Blockchain-Enhanced Multi-Factor Authentication for Securing IoT Children's Toys

Securing IoT Children's Toys

Authors

  • Ahmad Alkhatib alzaytoonah university of jordan
  • Layla Albdor Alzaytoonah University of Jordan
  • Seraj Fayyad Alzaytoonah University of Jordan
  • Hussain Ali Alzaytoonah University of Jordan

DOI:

https://doi.org/10.22399/ijcesen.417

Keywords:

: Internet of Things (IoT), children's toys, security, multi-factor authentication, QR codes, Blockchain

Abstract

The rapid expansion of Internet of Things (IoT) devices underscores the critical importance of robust security protocols, particularly in the realm of children's toys. This study introduces an innovative multi-factor authentication strategy integrating Quick Response (QR) codes with Blockchain technology to fortify the security of IoT toys designed for children. The primary objective is to safeguard young users against potential threats stemming from unauthorized access, thereby ensuring a secure interaction with IoT-enabled toys. By amalgamating authentication factors, including QR codes, the proposed approach establishes a multilayered security framework. Leveraging the inherent immutability and transparency of Blockchain, the system verifies the authenticity of IoT toys by scanning a unique QR code, thus mitigating risks associated with malwares and unauthorized access. The decentralization of Blockchain ensures no single point of failure, enhancing resilience against cyber threats. Extensive usability studies underscore the efficacy and practicality of the advanced multi-factor authentication solution, poised to elevate the safety standards of IoT toys in the digital age. This innovative approach not only bolsters security but also fosters trust among users, enabling seamless and worry-free interaction with IoT-enabled toys for children worldwide.

References

AbdelQader, A., Lafi, M., Awad, K., & AbedelQader, M. A. (2023). A Novel Approach to Elicit Software Requirements for IoT Systems Using SVM Classifier. In 2023 International Conference on Information Technology (ICIT) (pp. 779-782). Amman, Jordan. doi: 10.1109/ICIT58056.2023.10225969

Gibbs, S. (2015, November). Hackers can hijack wi-fi Hello Barbie to spy on your children. The Guardian. Retrieved from https://www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-barbie-to-spy-on-your-children

Federal Trade Commission. (1998). Children’s online privacy protection rule (“COPPA”). Retrieved from https://www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-protection-rule

Munro, K. (2015, January). Making children’s toys swear. Retrieved from https://www.pentestpartners.com/security-blog/making-childrens-toys-swear/

Cooper, D. (2017). Researchers find another smart toy that’s easy to hack. Engadget. Retrieved from https://www.engadget.com/2017/12/08/teksta-toucan-can-listen-to-kids-researchers-security/

Franceschi-Bicchierai, L. (2017). Internet of things teddy bear leaked 2 million parent and kids message recordings. Motherboard. Retrieved from https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings

Almadani, M.S., Alotaibi, S., Alsobhi, H., Hussain, O.K., & Hussain, F.K. (2023). Blockchain-based multi-factor authentication: A systematic literature review. Internet of Things, 23.

Federal Trade Commission. (2018). Electronic Toy Maker VTech Settles FTC Allegations that it Violated Children’s Privacy Law and the FTC Act.

CloudPets (2017). Gold [app download page]. Retrieved from https://itunes.apple.com/au/app/cloudpets-gold/id976429128?mt=8

EU & US (2016). consumer take action against flawed connected toys. BEUC NEWS. Brussels: The European Consumer Organisation.

WatchOut (2017).: Analysis of smartwatches for children. Oslo: Norwegian Consumer Council.

Walker, H. (2017). Terrified German parents urged to destroy doll ‘that can spy on children. Daily Express. London: Northern and Shell Media.

Wakefield, J. (2017). Germany bans children's smartwatches. BBC News. London: British Broadcasting Corporation.

Hunt, T. (2017). Data from Connected CloudPets Teddy Bears Leaked and Ransomed, Exposing Kid’s Voice Messages. Troy Hunt.

Identity Verification in a Post-Breach World. (2017). House Committee on Energy and Commerce. Washington: USA Government (testimony of Troy Hunt).

Knowles, B., Finney, J., Beck, S., et al. (2018). What children's imagined uses of the BBC micro: bit tells us about designing for their IoT privacy, security and safety. Living in the Internet of Things: Cybersecurity of the IoT. London.

Masoud, M., Jaradat, Y., Manasrah, A., & Jannoud, I. (2019). Sensors of smart devices in the Internet of Everything (IoE) era: Big opportunities and massive doubts. Journal of Sensors, 2019;6514520, 26 pages. https://doi.org/10.1155/2019/6514520

Egelman, S., Herrmann, M., Tripp, J., Haney, A., King, J., & Roesner, F. (2018). Security and privacy risks in internet of things toys. Proceedings of the ACM Conference on Computer and Communications Security, pp. 835–847.

Kao, M. K., Sun, X., & Han, C. (2019). Children's smart toys: An investigation of security and privacy risks. IEEE Pervasive Computing, 18(2), 34–41.

Hao, R. J., Chen, Y. H., & Chen, Y. T. (2020). IoT Toy Hack: Investigating the Security of IoT Toys for Children. In Proceedings of the 2020 IEEE International Conference on Internet of Things (IoT) (pp. 1-5).

Al Hwaitat, A.K.; Almaiah, M.A.; Ali, A.; Al-Otaibi, S.; Shishakly, R.; Lutfi, A.; Alrawad, M. A New Blockchain-Based Authentication Framework for Secure IoT Networks. Electronics, 12(3618).

Li, D., Peng, W., Deng, W., & Gai, F. (2018). A Blockchain-Based Authentication and Security Mechanism for IoT. In 2018 27th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-6). Hangzhou, China: IEEE. DOI: 10.1109/ICCCN.2018.8487449.

Kotel, S., Sbiaa, F., Kamoun, R. M., & Hamel, L. (2023). A Blockchain-based approach for secure IoT. Procedia Computer Science, 225.

Eddy, A., Guillan, B. Z. A., Elias, E. K., Aniell, E., Simon, S. B., & Faisal, M. (2024). Blockchain-enhanced multi-factor authentication for securing IIoT. International Journal of Electrical Engineering, Mathematics and Computer Science, 1(3), 1-24. doi:10.62951/ijeemcs.v1i3.16

M. Alanazi and M. Aborokbah, "Multifactor Authentication Approach on Internet of Things: Children's Toys," 2022 2nd International Conference on Computing and Information Technology (ICCIT), Tabuk, Saudi Arabia, 2022, pp. 6-9

Kaspersky, 2024. Smart toy vulnerabilities could let cybercriminals video chat with kids. [online] Available at: https://usa.kaspersky.com/about/press-releases/smart-toy-vulnerabilities-could-let-cybercriminals-video-chat-with-kids?srsltid=AfmBOoraBnsV3cSt7dnM09aAIXUTi17IV-_7eQuQO1doARq0i7PQ2J3a [Accessed 31 October 2024].

P., V., & A., M. R. (2024). A Scalable, Secure, and Efficient Framework for Sharing Electronic Health Records Using Permissioned Blockchain Technology. International Journal of Computational and Experimental Science and Engineering, 10(4);827-834. https://doi.org/10.22399/ijcesen.535

Prasada, P., & Prasad, D. S. (2024). Blockchain-Enhanced Machine Learning for Robust Detection of APT Injection Attacks in the Cyber-Physical Systems. International Journal of Computational and Experimental Science and Engineering, 10(4);799-810. https://doi.org/10.22399/ijcesen.539

M, P., B, J., B, B., G, S., & S, P. (2024). Energy-efficient and location-aware IoT and WSN-based precision agricultural frameworks. International Journal of Computational and Experimental Science and Engineering, 10(4);585-591. https://doi.org/10.22399/ijcesen.480

S, P. S., N. R., W. B., R, R. K., & S, K. (2024). Performance Evaluation of Predicting IoT Malicious Nodes Using Machine Learning Classification Algorithms. International Journal of Computational and Experimental Science and Engineering, 10(3);341-349. https://doi.org/10.22399/ijcesen.395

S, P., & A, P. (2024). Secured Fog-Body-Torrent : A Hybrid Symmetric Cryptography with Multi-layer Feed Forward Networks Tuned Chaotic Maps for Physiological Data Transmission in Fog-BAN Environment. International Journal of Computational and Experimental Science and Engineering, 10(4);671-681. https://doi.org/10.22399/ijcesen.490

Downloads

Published

2024-11-19

How to Cite

Alkhatib, A., Albdor , L., Fayyad, S., & Ali, H. (2024). Blockchain-Enhanced Multi-Factor Authentication for Securing IoT Children’s Toys: Securing IoT Children’s Toys. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.417

Issue

Section

Research Article