The Internet of Things refers to networks of physical, technological devices connected via the Internet, allowing them to communicate and exchange data. Such environments face security issues like verifying users using Internet of Things devices, for example, in a company or hospital or properly securing user communication. Communication security largely relies on the security of symmetric keys, which we use to encrypt messages. This paper introduces a novel approach to verifying the identity of users of Internet of Things environments and generating symmetric keys between two users to communicate between them. The verification system identifies users using images captured from the camera. Thus, the proposed symmetric keys generation method uses biometric parameters representing the coordinates of a triangle from the two users' faces biometry and the time factors. The triangle coordinates are located between the corners of the left and right eyes and the chin. Then, these coordinates and time factors undergo mathematical processing to obtain an alphanumeric symmetric session key. We tested the entire system, obtaining a high precision score regarding user identity verification, and additionally examined the possibility of breaking the generated symmetric keys. All keys were characterised by high entropy and resistance to brute-force attacks.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11828910PMC
http://dx.doi.org/10.1038/s41598-025-89226-3DOI Listing

Publication Analysis

Top Keywords

internet things
16
symmetric keys
16
verification system
8
generation method
8
things environments
8
users internet
8
time factors
8
symmetric
6
internet
5
keys
5

Similar Publications

The neurodegenerative disorder called Parkinson's disease (PD) is one of the most common diseases now a day. In this research, PD is detected and severity classification is done using the proposed Jaccard LeNet (JLeNet) with the help of voice signal in the IoT environment. Here, the IoT simulation is done.

View Article and Find Full Text PDF

Oil-based drilling cutting residues (OBDCRs) are among the primary solid wastes generated during shale gas exploration and development. Utilizing existing equipment to transform OBDCRs into ceramsites appears to be a feasible and resource-efficient approach. In this study, building ceramsites were prepared with OBDCRs incorporating with fly ash (a byproduct of coal combustion) as raw materials.

View Article and Find Full Text PDF

A general TD-Q learning control approach for discrete-time Markov jump systems.

ISA Trans

March 2025

School of Electrical and Mechanical Engineering, University of Adelaide, Adelaide SA 5005, Australia; Research and Innovation Centre, Obuda University, 1034 Budapest, Hungary. Electronic address:

This paper develops a novel temporal difference Q (TD-Q) learning approach, designed to address the robust control challenge in discrete-time Markov jump systems (MJSs) which are characterized by entirely unknown dynamics and transition probabilities (TPs). The model-free TD-Q learning method is uniquely comprehensive, including two special cases: Q learning for MJSs with unknown dynamics, and TD learning for MJSs with undetermined TPs. We propose an innovative ternary policy iteration framework, which iteratively refines the control policies through a dynamic loop of alternating updates.

View Article and Find Full Text PDF

This study investigates the crucial relationship between renewable energy consumption and digitization to drive sustainable development, specifically focusing on One Belt One Road (OBOR) countries. Using OBOR countries, panel data is collected over 24 years from 1996 to 2019.An enhanced System GMM estimator is employed in order to overcome challenges associated with methodology such as endogeneity, homoscedasticity and serial correlation which ensures reliable and robust payoff results.

View Article and Find Full Text PDF

Remarkable inter-class similarity and intra-class variability of tomato leaf diseases seriously affect the accuracy of identification models. A novel tomato leaf disease identification model, DWTFormer, based on frequency-spatial feature fusion, was proposed to address this issue. Firstly, a Bneck-DSM module was designed to extract shallow features, laying the groundwork for deep feature extraction.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!