The potential of this technology to effectively address security threats in the dynamic and evolving 6G environment is attributed to its robustness and adaptability. It is advisable to conduct additional refinements and validate the system in real-world settings to enhance its performance and guarantee smooth integration into practical deployment scenarios.

Downloads

Download data is not yet available.

References

R. Dangi, G. Lalwani and I. Choudhary, “Study and Investigation on 5G Technology: A Systematic Review,” Sensors, vol. vol. 22, no. no. 1, p. 26, 2022.

Dunna, N. R., Kaipa, C. S., & G , P. (2023). Transforming Healthcare with Secure MECC in 6G Networks. International Journal of Computer Engineering in Research Trends, 10(5), 33–39.

M. H. Alsharif, A. H. Kelechi, M. A. Albreem and S. A. Chaudhry, “Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions,” Symmetry, vol. 12, no. 4, p. 676, 2020.

F. Wang and G. Ma, “Introduction on massive machine-type communications (mMTC),” Springer Briefs in Electrical and Computer Engineering, vol. 1, no. 3, 2019.

J. N. Dwivedi, “Internet of things (IoT) and machine to machine (M2M) communication techniques for cyber crime prediction,” Intelligent Data Analytics for Terror Threat Prediction, vol. 31, no. 55, 2021.

J.JAYASANTHI, & K.SUMALATHA. (2014). Exigent Life from Wireless ad-hoc Signal Networks. International Journal of Computer Engineering in Research Trends, 1(6), 397–404.

N. H. Mahmood, S. Böcker and I. Moerman, “Machine type communications: key drivers and enablers towards the 6G era,” J Wireless Com Network, p. 134, 2021.

X. Xiaoya, W. Yunpeng and W. Pengcheng, “Comprehensive Review on Misbehavior Detection for Vehicular Ad Hoc Networks,” Journal of Advanced Transportation, p. 27, 2022.

S. Rezwan and W. Choi, “A survey on applications of reinforcement learning in flying ad-hoc networks,” Electronics, vol. 10, no. 4, p. 449, 2021.

K. Lakhwani, R. Kaur, P. Kumar and M. Thakur, “An extensive survey on data authentication schemes in cloud computing,” 4th International Conference on Computing Sciences (ICCS), 2018.

A A Damayanthi, & Mohammad Riyaz Belgaum. (2022). A Study of Heterogeneity Characteristics over Wireless Sensor Networks. International Journal of Computer Engineering in Research Trends, 9(12), 258–262.

Rattanalerdnusorn and P. Thaenkaew, “Security implementation for authentication in IoT environments,” IEEE 4th International Conference on Computer and Communication Systems (ICCCS), 2019.

H. Goswami and H. Choudhury, “An esim-based remote credential provisioning and authentication protocol for IoT devices in 5G cellular network,” Internet of Things, vol. 23, p. 100876, 2023.

G. Sharma, D. P. Dhillon and E. M. Sharma, “Attacks and Countermeasures for Secure User Authentication Mechanisms,” 2021.

S. M. Farooq, S. M. Hussain and T. S. Ustun, “A Survey of Authentication Techniques in Vehicular Ad-Hoc Networks,” IEEE Intelligent Transportation Systems Magazine, vol. 13, pp. 39-52, 2021.

S. Chavali, H. Cheema, R. Delgado and E. Nolan, “A Review of Privacy-Preserving Authentication Schemes for Future Internet of Vehicles,” 12th International Conference on Communication Systems and Network Technology, 2023.

[17] Khalil, Usman and et al. , “A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions,” Sensors, 2022. S. S. Sudha, “LITERATURE REVIEW: AGENT BASED DATA SECURITY APPROACH FOR HYBRID CLOUD COMPUTING,” 2021.

Altaweel, H. Mukkath and I. Kamel, “GPS Spoofing Attacks in FANETs: A Systematic Literature Review,” IEEE Access, vol. 11, pp. 55233-55280, 2023.

D. Boursianis and M. S. Papadopoulou, “Internet of things (IoT) and agricultural unmanned aerial vehicles (UAVs) in smart farming: A comprehensive review,” Internet of Things, vol. 18, p. 100187, 2022.

M. Abuhamad, T. Abuhmed, D. Mohaisen and Nyang, “AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 5008-5020, 2020.

T. Michailidis and D. Vouyioukas, “A review on software-based and hardware-based authentication mechanisms for the Internet of Drones,” Drones, vol. 6, no. 2, p. 41, 2022.

Anita Chaudhari, Janice Rodrigues, Aparna Vattamparambil, Revati Warang, & Vidya More. (2020). Secure Authentication Mechanism in IoT Based Healthcare System. International Journal of Computer Engineering in Research Trends, 7(5), 13–18.

Mohammed Shuja Ur Rahman, Mohammed Khaleel Ahmed, & G.S.S Rao. (2017). Two Step Factor Based Authentication Control to Access Cloud Services. International Journal of Computer Engineering in Research Trends, 4(10), 431–440.

Srivastava, A. ., & Kumar, A. . (2023). Secure Authentication Scheme for the Internet of Things. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 182–192. https://doi.org/10.17762/ijritcc.v11i4s.6368

Sahoo, D. K. . (2021). Improved Routing and Secure Data Transmission in Mobile Adhoc Networks Using Trust Based Efficient Randomized Multicast Protocol. Research Journal of Computer Systems and Engineering, 2(2), 06:11. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/25

Mehraj, H., Jayadevappa, D., Haleem, S. L. A., Parveen, R., Madduri, A., Ayyagari, M. R., & Dhabliya, D. (2021). Protection motivation theory using multi-factor authentication for providing security over social networking sites. Pattern Recognition Letters, 152, 218-224. doi:10.1016/j.patrec.2021.10.002

Downloads

Published

02.09.2023

How to Cite

Basha, P. H. ., Prathyusha, G. ., Rao, D. N. ., Gopikrishna, V. ., Peddi , P. ., & Saritha, V. . (2023). AI-Driven Multi-Factor Authentication and Dynamic Trust Management for Securing Massive Machine Type Communication in 6G Networks. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 361–374. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3422

Issue

Section

Research Article