AI-Driven Multi-Factor Authentication and Dynamic Trust Management for Securing Massive Machine Type Communication in 6G Networks
Keywords:
AI-driven authentication, dynamic trust management, 6G networks, massive machine type communication, behavioural profiling, deep learning, multi-factor authentication, IoT securityAbstract
With the advent of the 6G era on the horizon, the widespread adoption of massive machine-type communication (MTC) presents novel security concerns about preserving data integrity and confidentiality during transmission across a vast network of interconnected devices. To tackle these challenges, this research paper presents a novel AI-based multi-factor authentication and dynamic trust management system designed to enhance machine-type communications (MTC) security in 6G networks. This study presents a novel behavioural profiling model that utilizes artificial intelligence techniques to effectively accommodate machine-type devices’ varied capabilities and resource limitations. Simulated data is created to replicate diverse scenarios, encompassing variations in network conditions, device attributes, environmental influences, application workloads, and security protocols. The efficacy of the suggested solution is assessed by conducting six simulation rounds, wherein the outcomes reveal diverse levels of accuracy in implementing multi-factor authentication (MFA), ranging from 0.47 to 0.55. The system demonstrates stability in various simulation scenarios, indicating its ability to adapt to dynamic network environments and device behaviour. The utilization of AI-driven multi-factor authentication and dynamic trust management system shows significant potential in enhancing the security of Machine Type Communications (MTC) within the context of 6G networks. The potential of this technology to effectively address security threats in the dynamic and evolving 6G environment is attributed to its robustness and adaptability. It is advisable to conduct additional refinements and validate the system in real-world settings to enhance its performance and guarantee smooth integration into practical deployment scenarios.
Downloads
References
R. Dangi, G. Lalwani and I. Choudhary, “Study and Investigation on 5G Technology: A Systematic Review,” Sensors, vol. vol. 22, no. no. 1, p. 26, 2022.
Dunna, N. R., Kaipa, C. S., & G , P. (2023). Transforming Healthcare with Secure MECC in 6G Networks. International Journal of Computer Engineering in Research Trends, 10(5), 33–39.
M. H. Alsharif, A. H. Kelechi, M. A. Albreem and S. A. Chaudhry, “Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions,” Symmetry, vol. 12, no. 4, p. 676, 2020.
F. Wang and G. Ma, “Introduction on massive machine-type communications (mMTC),” Springer Briefs in Electrical and Computer Engineering, vol. 1, no. 3, 2019.
J. N. Dwivedi, “Internet of things (IoT) and machine to machine (M2M) communication techniques for cyber crime prediction,” Intelligent Data Analytics for Terror Threat Prediction, vol. 31, no. 55, 2021.
J.JAYASANTHI, & K.SUMALATHA. (2014). Exigent Life from Wireless ad-hoc Signal Networks. International Journal of Computer Engineering in Research Trends, 1(6), 397–404.
N. H. Mahmood, S. Böcker and I. Moerman, “Machine type communications: key drivers and enablers towards the 6G era,” J Wireless Com Network, p. 134, 2021.
X. Xiaoya, W. Yunpeng and W. Pengcheng, “Comprehensive Review on Misbehavior Detection for Vehicular Ad Hoc Networks,” Journal of Advanced Transportation, p. 27, 2022.
S. Rezwan and W. Choi, “A survey on applications of reinforcement learning in flying ad-hoc networks,” Electronics, vol. 10, no. 4, p. 449, 2021.
K. Lakhwani, R. Kaur, P. Kumar and M. Thakur, “An extensive survey on data authentication schemes in cloud computing,” 4th International Conference on Computing Sciences (ICCS), 2018.
A A Damayanthi, & Mohammad Riyaz Belgaum. (2022). A Study of Heterogeneity Characteristics over Wireless Sensor Networks. International Journal of Computer Engineering in Research Trends, 9(12), 258–262.
Rattanalerdnusorn and P. Thaenkaew, “Security implementation for authentication in IoT environments,” IEEE 4th International Conference on Computer and Communication Systems (ICCCS), 2019.
H. Goswami and H. Choudhury, “An esim-based remote credential provisioning and authentication protocol for IoT devices in 5G cellular network,” Internet of Things, vol. 23, p. 100876, 2023.
G. Sharma, D. P. Dhillon and E. M. Sharma, “Attacks and Countermeasures for Secure User Authentication Mechanisms,” 2021.
S. M. Farooq, S. M. Hussain and T. S. Ustun, “A Survey of Authentication Techniques in Vehicular Ad-Hoc Networks,” IEEE Intelligent Transportation Systems Magazine, vol. 13, pp. 39-52, 2021.
S. Chavali, H. Cheema, R. Delgado and E. Nolan, “A Review of Privacy-Preserving Authentication Schemes for Future Internet of Vehicles,” 12th International Conference on Communication Systems and Network Technology, 2023.
[17] Khalil, Usman and et al. , “A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions,” Sensors, 2022. S. S. Sudha, “LITERATURE REVIEW: AGENT BASED DATA SECURITY APPROACH FOR HYBRID CLOUD COMPUTING,” 2021.
Altaweel, H. Mukkath and I. Kamel, “GPS Spoofing Attacks in FANETs: A Systematic Literature Review,” IEEE Access, vol. 11, pp. 55233-55280, 2023.
D. Boursianis and M. S. Papadopoulou, “Internet of things (IoT) and agricultural unmanned aerial vehicles (UAVs) in smart farming: A comprehensive review,” Internet of Things, vol. 18, p. 100187, 2022.
M. Abuhamad, T. Abuhmed, D. Mohaisen and Nyang, “AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 5008-5020, 2020.
T. Michailidis and D. Vouyioukas, “A review on software-based and hardware-based authentication mechanisms for the Internet of Drones,” Drones, vol. 6, no. 2, p. 41, 2022.
Anita Chaudhari, Janice Rodrigues, Aparna Vattamparambil, Revati Warang, & Vidya More. (2020). Secure Authentication Mechanism in IoT Based Healthcare System. International Journal of Computer Engineering in Research Trends, 7(5), 13–18.
Mohammed Shuja Ur Rahman, Mohammed Khaleel Ahmed, & G.S.S Rao. (2017). Two Step Factor Based Authentication Control to Access Cloud Services. International Journal of Computer Engineering in Research Trends, 4(10), 431–440.
Srivastava, A. ., & Kumar, A. . (2023). Secure Authentication Scheme for the Internet of Things. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 182–192. https://doi.org/10.17762/ijritcc.v11i4s.6368
Sahoo, D. K. . (2021). Improved Routing and Secure Data Transmission in Mobile Adhoc Networks Using Trust Based Efficient Randomized Multicast Protocol. Research Journal of Computer Systems and Engineering, 2(2), 06:11. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/25
Mehraj, H., Jayadevappa, D., Haleem, S. L. A., Parveen, R., Madduri, A., Ayyagari, M. R., & Dhabliya, D. (2021). Protection motivation theory using multi-factor authentication for providing security over social networking sites. Pattern Recognition Letters, 152, 218-224. doi:10.1016/j.patrec.2021.10.002
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.