{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T10:04:14Z","timestamp":1772013854097,"version":"3.50.1"},"reference-count":28,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T00:00:00Z","timestamp":1771545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The integration of wearable inertial measurement units (IMU) in animal welfare Internet of Things (IoT) systems has become crucial for monitoring animal behaviors and enhancing welfare management. However, the vulnerability of IoT devices to network and hardware attacks poses significant risks, potentially compromising data integrity and misleading caregivers, negatively impacting animal welfare. Additionally, current animal monitoring solutions often rely on intrusive tagging methods, such as Radio Frequency Identification (RFID) or ear tagging, which may cause unnecessary stress and discomfort to animals. In this study, we propose a lightweight integrity and provenance-oriented security stack that complements standard transport security, specifically tailored to IMU-based animal motion IoT systems. Our system utilizes a 1D-convolutional neural network (CNN) model, achieving 88% accuracy for precise motion recognition, alongside a lightweight behavioral fingerprinting CNN model attaining 83% accuracy, serving as an auxiliary consistency signal to support collar\u2013animal association and reduce mis-attribution risks. We introduce a dynamically generated pre-shared key (PSK) mechanism based on SHA-256 hashes derived from motion features and timestamps, further securing communication channels via application-layer Hash-based Message Authentication Code (HMAC) combined with Message Queuing Telemetry Transport (MQTT)\/Transport Layer Security (TLS) protocols. In our design, MQTT\/TLS provides primary device authentication and channel protection, while behavioral fingerprinting and per-window dynamic\u2013HMAC provide auxiliary provenance cues and tamper-evident integrity at the application layer. Experimental validation is conducted primarily via offline, dataset-driven experiments on a public canine IMU dataset; system-level overhead and sensor-to-edge latency are measured on a Raspberry Pi-based testbed by replaying windows through the MQTT\/TLS pipeline. Overall, this work integrates motion recognition, behavioral fingerprinting, and dynamic key management into a cohesive, lightweight telemetry integrity\/provenance stack and provides a foundation for future extensions to multi-species adaptive scenarios and federated learning applications.<\/jats:p>","DOI":"10.3390\/fi18020111","type":"journal-article","created":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T10:32:37Z","timestamp":1771583557000},"page":"111","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Authentication and Dynamic Key Generation for IMU-Based Canine Motion Recognition IoT Systems"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8754-6979","authenticated-orcid":false,"given":"Guanyu","family":"Chen","sequence":"first","affiliation":[{"name":"Graduate School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate 041-8655, Hokkaido, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6854-4448","authenticated-orcid":false,"given":"Hiroki","family":"Watanabe","sequence":"additional","affiliation":[{"name":"Graduate School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate 041-8655, Hokkaido, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6397-7255","authenticated-orcid":false,"given":"Kohei","family":"Matsumura","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Ritsumeikan University, 2-150 Iwakura-cho, Osaka 567-8570, Ibaraki, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1947-0021","authenticated-orcid":false,"given":"Yoshinari","family":"Takegawa","sequence":"additional","affiliation":[{"name":"Graduate School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate 041-8655, Hokkaido, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2026,2,20]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Dritsas, E., and Trigka, M. (2025). A Survey on Cybersecurity in IoT. Future Internet, 17.","DOI":"10.3390\/fi17010030"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/TSMC.2020.3042898","article-title":"Internet of Things as System of Systems: A Review of Methodologies, Frameworks, Platforms, and Tools","volume":"51","author":"Fortino","year":"2021","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/3546933","article-title":"The Challenges of IoT, TLS, and Random Number Generators in the Real World: Bad random numbers are still with us and are proliferating in modern systems","volume":"20","author":"Hughes","year":"2022","journal-title":"Queue"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Ito, H. (2020). Edge-AI Based Cattle Behavior Estimation System for Grazing. 2020 International Symposium on VLSI Design, Automation and Test (VLSI-DAT), IEEE.","DOI":"10.1109\/VLSI-DAT49148.2020.9196303"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Sarfraz, M. (2022). Behavioral Biometrics: Past, Present and Future. Recent Advances in Biometrics, IntechOpen. Chapter 4.","DOI":"10.5772\/intechopen.97986"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2467","DOI":"10.1109\/TIFS.2017.2708690","article-title":"Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables","volume":"12","author":"Revadigar","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Dinculean\u0103, D., and Cheng, X. (2019). Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices. Appl. Sci., 9.","DOI":"10.3390\/app9050848"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Shin, M., Hwang, S., and Kim, B. (2025). AI-Based Smart Monitoring Framework for Livestock Farms. Appl. Sci., 15.","DOI":"10.3390\/app15105638"},{"key":"ref_9","first-page":"102238","article-title":"Animal Re-Identification Using Cross-View Metric Learning for Wildlife Monitoring","volume":"77","author":"Ahmed","year":"2023","journal-title":"Ecol. Inform."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"103184","DOI":"10.1016\/j.cose.2023.103184","article-title":"Stationary Mobile Behavioral Biometrics: A Survey","volume":"128","author":"Hou","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Mekruksavanich, S., and Jitpattanakul, A. (2024). Wearable Sensor-Based Behavioral User Authentication Using a Hybrid Deep Learning Approach with Squeeze-and-Excitation Mechanism. Computers, 13.","DOI":"10.3390\/computers13120337"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Tan, A., Dong, C., Wang, Y., Wang, C., and Xia, C. (2024). Intelligent and Secure Cloud\u2013Edge Collaborative Industrial Information Encryption Strategy Based on Credibility Assessment. Appl. Sci., 14.","DOI":"10.3390\/app14198812"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Zhu, W., Zhou, C., and Jiang, L. (2024). A Trusted Internet of Things Access Scheme for Cloud Edge Collaboration. Electronics, 13.","DOI":"10.3390\/electronics13061026"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"DeMedeiros, K., Hendawi, A., and Alvarez, M. (2023). A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks. Sensors, 23.","DOI":"10.3390\/s23031352"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"100379","DOI":"10.1016\/j.cosrev.2021.100379","article-title":"A survey on deep learning and its applications","volume":"40","author":"Dong","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Deshmukh, A., and Ravulakollu, K. (2024). An Efficient CNN-Based Intrusion Detection System for IoT: Use Case Towards Cybersecurity. Technologies, 12.","DOI":"10.3390\/technologies12100203"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"9684","DOI":"10.1038\/s41598-025-94500-5","article-title":"A high performance hybrid LSTM CNN secure architecture for IoT environments using deep learning","volume":"15","author":"Sinha","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2510","DOI":"10.1109\/COMST.2024.3372630","article-title":"Securing the IoT Application Layer From an MQTT Protocol Perspective: Challenges and Research Prospects","volume":"26","author":"Lakshminarayana","year":"2024","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Marcato, M., Tedesco, S., O\u2019Mahony, C., O\u2019Flynn, B., and Galvin, P. (2023). Machine learning based canine posture estimation using inertial data. PLoS ONE, 18.","DOI":"10.1371\/journal.pone.0286311"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Goodall, W., Wallace, F., and Jackson, M. (2024). KitBit: An Instrumented Collar for Indoor Pets. ACI \u201923: Proceedings of the Tenth International Conference on Animal-Computer Interaction, Raleigh, NC, USA, ACM.","DOI":"10.1145\/3637882.3637894"},{"key":"ref_21","unstructured":"Hammerla, N.Y., Halloran, S., and Pl\u00f6tz, T. (2016). Deep, convolutional, and recurrent models for human activity recognition using wearables. IJCAI\u201916: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, AAAI Press. Available online: https:\/\/dl.acm.org\/doi\/10.5555\/3060832.3060835."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/TPAMI.2018.2858826","article-title":"Focal Loss for Dense Object Detection","volume":"42","author":"Lin","year":"2020","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"107625","DOI":"10.1016\/j.future.2024.107625","article-title":"DLST-MQTT: Dynamic and Lightweight Security over Topics MQTT","volume":"166","author":"Rango","year":"2025","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"McKay, K.A., Cooper, D.A., Barker, E., and Smid, M. (2019). Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations, NIST. NIST Special Publication SP 800-52 Rev. 2.","DOI":"10.6028\/NIST.SP.800-52r2"},{"key":"ref_25","unstructured":"Frankel, S., and Kelly, S.G. (2007). Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec, Internet Engineering Task Force (IETF). RFC 4868."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Cover, T.M. (2005). Elements of Information Theory, John Wiley & Sons. [2nd ed.].","DOI":"10.1002\/047174882X"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Turan, M.S., Barker, E., Kelsey, J., McKay, K., Baish, M., and Boyle, M. (2018). Recommendation for the Entropy Sources Used for Random Bit Generation, National Institute of Standards and Technology. Special Publication (NIST SP) 800-90B 800-90B.","DOI":"10.6028\/NIST.SP.800-90B"},{"key":"ref_28","unstructured":"Kamminga, J. (2018). Multi Sensor-Orientation Movement Data of Goats, DATA Archiving and Networked Services (DANS). Version V1."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/2\/111\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T09:09:08Z","timestamp":1772010548000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/2\/111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,20]]},"references-count":28,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["fi18020111"],"URL":"https:\/\/doi.org\/10.3390\/fi18020111","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,20]]}}}