A Survey on AIoT, Applications of Blockchain Authentication and OAuth Mechanisms


Authors : Nischal S Hiremath; Sanchit Srinivas; Aniket P; Parthivi R; Shobha T

Volume/Issue : Volume 10 - 2025, Issue 1 - January


Google Scholar : https://tinyurl.com/4pncphtz

Scribd : https://tinyurl.com/3a4ku2rz

DOI : https://doi.org/10.5281/zenodo.14717006


Abstract : Integrating AI with IoT has formed the concept of AIoT systems that work to really increase automation, data analytics, and decision- making procedures. But fusion has also emerged with its challenges to new security issues for AIoT systems. Threats such as data breaches, unauthorized access, manipulation of AI models, and privacy issues affect these systems. Most of these vulnerabilities stem from the intricate integration of AI algorithms with IoT devices, thus being poorly secured in many of them. This paper investigates a few of the most common security risks found in AIoT systems: insecure data transmission, weak device authentication, and adversarial attacks against the AI model. It, thereby, opens possible solutions such as secure communication protocols, strengthening of AI model defences, and blockchain-based decentralized security. These challenges have to be challenged to ensure the implementation of AIoT with security in its sights both in healthcare and smart city applications as well as industrial automation sectors.

Keywords : AIoT Features, Blockchain, OAuth in Machine Learning.

References :

  1. Z. Xiong, Z. Cai, D. Takabi, and W. Li, “Privacy threat and defence for federated learning with non-i.i.d. data in AIoT,” IEEE Transactions on Industrial Informatics, p. 1, 2021.
  2. C.-J. Chen, Y.-Y. Huang, Y.-S. Li, C.-Y. Chang, and Y.-M. Huang, “An AIoT based smart agricultural system for pests’ detection,” IEEE Access, vol. 8, pp. 180750–180761, 2020.
  3. X. Zhang, M. Hu, J. Xia, T. Wei, M. Chen, and S. Hu, “Efficient federated learning for cloud-based AIoT applications,” IEEE Transactions on ComputerAided Design of Integrated Circuits and Systems, 2020.
  4. S. Russell and P. Norvig, Artificial Intelligence: A Modern Approach, Pearson, London, UK, 2021.
  5. K. F. Lee, AI Superpowers China, Silicon Valley, and the New World Order, Houghton Mifflin Harcourt, Boston, New York, USA, 2018.
  6. A. Barto and R. S. Sutton, Reinforcement Learning: An Introduction, The MIT Pres, Cambridge, Massachusetts US, London, UK, 2014.
  7. T. Poongodi, A. Rathee, R. Indra Kumari, and P. Suresh, “IoT sensing capabilities: sensor deployment and node discovery, wearable sensors, wireless body area network (WBAN), data acquisition,” in Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm. Intelligent Systems Reference Library, S. L. Peng, S. Pal, and L. Huang, Eds., vol. 174, pp. 127–151, Springer, Cham, 2020.
  8. K. L.-M. Ang and J. K. P. Seng, “Application Specific Internet of Things (ASIoTs): taxonomy, applications, use case and future directions,” IEEE Access, vol. 7, pp. 56577–56590, 2019.
  9. S. S. Seshadri, D. Rodriguez, M. Subedi et al., “IoT Cop: a blockchain-based monitoring framework for detection and isolation of malicious devices in Internet-of-Things systems,” IEEE Internet of Things Journal, vol. 80, no. 5, pp. 3346–3359, 2021.
  10. Y. Lu and L. D. Xu, “Internet of Things (IoT) cybersecurity research: a review of current research topics,” IEEE Internet of Things Journal, vol. 60, no. 2, pp. 2103–2115, 2019.
  11. M. Zichichi, S. Ferretti, and G. D’Angelo, “A framework based on distributed ledger technologies for data management and services in intelligent transportation systems,” IEEE Access, vol. 8, pp. 100384–100402, 2020.
  12. P. Dass, S. Misra, and C. Roy, “T-safe: trustworthy service provisioning for IoT-based intelligent transport systems,” IEEE Transactions on Vehicular Technology, vol. 690, no. 9, pp. 9509–9517, 2020.
  13. M. Frustaci, P. Pace, G. Aloi, and G. Fortino, “Evaluating critical security issues of the IoT world: present and future challenges,” IEEE Internet of Things Journal, vol. 50, no. 4, pp. 2483–2495, 2018.
  14. D. Jeong, “Artificial intelligence security threat, crime, and forensics: taxonomy and open issues,” IEEE Access, vol. 8, pp. 184560–184574, 2020.
  15. A. Alwarafy, K. A. Al-Thelaya, M. Abdallah, J. Schneider, and M. Hamdi, “A survey on security and privacy issues in edgecomputing- assisted Internet of Things,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4004–4022, 2021.
  16. L. Ye, Z. Wang, Y. Liu et al., “The challenges and emerging technologies for low-power artificial intelligence IoT systems,” IEEE Transactions on Circuits and Systems I: Regular Papers, pp. 1–14, 2021.
  17. Priyanka Arora1,*, Ritu Makani2 1Research Scholar, GJUST, Hisar, Haryana, India Email: [email protected] 2Associate Professor, GJUST, Hisar, 125001, Haryana, India.
  18. Simone Cirani *, Gianluigi Ferrari and Luca Veltri Department of Information Engineering, University of Parma, Parco Area delle Scienze 181/A, 43124, Parma, Italy.
  19. Brachmann, M.; Morchon, O.; Keoh, S.; Kumar, S. Security Considerations around End-to-End Security in the IP-Based Internet of Things. In Proceedings of the Workshop on Smart Object Security, in Conjunction with IETF83, Paris, France, 25–30 March 2012.
  20. Ramsdell, B.; Turner, S. RFC 3711-Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification, 2010. Available online: http://tools.ietf.org/rfc/rfc5751.txt (accessed on 31 January 2013).
  21. Baugher, M.; McGrew,D.; Naslund, M.; Carrara, E.; Norrman, K. RFC3711-TheSecureReal-time Transport Protocol (SRTP), 2004. Available online: http://tools.ietf.org/rfc/rfc3711.txt (accessed on 31 January 2013).
  22. Daemen, J.; Rijmen, V. The Design of Rijndael; Springer-Verlag New York, Inc.: Secaucus, NJ, USA, 2002.
  23. Eisenbarth, T.; Kumar, S.; Paar, C.; Poschmann, A.; Uhsadel, L. A survey of lightweight-cryptography implementations. IEEE Des. Test 2007, 24, 522–533.
  24. Rinne, S.; Eisenbarth, T.; Paar, C. Performance Analysis of Contemporary Light-Weight Block Ciphers  on 8-bit. Available online: http://www.emsec.rub.de/research/publications/performance analysis-contemporary-light-weight-blo/ (accessed on 1 April 2013).
  25. Wheeler, D.; Needham, R. TEA, a Tiny Encryption Algorithm; Springer-Verlag: New York, NY, USA, 1995; pp. 97–110.
  26. Needham, R.M.; Wheeler, D.J. TEA Extensions; Technical report; University of Cambridge, Cambridge, United Kingdom, 1997.
  27. Standaert, F.X.; Piret, G.; Gershenfeld, N.; Quisquater, J.J. SEA: A Scalable Encryption Algorithm for Small Embedded Applications. In Proceedings of the Smart Card Research and Applications, Proceedings of Cardis 2006, LNCS, Tarragona, Spain, 19–21 April 2006; Springer-Verlag: New York, NY, USA, 2006; pp. 222–236.
  28. Bogdanov, A.; Knudsen, L.R.; Le, G.; Paar, C.; Poschmann, A.; Robshaw, M.J.B.; Seurin, Y.; Vikkelsoe, C. PRESENT: An Ultra-Lightweight Block Cipher. In Proceedings of the CHES 2007, Vienna, Austria, 10–13 September 2007; Springer: Berlin/Heidelberg, Germany, 2007.
  29. ISO/IEC29192-2:2012. InformationTechnology–Security Techniques–Lightweight Cryptography Part 2: Block Ciphers; ISO: Geneva, Switzerland, 2012.
  30. Hong, D.; Sung, J.; Hong, S.; Lim, J.; Lee, S.; Koo, B.; Lee, C.; Chang, D.; Lee, J.; Jeong, K.; et al. HIGHT: A New Block Cipher Suitable for Low-Resource Device. In Proceedings of the Cryptographic Hardware and Embedded Systems-CHES 2006, 8th International Workshop, Yokohama, Japan, 10–13 October 2006; Springer: Berlin/Heidelberg, Germany, 2006; Volume 4249, Lecture Notes in Computer Science,

Integrating AI with IoT has formed the concept of AIoT systems that work to really increase automation, data analytics, and decision- making procedures. But fusion has also emerged with its challenges to new security issues for AIoT systems. Threats such as data breaches, unauthorized access, manipulation of AI models, and privacy issues affect these systems. Most of these vulnerabilities stem from the intricate integration of AI algorithms with IoT devices, thus being poorly secured in many of them. This paper investigates a few of the most common security risks found in AIoT systems: insecure data transmission, weak device authentication, and adversarial attacks against the AI model. It, thereby, opens possible solutions such as secure communication protocols, strengthening of AI model defences, and blockchain-based decentralized security. These challenges have to be challenged to ensure the implementation of AIoT with security in its sights both in healthcare and smart city applications as well as industrial automation sectors.

Keywords : AIoT Features, Blockchain, OAuth in Machine Learning.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe