Improvised Multi-Factor Authentication for End-User Security in Cyber Physical System

Authors

  • M. Maranco Department of Networking and Communications, Faculty of Engineering and Technology, SRM Institute of Science and Technology,Kattankulathur, Tamilnadu, India
  • R. Logeshwari Department of Networking and Communications, Faculty of Engineering and Technology, SRM Institute of Science and Technology,Kattankulathur, Tamilnadu, India
  • M. Sivakumar Department of Networking and Communications, Faculty of Engineering and Technology, SRM Institute of Science and Technology,Kattankulathur, Tamilnadu, India
  • V. Manikandan Department of Electrical and Electronics Engineering, Coimbatore Institute of Technology,Coimbatore, India

Keywords:

Multi-Factor Authentication, One Time Password, Geo-location, Cyber Physical System, e-health environment

Abstract

End-user security is the most important thing in day-to-day life. We use a security system for household appliances, vehicles, smartphones, etc., to protect and safeguard our things and the environment. The Cyber Physical System (CPS) contains an internet-enabled digital component. CPS security is applied in many areas, such as transport, healthcare, and all industry 4.0 applications. Multi-Factor Authentication (MFA) is one of the traditional authentications that helps enhance the security level in CPS. The typical authentication method contains a strong password, biometrics, etc. Even though the current end-user security system has implemented a legacy digital control mechanism, the system has a higher chance of getting compromised through malicious activities. The major point of the MFA approach is that intruders can be blocked at any level of the authentication scheme. This study aims at developing a secure and efficient authentication gateway. The proposed system presents enhancements to end-user security using MFA techniques. Three distinct works in this study use MFA technique. The MFA technique consists of three distinct layers. The end-user's geo-location is considered the first security gateway by the user distance within the range of CPS and validates the user's current position with predefined geo-location logic. One Time Password (OTP) send through e-mail is used for the second layer. Hash algorithms such as SHA256 or SALTING use the third layer implementation. The typical CPS needs to authorize and authenticate the user's identity to ensure end-users identification in the modern security system. Efficient and secure multi-factor authentication techniques designed and evaluated on end-user digital health applications and obtained the results with the accuracy of 95.50%, 97.50% and 96.40% respect to three distinct layer authentications. The developed system also analyzed the formal and informal verifications against to the various attacks.

Downloads

Download data is not yet available.

References

Khan, M.K., Kumari, S.: An Authentication Scheme for Secure Access to Healthcare Services. Journal of Medical Systems. 37(4), 9954-9954 (2013). https://doi.org/10.1007/s10916-013-9954-3.

Mishra, D., Srinivas, J., Mukhopadhyay, S.: A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems. Journal of Medical Systems. 38 (10), 120-120 (2014). https://doi.org/10.1007/s10916-014-0120-3.

Seifert, D., Reza, H.: A Security Analysis of Cyber-Physical Systems Architecture for Healthcare. Computers. 5(4), 27-27 (2016). https://doi.org/10.3390/computers5040027

Cheddad, A, Condell, J, Curran, K., McKevitt, P.: A hash-based image encryption algorithm. Optics Communications. 283(6), 879-893 (2010).

Ogini, N., Ogwara, N.: Securing Database passwords using a combination of hashing and salting techniques. IPASJ International Journal of Computer Science (IIJCS). 2(8), 52-58 (2014).

Sriramya, P., Karthika, R.A.: Providing password security by salted password hashing using bcrypt algorithm. ARPN journal of engineering and applied sciences. 10(13). 5551-5556 (2015).

Lakshmanan, T., Muthusamy, M.: A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes. 9 (2012).

Amin, R., Biswas, G.P.: Remote Access Control Mechanism Using Rabin Public Key Cryptosystem. 525-533(2015).

Bao, L.: Location Authentication Methods for Wireless Network Access Control. IEEE International Performance, Computing and Communications Conference. 160-167 (2008).

Manoharan, S.: On GPS Tracking of Mobile Devices. In 2009 Fifth International Conference on Networking and Services. 415-418 (2009).

Michael, K, McNamee, A., Michael, M.G.: The Emerging Ethics of Humancentric GPS Tracking and Monitoring. In 2006 International Conference on Mobile Business. 34-34 (2006).

Mohamad, O.A., Hameed, R.T., Tapus, N.: Design and implementation of real time tracking system based on Arduino Intel Galileo', in 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). 1-6 (2016).

Roxin, A., Gaber, J., Wack, M., Nait-Sidi-Moh, A.: Survey of Wireless Geolocation Techniques. In 2007 IEEE Globecom Workshops. pp. 1-9 (2007).

Roxin, A., Gaber, J., Wack, M., Nait-Sidi-Moh, A.: Survey of Wireless Geolocation Techniques. In 2007 IEEE Globecom Workshops. 1-9 (2007).

Mulla, A., Baviskar, J., Baviskar, A., Bhovad, A.: GPS assisted Standard Positioning Service for navigation and tracking: Review & implementation. In 2015 International Conference on Pervasive Computing (ICPC). 1-6 (2015).

Michael, K., McNamee, A., Michael, M.G.: The Emerging Ethics of Humancentric GPS Tracking and Monitoring. In 2006 International Conference on Mobile Business. 34-34 (2006)

Siddiqui, Z., Abdullah, A.H., Khan, M.K., Alghamdi, A.S.: Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System. Journal of Medical Systems. 38(1). 9997-9997 (2014). https://doi.org/10.1007/s10916-013-9997-5

Ali, R., Pal, A.K.: Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment. Arabian Journal for Science and Engineering. 42(8), 3655-3672 (2017). D.O.I. 10.1007/s13369-017-2665-1

Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D.: A privacy preserving three-factor authentication protocol for e-Health clouds. The Journal of Supercomputing. 72(10), 3826-3849 (2016). https://doi.org/10.1007/s11227-015-1610-x

Limbasiya, T., Soni, M., Mishra, S.K.: Advanced formal authentication protocol using smart cards for network applicants. Computers & Electrical Engineering. 66, 50-63 (2018). https://doi.org/10.1016/j.compeleceng.2017.12.045

Singh, A., Chatterjee, K.: A secure multi-tier authentication scheme in cloud computing environment. In 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]. 1-7 (2015).

Sridhar, S., Smys, S.: A hybrid multilevel authentication scheme for private cloud environment. In 2016 10th International Conference on Intelligent Systems and Control (ISCO). 1-5 (2016).

Wang, M., Abbass, H.A., Hu, J.: Continuous authentication using EEG and face images for trusted autonomous systems. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). 368-375 (2016).

Vegh, L.: Cyber-physical systems security through multi-factor authentication and data analytics. In 2018 IEEE International Conference on Industrial Technology (ICIT). 1369-1374 (2018).

Maninder, S., Sarbjeet, S.: Design and Implementation of Multi-tier Authentication Scheme in Cloud. International Journal of Computer Science. 9(5), 1694-0814 (2012).

Maninder, S., Sarbjeet, S.: Design and Implementation of Multi-tier Authentication Scheme in Cloud. International Journal of Computer Science. 9(5), 1694-0814 (2012).

Konstantinou, C., Maniatakos, M., Saqib, F., Hu, S., Plusquellic, J., Jin, Y.: Cyber-physical systems: A security perspective. In 2015 20th IEEE European Test Symposium (ETS), pp. 1-8 (2015).

Lallie, HS, Shepherd, L.A.: Nurse, J.R.C., Erola, A., Epiphaniou, G., Maple, C., Bellekens, X.: Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security. 105, 102248-102248 (2021). https://doi.org/10.1016/j.cose.2021.102248

Lim, S.Y., Kiah, M.M., Ang, T.F.: Security Issues and Future Challenges of Cloud Service Authentication. ActaPolytechnicaHungarica. 14(2) (2017 https://doi.org/10.12700/aph.14.2.2017.2.4

Moller, D.P.F., Vakilzadian, H.: Cyber-physical systems in smart transportation.In 2016 IEEE International Conference on Electro Information Technology (EIT). 0776-0781 (2016).

Rathore, H., Mohamed, A., Guizani, M.: A Survey of Blockchain Enabled Cyber-Physical Systems. Sensors. 20(1), 282-282 (2020). https://doi.org/10.3390/s20010282

Sengan, S.V. S., Nair, S.K., V.I. J. M., Ravi, L.: Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network. Future Generation Computer Systems. 112, 724-737 (2020). https://doi.org/10.1016/j.future.2020.06.028

Vegh, L.: Cyber-physical systems security through multi-factor authentication and data analytics. In 2018 IEEE International Conference on Industrial Technology (ICIT). 1369-1374 (2018).

Moller, D.P.F., Vakilzadian, H.: Cyber-physical systems in smart transportation. In 2016 IEEE International Conference on Electro Information Technology (EIT). 0776-0781 (2016).

Ragaventhiran J., Vigneshwaran P., Prabu Ramadoss, Prisma Megantoro: An Unsupervised Malware Detection System for Windows Based System Call Sequences. Malaysian Journal of Computer Science, Special Issue on Computing, Communication and Cyber Physical Systems. 79-92 (2022). https://doi.org/10.22452/mjcs. sp2022no2.7

Mishra, A., Pandi, V.: Intrusion Detection Using Feed-Forward Neural Network. In: So-In, C., Londhe, N.D., Bhatt, N., Kitsing, M. (eds) Information Systems for Intelligent Systems .Smart Innovation, Systems and Technologies. 324 (2023). Springer, Singapore. https://doi.org/10.1007/978-981-19-7447-2_9.

Downloads

Published

07.02.2024

How to Cite

Maranco, M., Logeshwari, R., Sivakumar, M., & Manikandan, V. (2024). Improvised Multi-Factor Authentication for End-User Security in Cyber Physical System. International Journal of Intelligent Systems and Applications in Engineering, 12(15s), 416 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4765

Issue

Section

Research Article