Abstract
Background: Today, computer networks are everywhere, and we utilize the Internet to access our home network. IoT networks connect home appliances and provide remote instructions. Access to any tool over an uncertain network attracts assaults. User authentication might be password- or biometric-based. Data security across a secure network like the Internet is difficult when authenticating a device. Hashing is used for validation and confidentiality in several encryption and decryption schemes. Classic cryptographic security methods require a lot of memory, processing power, and power. They cannot work with low-resource IoT devices.
Methods: Automatic Device-to-Device communiqué opens up new applications, yet network machines and devices have limited resources. A remote-access home device authentication mechanism is proposed in this research. A new, lightweight encryption approach based on Deoxyribonucleic- Acid (DNA) sequences is developed to make IoT device connections easy and secure. Home network and appliance controller devices use authentication tools. DNA sequences are random therefore we utilized them to create a secure secret key.
Results: Efficiency and strength are advantages of the proposed method. Our method prevents replay, server spoofing, and man-in-the-middle attacks. The suggested method protects network users and devices.
Conclusion: Meanwhile, we model the system and find that the network's delay, throughput, and energy consumption don't degrade considerably.
Graphical Abstract
[http://dx.doi.org/10.3390/cryptography6030037]
[http://dx.doi.org/10.1016/j.sysarc.2022.102763]
[http://dx.doi.org/10.1007/978-3-030-89906-6_27]
[http://dx.doi.org/10.1109/ACCESS.2021.3137175]
[http://dx.doi.org/10.1109/ACCESS.2022.3174558]
[http://dx.doi.org/10.3390/electronics11071083]
[http://dx.doi.org/10.3390/s22186902] [PMID: 36146250]
[http://dx.doi.org/10.3390/s20216131] [PMID: 33126629]
[http://dx.doi.org/10.1016/j.cose.2022.102677]
[http://dx.doi.org/10.1155/2022/7537764]
[http://dx.doi.org/10.1007/s42979-022-01269-9]
[http://dx.doi.org/10.1016/j.procs.2022.07.016]
[http://dx.doi.org/10.14722/ndss.2022.24208]
[http://dx.doi.org/10.1109/ICOIN53446.2022.9687197]
[http://dx.doi.org/10.3390/s22239174] [PMID: 36501875]
[http://dx.doi.org/10.1007/978-3-031-23095-0_15]
[http://dx.doi.org/10.3390/app122211853]
[http://dx.doi.org/10.1142/S0219265921410310]
[http://dx.doi.org/10.3390/s22218564] [PMID: 36366261]
[http://dx.doi.org/10.1007/s11042-022-13106-5]
[http://dx.doi.org/10.1007/s10586-021-03466-2]
[http://dx.doi.org/10.3390/app122412688]
[http://dx.doi.org/10.1109/JIOT.2021.3085595]
[http://dx.doi.org/10.12785/ijcds/120198]
[http://dx.doi.org/10.1016/j.future.2021.11.011]
[http://dx.doi.org/10.18517/ijaseit.12.2.8601]
[http://dx.doi.org/10.1109/ACCESS.2022.3224806]
[http://dx.doi.org/10.1109/TNSM.2022.3141942]
[http://dx.doi.org/10.1007/s11042-021-11657-7]
[http://dx.doi.org/10.3390/electronics11111762]