Enhancing Security of 5G-Enabled IoT Systems through Advanced Authentication Mechanisms: A Multifaceted Approach
DOI:
https://doi.org/10.56919/usci.2324.025Keywords:
Behavioural, Internet of things IOT, cyber threats, DDoS, Authentication, IDSAbstract
The Internet of Things (IoT) has revolutionized device communications, offering unprecedented efficiency and convenience. However, the widespread adoption of IoT has raised significant security concerns, emphasizing the need for robust security measures. This study focuses on the crucial aspect of authentication within the layered architecture of IoT systems. Authentication is foundational to the architecture, ensuringIoT services and datae availability, security, and integrita. The research evaluates the current state of IoT authentication techniques, highlighting limitations in conventional solutions.Ann advanced authentication framework is propose to address these shortcomingsd, incorporating cutting-edge technologies such as blockchain, artificial intelligence, and biometrics. The framework employs biometric data for a dynamic and adaptive authentication process, enhancing security and accuracy in user and device identification. Blockchain technology is integrated to establish a decentralized and tamper-resistant identity management system, reducing the risk of unauthorized access and data manipulation. Artificial intelligence continuously adapts authentication processes based on behavioural patterns, bolstering the system's resilience against evolving cyber threats. The study also discusses the practical application of the proposed authentication system, considering resource limitations in IoT devices. It provides insights into thesuggested solution's efficiency, scalability, and interoperability within various IoT ecosystems. The research contributes to the ongoing discourse on IoT security by thoroughly examining enhanced authentication procedures. Organizations can fortify their IoT deployments against a growing array of cyber threats by prioritizing advanced authentication within a layered design, fostering a more secure and reliable IoT ecosystem. Additionally, the study presents a comprehensive overview of the state-of-the-art security in IoT, exploring various designs, enabling technologies, and protocols. It delves into security challenges at each architectural tier, providing an in-depth analysis of attack taxonomies and advanced defenses. The article serves as a valuable resource for researchers and academics in the IoT sector, offering a detailed survey of architectural security, identification of challenges, resolution strategies, and insights into the evolving landscape of IoT. The study provides a comprehensive survey of IoT architectural security, identifying challenges, proposing resolutions, and highlighting changes in the IoT domain. This research aims to enhance the accuracy by 80% of IoT security, fostering a more secure and reliable IoT ecosystem.
References
Aghili, S. F., Mala, H., Schindelhauer, C., Shojafar, M., & Tafazolli, R. (2021). Closed-loop and open-loop authentication protocols for blockchain-based IoT systems. Information Processing & Management, 58(4), 102568. DOI: https://doi.org/10.1016/j.ipm.2021.102568
Ahmad, I., Shahabuddin, S., Kumar, T., Okwuibe, J., Gurtov, A., & Ylianttila, M. (2019). Security for 5G and beyond. IEEE Communications Surveys & Tutorials, 21(4), 3682-3722. DOI: https://doi.org/10.1109/COMST.2019.2916180
Ahmad, R., & Alsmadi, I. (2021). Machine learning approaches to IoT security: A systematic literature review Internet of Things, 14, 100365. DOI: https://doi.org/10.1016/j.iot.2021.100365
Ali, Z. H., Ali, H. A., & Badawy, M. M. (2015). Internet of Things (IoT): definitions, challenges and recent research directions. International Journal of Computer Applications, 128(1), 37-47. DOI: https://doi.org/10.5120/ijca2015906430
Alsharif, M. H., Jahid, A., Kelechi, A. H., & Kannadasan, R. (2023). Green IoT: A review and future research directions. Symmetry, 15(3), 757. DOI: https://doi.org/10.3390/sym15030757
Amaral, L. A., Hessel, F. P., Bezerra, E. A., Corrêa, J. C., Longhi, O. B., & Dias, T. F. O. (2011). eCloudRFID – A mobile software framework architecture for pervasive RFID-based applications. Journal of Network and Computer Applications, 34(3), 972-979. DOI: https://doi.org/10.1016/j.jnca.2010.04.005
Benabdessalem, R., Hamdi, M., & Kim, T. H. (2014, 20-23 Dec. 2014). A Survey on Security Models, Techniques, and Tools for the Internet of Things. 2014 7th International Conference on Advanced Software Engineering and Its Applications, DOI: https://doi.org/10.1109/ASEA.2014.15
Cerny, T. (2019). Aspect-oriented challenges in system integration with microservices, SOA and IoT. Enterprise Information Systems, 13(4), 467-489. https://doi.org/10.1080/17517575.2018.1462406 DOI: https://doi.org/10.1080/17517575.2018.1462406
Datta, P. M. (2022). Strategic Analytics for Decision-Making. In Global Technology Management 4.0: Concepts and Cases for Managing in the 4th Industrial Revolution (pp. 91-109). Springer. DOI: https://doi.org/10.1007/978-3-030-96929-5_6
Dragoni, N., Giallorenzo, S., Lafuente, A. L., Mazzara, M., Montesi, F., Mustafin, R., & Safina, L. (2017). Microservices: Yesterday, Today, and Tomorrow. In M. Mazzara & B. Meyer (Eds.), Present and Ulterior Software Engineering (pp. 195-216). Springer International Publishing. DOI: https://doi.org/10.1007/978-3-319-67425-4_12
Fan, Q., Chen, J., Deborah, L. J., & Luo, M. (2021). A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain. Journal of Systems Architecture, 117, 102112. DOI: https://doi.org/10.1016/j.sysarc.2021.102112
Ghosh, A., Mukherjee, A., & Misra, S. (2021). Sega: Secured edge gateway microservices architecture for iiot-based machine monitoring. IEEE Transactions on Industrial Informatics, 18(3), 1949-1956. DOI: https://doi.org/10.1109/TII.2021.3102158
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645-1660. DOI: https://doi.org/10.1016/j.future.2013.01.010
Javed, A., Malhi, A., Kinnunen, T., & Främling, K. (2020). Scalable IoT Platform for Heterogeneous Devices in Smart Environments. IEEE Access, 8, 211973-211985. DOI: https://doi.org/10.1109/ACCESS.2020.3039368
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), 2481-2501. DOI: https://doi.org/10.1007/s11276-014-0761-7
Karie, N. M., Sahri, N. M., & Haskell-Dowland, P. (2020, 21-21 April 2020). IoT Threat Detection Advances, Challenges and Future Directions. 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), DOI: https://doi.org/10.1109/ETSecIoT50046.2020.00009
Karie, N. M., Sahri, N. M., Yang, W., Valli, C., & Kebande, V. R. (2021). A Review of Security Standards and Frameworks for IoT-Based Smart Environments. IEEE Access, 9, 121975-121995. DOI: https://doi.org/10.1109/ACCESS.2021.3109886
Kebande, V. R., Karie, N. M., & Venter, H. (2018). Adding digital forensic readiness as a security component to the IoT domain. DOI: https://doi.org/10.18517/ijaseit.8.1.2115
Khanam, S., Ahmedy, I. B., Idris, M. Y. I., Jaward, M. H., & Sabri, A. Q. B. M. (2020). A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things. IEEE Access, 8, 219709-219743. DOI: https://doi.org/10.1109/ACCESS.2020.3037359
Khattak, H. A., Shah, M. A., Khan, S., Ali, I., & Imran, M. (2019). Perception layer security in Internet of Things. Future Generation Computer Systems, 100, 144-164. DOI: https://doi.org/10.1016/j.future.2019.04.038
Kumar, A., Saha, R., Conti, M., Kumar, G., Buchanan, W. J., & Kim, T. H. (2022). A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. Journal of Network and Computer Applications, 204, 103414. DOI: https://doi.org/10.1016/j.jnca.2022.103414
Lai, C., Boi, F., Buschettu, A., & Caboni, R. (2019, 26-28 Aug. 2019). IoT and Microservice Architecture for Multimobility in a Smart City. 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud), DOI: https://doi.org/10.1109/FiCloud.2019.00040
Mirani, A. A., Velasco-Hernandez, G., Awasthi, A., & Walsh, J. (2022). Key Challenges and Emerging Technologies in Industrial IoT Architectures: A Review. Sensors, 22(15). DOI: https://doi.org/10.3390/s22155836
Moens, P., Bracke, V., Soete, C., Vanden Hautte, S., Nieves Avendano, D., Ooijevaar, T., Devos, S., Volckaert, B., & Van Hoecke, S. (2020). Scalable fleet monitoring and visualization for smart machine maintenance and industrial IoT applications. Sensors, 20(15), 4308. DOI: https://doi.org/10.3390/s20154308
Piyare, R. (2013). Internet of things: ubiquitous home control and monitoring system using android based smart phone. International journal of Internet of Things, 2(1), 5-11.
Rath, C. K., Mandal, A. K., & Sarkar, A. (2023). Microservice based scalable IoT architecture for device interoperability. Computer Standards & Interfaces, 84, 103697. DOI: https://doi.org/10.1016/j.csi.2022.103697
Said, O., & Masud, M. (2013). Towards internet of things: Survey and future vision. International Journal of Computer Networks, 5(1), 1-17.
Santana, C., Andrade, L., Delicato, F. C., & Prazeres, C. (2021). Increasing the availability of IoT applications with reactive microservices. Service Oriented Computing and Applications, 15(2), 109-126. DOI: https://doi.org/10.1007/s11761-020-00308-8
Sarker, I. H., Khan, A. I., Abushark, Y. B., & Alsolami, F. (2023). Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mobile Networks and Applications, 28(1), 296-312. DOI: https://doi.org/10.1007/s11036-022-01937-3
Stout, W. M. S., & Urias, V. E. (2016, 24-27 Oct. 2016). Challenges to securing the Internet of Things. 2016 IEEE International Carnahan Conference on Security Technology (ICCST), DOI: https://doi.org/10.1109/CCST.2016.7815675
Ungurean, I., & Gaitan, N. C. (2020). A software architecture for the Industrial Internet of Things—A conceptual model. Sensors, 20(19), 5603. DOI: https://doi.org/10.3390/s20195603
Yu, X., & Guo, H. (2019). A survey on IIoT security. 2019 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS), DOI: https://doi.org/10.1109/VTS-APWCS.2019.8851679
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
UMYU Scientifica recognizes the importance of protecting authors’ intellectual property while promoting the free exchange of scientific knowledge. The journal adopts a copyright-retention model that empowers authors to maintain ownership of their work while granting the journal rights necessary for publication and dissemination.
1. Copyright Ownership
Authors publishing with UMYU Scientifica retain full copyright and publishing rights to their work. By submitting a manuscript, authors agree to grant the journal a non-exclusive license to publish, reproduce, distribute, and archive the article in all forms and media for the purpose of scholarly communication.
2. Licensing Terms
All articles are published under the Creative Commons Attribution–NonCommercial (CC BY-NC) license.
This license permits others to:
- Share - copy and redistribute the material in any medium or format.
- Adapt - remix, transform, and build upon the material.
- For non-commercial purposes only, provided that proper credit is given to the original author(s) and UMYU Scientifica as the source, a link to the license is provided, and any modifications are clearly indicated.
Commercial reuse or distribution of the content requires written permission from both the author and the editorial office.
3. Author Rights
Authors are free to:
- Deposit all versions of their manuscript (preprint, accepted version, and published version) in institutional, disciplinary, or public repositories without embargo.
- Use and distribute their published article for non-commercial scholarly purposes, including teaching, conference presentations, and research sharing.
- Include their work in future books, theses, or compilations, provided proper citation to the journal is made.
4. Publisher’s Rights
Upon publication, UMYU Scientifica retains the right to:
- Host, index, and disseminate the article through the journal’s website and partner databases.
- Archive the content in long-term preservation systems such as the PKP Preservation Network (PKP-PN) and the Umaru Musa Yar’adua University Institutional Repository.
5. Attribution and Citation
Users must give appropriate credit to the author(s), include a link to the article’s DOI or the journal webpage, and indicate if changes were made. Proper citation is required whenever the work is reused or referenced.
6. License Reference
For detailed terms of use, please refer to the Creative Commons Attribution–NonCommercial 4.0 International License (CC BY-NC 4.0):
https://creativecommons.org/licenses/by-nc/4.0/









