Proximity-Aware Security for IoT Devices Using One-Time URLs

Article Sidebar

Main Article Content

Vikas Sharma
Mohd Muzzammil
Manoj Kumar
Sharad Kumar
Sachin Kumar
Jagdeep Singh

Abstract—The rapid proliferation of Internet of Things (IoT) devices has raised significant security and privacy challenges, particularly in scenarios where mobile devices interact with IoT endpoints. Traditional authentication mechanisms often lack context-awareness and can be vulnerable to replay attacks, eavesdropping, and unauthorized access. This paper proposes a proximity-aware security mechanism that leverages one-time URLs (OT-URLs) to authenticate mobile devices with IoT devices in a secure and efficient manner. The proposed framework generates unique, time-bound URLs that are valid only within a specified proximity, ensuring that authentication is performed only by devices physically near the IoT endpoint. By combining proximity detection with one-time URL authentication, the system mitigates the risks of remote attacks while maintaining user convenience and scalability. Experimental evaluation demonstrates that the proposed approach achieves high security assurance with minimal computational overhead, making it suitable for resource-constrained IoT environments. This method can be effectively applied to smart homes, industrial IoT, and other mobile-IoT interaction scenarios.

Proximity-Aware Security for IoT Devices Using One-Time URLs. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(10), 502-508. https://doi.org/10.51583/IJLTEMAS.2025.1410000063

Downloads

References

S. Priya, M. M. Sithik, A. Mohamed Anwar, S. P. Santhoshkumar, M. Uveise S A and P. Arora, "Adaptive Service Dependent Proximity Analysis Based Intrusion Detection in Cloud Environment," 2025 Global Conference in Emerging Technology (GINOTECH), PUNE, India, 2025, pp. 1-5, doi: 10.1109/GINOTECH63460.2025.11076953.

M. Kobayashi, H. Miyaji and H. Yamamoto, "Proximity Verification Function of Real World Data Sources Based on Similarity Analysis on Environmental Information," 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC), Osaka, Japan, 2024, pp. 1452-1455, doi: 10.1109/COMPSAC61105.2024.00193.

K. K. Sachan and A. Natarajan, "Proximity Detection Based Low-Cost and Handheld IoT Device for Tracking Lost Objects," 2024 IEEE International Symposium on Smart Electronic Systems (iSES), New Delhi, India, 2024, pp. 40-43, doi: 10.1109/iSES63344.2024.00019.

F. Chahal, H. Fouchal and D. Gaïti, "Proximity Marketing: A Diverse Classification Approach," 2024 International Wireless Communications and Mobile Computing (IWCMC), Ayia Napa, Cyprus, 2024, pp. 879-884, doi: 10.1109/IWCMC61514.2024.10592562.

C. Lai, Z. Liu and D. Zheng, "Privacy-Preserving Proximity Tracing System for Large-Scale Public Health Events," 2024 IEEE/CIC International Conference on Communications in China (ICCC), Hangzhou, China, 2024, pp. 114-119, doi: 10.1109/ICCC62479.2024.10681684.

B. Kumar and K. S. Gill, "Silent Protection: The Future of Home Safety with IoT in Light-Free Spaces," 2024 4th International Conference on Advancement in Electronics & Communication Engineering (AECE), GHAZIABAD, India, 2024, pp. 1204-1206, doi: 10.1109/AECE62803.2024.10911636.

K. Izrailov and I. Kotenko, "Investigating the Proximity Metric of Program Assembler Code for Genetic Reverse Engineering," 2025 33rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), Turin, Italy, 2025, pp. 600-607, doi: 10.1109/PDP66500.2025.00090.

M. R. Rownak, X. Diao and C. Smidts, "Human Reliability Under Physical Security Threats: Modeling and Experimental Design," 2024 Annual Reliability and Maintainability Symposium (RAMS), Albuquerque, NM, USA, 2024, pp. 1-6, doi: 10.1109/RAMS51492.2024.10457692.

B. S. Liya, C. Rohith, M. Jubbair Ahmad and B. Khishore, "Missing Persons Comprehensive Tracking System with Multi-Area CCTV Integration and Proximity-Based Police Station Mapping," 2024 2nd International Conference on Computer, Communication and Control (IC4), Indore, India, 2024, pp. 1-5, doi: 10.1109/IC457434.2024.10486474.

C. Constantinescu et al., "Analyzing Antenna Proximity Influence on the Human Body from an Educational Perspective," 2025 34th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE), Cluj-Napoca, Romania, 2025, pp. 1-4, doi: 10.1109/EAEEIE65428.2025.11136279.

D. Borodin and D. Skudnev, "Disadvantages of Using the Heuristic Function of Proximity of the Execution Path to the Reference," 2024 6th International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA), Lipetsk, Russian Federation, 2024, pp. 64-67, doi: 10.1109/SUMMA64428.2024.10803867.

S. Gupta, R. K. Saxena, R. Vijay, A. K. Sharma, A. Kumar and D. P. Gupta, "Privacy Models on Location Hiding and Security Observations in Local Area WSN," 2025 4th OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 5.0, Raigarh, India, 2025, pp. 1-5, doi: 10.1109/OTCON65728.2025.11070960.

Article Details

How to Cite

Proximity-Aware Security for IoT Devices Using One-Time URLs. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(10), 502-508. https://doi.org/10.51583/IJLTEMAS.2025.1410000063