Journal articles on the topic 'IoT, Security IoT, IoT Protocol, 5G'

To see the other types of publications on this topic, follow the link: IoT, Security IoT, IoT Protocol, 5G.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IoT, Security IoT, IoT Protocol, 5G.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (June 28, 2020): 3625. http://dx.doi.org/10.3390/s20133625.

Full text
Abstract:
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond.
APA, Harvard, Vancouver, ISO, and other styles
2

Sanchez-Gomez, Jesus, Dan Garcia-Carrillo, Rafael Marin-Perez, and Antonio Skarmeta. "Secure Authentication and Credential Establishment in Narrowband IoT and 5G." Sensors 20, no. 3 (February 7, 2020): 882. http://dx.doi.org/10.3390/s20030882.

Full text
Abstract:
Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, this paper presents the adaptation of bootstrapping protocols to be compliant with the 3GPP specifications in order to enable the 5G feature of secondary authentication for constrained IoT devices. To allow the secondary authentication and key establishment in NB-IoT and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO-CoAP-EAP. In fact, this approach presents the evaluation of both aforementioned EAP lower layers, showing the contrast between a current EAP lower layer standard, i.e., PANA, and one specifically designed with the constraints of IoT, thus providing high flexibility and scalability in the bootstrapping process in 5G networks. The proposed solution is evaluated to prove its efficiency and feasibility, being one of the first efforts to support secure service authentication and key establishment for constrained IoT devices in 5G environments.
APA, Harvard, Vancouver, ISO, and other styles
3

Park, Kisung, and Youngho Park. "On the Security of a Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks." Applied Sciences 12, no. 9 (April 23, 2022): 4265. http://dx.doi.org/10.3390/app12094265.

Full text
Abstract:
The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing and monitoring various types of data. These 5G based IoT environments collect various data in real-time using micro-sensors as IoT things devices and sends the collected data to a server for further processing. In this scenario, a secure authentication and key agreement scheme is needed to ensure privacy when exchanging data between IoT nodes and the server. Recently, Cao et al. in “LSAA: A lightweight and secure access authentication scheme for both UE and mMTC devices in 5G networks” presented a new authentication scheme to protect user privacy. They contend that their scheme not only prevents various protocol attacks, but also achieves mutual authentication, session key security, unlinkability, and perfect forward/backward secrecy. This paper demonstrates critical security weaknesses of their scheme using informal and formal (mathemati) analysis: it does not prevent a single point of failure and impersonation attacks. Further, their proposed scheme does not achieve mutual authentication and correctness of security assumptions, and we perform simulation analysis using a formal verification tool to its security flaws. To ensure attack resilience, we put forward some solutions that can assist constructing more secure and efficient access authentication scheme for 5G networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Pan, Shin-Hung, and Shu-Ching Wang. "Optimal Consensus with Dual Abnormality Mode of Cellular IoT Based on Edge Computing." Sensors 21, no. 2 (January 19, 2021): 671. http://dx.doi.org/10.3390/s21020671.

Full text
Abstract:
The continuous development of fifth-generation (5G) networks is the main driving force for the growth of Internet of Things (IoT) applications. It is expected that the 5G network will greatly expand the applications of the IoT, thereby promoting the operation of cellular networks, the security and network challenges of the IoT, and pushing the future of the Internet to the edge. Because the IoT can make anything in anyplace be connected together at any time, it can provide ubiquitous services. With the establishment and use of 5G wireless networks, the cellular IoT (CIoT) will be developed and applied. In order to provide more reliable CIoT applications, a reliable network topology is very important. Reaching a consensus is one of the most important issues in providing a highly reliable CIoT design. Therefore, it is necessary to reach a consensus so that even if some components in the system is abnormal, the application in the system can still execute correctly in CIoT. In this study, a protocol of consensus is discussed in CIoT with dual abnormality mode that combines dormant abnormality and malicious abnormality. The protocol proposed in this research not only allows all normal components in CIoT to reach a consensus with the minimum times of data exchange, but also allows the maximum number of dormant and malicious abnormal components in CIoT. In the meantime, the protocol can make all normal components in CIoT satisfy the constraints of reaching consensus: Termination, Agreement, and Integrity.
APA, Harvard, Vancouver, ISO, and other styles
5

Brooks, Tyson. "Authenticating Devices in Fog-mobile Edge Computing Environments through a Wireless Grid Resource Sharing Protocol." International Journal of UbiComp 13, no. 2 (April 30, 2022): 1–17. http://dx.doi.org/10.5121/iju.2022.13201.

Full text
Abstract:
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing and wireless grids has resulted in the widespread deployment of relatively immature technology. These technologies, which will primarily use 5G wireless communication networks, are becoming popular because they can be deployed quickly with little infrastructure and lends themselves to environments utilizing numerous internet connected devices (ICD). There are, however, many significant challenges faced by security designers, engineers and implementers of these networks in ensuring that the level of security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected by a robust security architecture due to these technologies being plagued with security problems. The authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new information system platforms. This article identifies an authentication process required for these ICDs, which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud network through a wireless grid authentication process. The purpose of this article is to begin to hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and mobile edge computing clouds to create this new IoT architecture. An authentication process developed from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors depending on their capability to handle five primary functions: management of identification [ID] and presence, permissions management, data transferability, application-programming interface [API] and security.
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Sunita, Meenakshi Nawal, Neha Janu, and Dinesh Goyal. "IoT, Enabling Technologies, and Sensor Node Deployment Pattern in WSN." ECS Transactions 107, no. 1 (April 24, 2022): 7441–55. http://dx.doi.org/10.1149/10701.7441ecst.

Full text
Abstract:
In Internet of Things (IoT), various computing devices and mechanical and digital machines are interconnected. These devices have unique identifiers (UIDs) and transmit the information on the network with no human interaction. Sensors are the integrated part in IoT as these are used to collect the data. The IoT technologies have a lot of issues like addressing problems, scalability problems, security, and standardization issues that required to be solved. In this paper, the authors facilitate the reader to have necessary understanding of IoT, importance on protocols, technologies, application related issues, various types of sensors used in IoT, new generation of alternative sensors for IoT, and the issues which needs to resolved for the future. A depth overview of 5G IoT systems is also given. The five layers in 5G IoT systems and empowering technologies associated with it are discussed. A comparative analysis of QC-PC-MCSC for strip based deployment pattern and for random deployment is given. This paper provides a support to academician about the working of diverse protocols, relation between IoT and other emergent technologies together with big data and cloud, energy efficiency based on sensor node deployment pattern, etc.
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Tsuyang, Xinglan Guo, Yehcheng Chen, Saru Kumari, and Chienming Chen. "Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks." Drones 6, no. 1 (December 31, 2021): 10. http://dx.doi.org/10.3390/drones6010010.

Full text
Abstract:
At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.
APA, Harvard, Vancouver, ISO, and other styles
8

Khalid, Madiha, Umar Mujahid, and Najam-ul-Islam Muhammad. "Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags." Security and Communication Networks 2019 (July 21, 2019): 1–25. http://dx.doi.org/10.1155/2019/3295616.

Full text
Abstract:
The field of pervasive computing especially the Internet of Things (IoT) network is evolving due to high network speed and increased capacity offered by the 5G communication system. The IoT network identifies each device before giving it access to the network. The RFID system is one of the most prominent enabling technologies for the node identification. Since the communication between the node and the network takes place over an insecure wireless channel, an authentication mechanism is required to avoid the malicious devices from entering the network. This paper presents a brief survey on the authentication protocols along with the prominent cryptanalysis models for the EPC C1G2 RFID systems. A comparative analysis is provided to highlight the common weaknesses of the existing authentication algorithms and to emphasize on the lack of security standardization for the resource constraint IoT network perception layer. This paper is concluded by proposing an ultralightweight protocol that provides Extremely Good Privacy (EGP). The proposed EGP protocol avoids all the pitfalls highlighted by the cryptanalysis of the existing authentication protocols. The incorporation of the novel ultralightweight primitives, Per-XOR (Px) and Inverse Per-XOR (Px-1), makes the protocol messages more robust and irreversible for all types of adversaries. A comprehensive security analysis illustrates that the proposed protocol proves to be highly resistive against all possible attack scenarios and ensures the security optimally.
APA, Harvard, Vancouver, ISO, and other styles
9

Mathas, Christos-Minas, Costas Vassilakis, Nicholas Kolokotronis, Charilaos C. Zarakovitis, and Michail-Alexandros Kourtis. "On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids." Energies 14, no. 10 (May 14, 2021): 2818. http://dx.doi.org/10.3390/en14102818.

Full text
Abstract:
The 5G communication network will underpin a vast number of new and emerging services, paving the way for unprecedented performance and capabilities in mobile networks. In this setting, the Internet of Things (IoT) will proliferate, and IoT devices will be included in many 5G application contexts, including the Smart Grid. Even though 5G technology has been designed by taking security into account, design provisions may be undermined by software-rooted vulnerabilities in IoT devices that allow threat actors to compromise the devices, demote confidentiality, integrity and availability, and even pose risks for the operation of the power grid critical infrastructures. In this paper, we assess the current state of the vulnerabilities in IoT software utilized in smart grid applications from a source code point of view. To that end, we identified and analyzed open-source software that is used in the power grid and the IoT domain that varies in characteristics and functionality, ranging from operating systems to communication protocols, allowing us to obtain a more complete view of the vulnerability landscape. The results of this study can be used in the domain of software development, to enhance the security of produced software, as well as in the domain of automated software testing, targeting improvements to vulnerability detection mechanisms, especially with a focus on the reduction of false positives.
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Chien-Ming, Zhen Li, Shehzad Ashraf Chaudhry, and Long Li. "Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks." Security and Communication Networks 2021 (October 21, 2021): 1–12. http://dx.doi.org/10.1155/2021/3116593.

Full text
Abstract:
As an extension of the 4G system, 5G is a new generation of broadband mobile communication with high speed, low latency, and large connection characteristics. It solves the problem of human-to-thing and thing-to-thing communication to meet the needs of intelligent medical devices, automotive networking, smart homes, industrial control, environmental monitoring, and other IoT application needs. This has resulted in new research topics related to wireless body area networks. However, such networks are still subject to significant security and privacy threats. Recently, Fotouhi et al. proposed a lightweight and secure two-factor authentication protocol for wireless body area networks in medical IoT. However, in this study, we demonstrate that their proposed protocol is still vulnerable to sensor-capture attacks and the lack of authentication between users and mobile devices. In addition, we propose a new protocol to overcome the limitations mentioned above. A detailed comparison shows that our proposed protocol is better than the previous protocols in terms of security and performance.
APA, Harvard, Vancouver, ISO, and other styles
11

Behmanesh, Ali, Nasrin Sayfouri, and Farahnaz Sadoughi. "Technological Features of Internet of Things in Medicine: A Systematic Mapping Study." Wireless Communications and Mobile Computing 2020 (July 27, 2020): 1–27. http://dx.doi.org/10.1155/2020/9238614.

Full text
Abstract:
Nowadays, applications for the Internet of Things (IoT) have been introduced in different fields of medicine to provide more efficient medical services to the patients. A systematic mapping study was conducted to answer ten research questions with the purposes of identifying and classifying the present medical IoT technological features as well as recognizing the opportunities for future developments. We reviewed how cloud, wearable technologies, wireless communication technologies, messaging protocols, security methods, development boards, microcontrollers, mobile/IoT operating systems, and programming languages have been engaged in medical IoT. Based on specific inclusion/exclusion criteria, 89 papers, published between 2000 and 2018, were screened and selected. It was found that IoT studies, with a publication rise between 2015 and 2018, predominantly dealt with the following IoT features: (a) wearable sensor types of chiefly accelerometer and ECG placed on 16 different body parts, especially the wrist (33%) and the chest (21%) or implanted on the bone; (b) wireless communication technologies of Bluetooth, cellular networks, and Wi-Fi; (c) messaging protocols of mostly MQTT; (d) utilizing cloud for both storing and analyzing data; (e) the security methods of encryption, authentication, watermark, and error control; (f) the microcontrollers belonging to Atmel ATmega and ARM Cortex-M3 families; (g) Android as the commonly used mobile operating system and TinyOS and ContikiOS as the commonly used IoT operating systems; (h) Arduino and Raspberry Pi development boards; and finally (i) MATLAB as the most frequently employed programming language in validation research. The identified gaps/opportunities for future exploration are, namely, employment of fog/edge computing in storage and processing big data, the overlooked efficient features of CoAP messaging protocol, the unnoticed advantages of AVR Xmega and Cortex-M microcontroller families, employment of the programming languages of Python for its significant capabilities in evaluation and validation research, development of the applications being supported by the mobile/IoT operating systems in order to provide connection possibility among all IoT devices in medicine, exploiting wireless communication technologies such as BLE, ZigBee, 6LoWPAN, NFC, and 5G to reduce power consumption and costs, and finally uncovering the security methods, usually used in IoT applications, in order to make other applications more trustworthy.
APA, Harvard, Vancouver, ISO, and other styles
12

Candal-Ventureira, David, Pablo Fondo-Ferreiro, Felipe Gil-Castiñeira, and Francisco Javier González-Castaño. "Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks." Sensors 20, no. 18 (September 5, 2020): 5054. http://dx.doi.org/10.3390/s20185054.

Full text
Abstract:
The unstoppable adoption of the Internet of Things (IoT) is driven by the deployment of new services that require continuous capture of information from huge populations of sensors, or actuating over a myriad of “smart” objects. Accordingly, next generation networks are being designed to support such massive numbers of devices and connections. For example, the 3rd Generation Partnership Project (3GPP) is designing the different 5G releases specifically with IoT in mind. Nevertheless, from a security perspective this scenario is a potential nightmare: the attack surface becomes wider and many IoT nodes do not have enough resources to support advanced security protocols. In fact, security is rarely a priority in their design. Thus, including network-level mechanisms for preventing attacks from malware-infected IoT devices is mandatory to avert further damage. In this paper, we propose a novel Software-Defined Networking (SDN)-based architecture to identify suspicious nodes in 4G or 5G networks and redirect their traffic to a secondary network slice where traffic is analyzed in depth before allowing it reaching its destination. The architecture can be easily integrated in any existing deployment due to its interoperability. By following this approach, we can detect potential threats at an early stage and limit the damage by Distributed Denial of Service (DDoS) attacks originated in IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
13

Fan, Kai, Panfei Song, and Yintang Yang. "ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G." Mobile Information Systems 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/2349149.

Full text
Abstract:
As one of the core techniques in 5G, the Internet of Things (IoT) is increasingly attracting people’s attention. Meanwhile, as an important part of IoT, the Near Field Communication (NFC) is widely used on mobile devices and makes it possible to take advantage of NFC system to complete mobile payment and merchandise information reading. But with the development of NFC, its problems are increasingly exposed, especially the security and privacy of authentication. Many NFC authentication protocols have been proposed for that, some of them only improve the function and performance without considering the security and privacy, and most of the protocols are heavyweight. In order to overcome these problems, this paper proposes an ultralightweight mutual authentication protocol, named ULMAP. ULMAP only uses Bit and XOR operations to complete the mutual authentication and prevent the denial of service (DoS) attack. In addition, it uses subkey and subindex number into its key update process to achieve the forward security. The most important thing is that the computation and storage overhead of ULMAP are few. Compared with some traditional schemes, our scheme is lightweight, economical, practical, and easy to protect against synchronization attack.
APA, Harvard, Vancouver, ISO, and other styles
14

Song, Haoxiang, Zhe Tu, and Yajuan Qin. "Blockchain-Based Access Control and Behavior Regulation System for IoT." Sensors 22, no. 21 (October 30, 2022): 8339. http://dx.doi.org/10.3390/s22218339.

Full text
Abstract:
With the development of 5G and the Internet of things (IoT), the multi-domain access of massive devices brings serious data security and privacy issues. At the same time, most access systems lack the ability to identify network attacks and cannot adopt dynamic and timely defenses against various security threats. To this end, we propose a blockchain-based access control and behavior regulation system for IoT. Relying on the attribute-based access control model, this system deploys smart contracts on the blockchain to achieve distributed and fine-grained access control and ensures that the identity and authority of access users can be trusted. At the same time, an inter-domain communication mechanism is designed based on the locator/identifier separation protocol and ensures the traffic of access users are authorized. A feedback module that combines traffic detection and credit evaluation is proposed, ensuring real-time detection and fast, proactive responses against malicious behavior. Ultimately, all modules are linked together through workflows to form an integrated security model. Experiments and analysis show that the system can effectively provide comprehensive security protection in IoT scenarios.
APA, Harvard, Vancouver, ISO, and other styles
15

Gupta, Divya, Shalli Rani, Aman Singh, and Juan Luis Vidal Mazon. "Towards Security Mechanism in D2D Wireless Communication: A 5G Network Approach." Wireless Communications and Mobile Computing 2022 (July 22, 2022): 1–9. http://dx.doi.org/10.1155/2022/6983655.

Full text
Abstract:
Device-to-device (D2D) communication has attracted many researchers, cellular operators, and equipment makers as mobile traffic and bandwidth demands have increased. It supports direct communication within devices with no need for any intermediate node and, therefore, offers advantage in 5G network while providing wide cell coverage range and frequency reuse. However, establishing acceptable and secure mechanism for D2D communication which ensures confidentiality, integrity, and availability is an issue encountered in this situation. Furthermore, in a resource-constrained IoT environment, these security challenges are more critical and difficult to mitigate, especially during emergence of IoT with 5G network application scenarios. To address these issues, this paper proposed a security mechanism in 5G network for D2D wireless communication dependent on lightweight modified elliptic curve cryptography (LMECC). The proposed scheme follows a proactive routing protocol to discover services, managing link setup, and for data transfer with the aim to reduce communication overhead during user authentication. The proposed approach has been compared against Diffie–Hellman (DH) and ElGamal (ELG) schemes to evaluate the protocol overhead and security enhancement at network edge. Results proved the outstanding performance of the proposed LMECC for strengthening data secrecy with approximate 13% and 22.5% lower overhead than DH and ELG schemes.
APA, Harvard, Vancouver, ISO, and other styles
16

Islam, Naveed, Khalid Haseeb, Muhammad Ali, and Gwanggil Jeon. "Secured Protocol with Collaborative IoT-Enabled Sustainable Communication Using Artificial Intelligence Technique." Sustainability 14, no. 14 (July 21, 2022): 8919. http://dx.doi.org/10.3390/su14148919.

Full text
Abstract:
In recent years, 5G and the Internet of Things (IoT) have been integrated into a variety of applications to support sustainable communication systems. In the presence of intermediate hardware, IoT devices collect the network data and transfer them to cloud technologies. The interconnect machines provide essential information to the connected devices over the Internet. Many solutions have been proposed to address the dynamic and unexpected characteristics of IoT-based networks and to support smart developments. However, more work needs to explore efficient quality-aware data routing for distributed processing. Additionally, to handle the massive amount of data created by smart cities and achieve the transportation objectives for resource restrictions, artificial intelligence (AI)-oriented approaches are necessary. This research proposes a secured protocol with collaborative learning for IoT-enabled sustainable communication using AI techniques. This approach increases systems’ reaction times in critical conditions and also controls the smart functionalities for inter-device communication. Furthermore, fitness computing can help in balancing the contribution of quality-aware metrics to achieve load balancing and efficient energy consumption. To deal with security, IoT communication is broken down into stages, resulting in a more dependable network for unpredictable environments. The simulation results of the proposed protocol have been compared to existing approaches and improved the performance of response time by 17%, energy consumption by 14%, number of re-transmissions by 16%, and computing overhead by 16%, under a varying number of nodes and data packets.
APA, Harvard, Vancouver, ISO, and other styles
17

Chuang, Yun-Hsin, and Yuh-Min Tseng. "CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks." Symmetry 13, no. 4 (April 16, 2021): 698. http://dx.doi.org/10.3390/sym13040698.

Full text
Abstract:
In a smart city, there are different types of entities, such as nature persons, IoT devices, and service providers, which have different computational limitations and storage limitations. Unfortunately, all of the existing authentication and key exchange (AKE) protocols are designed for either client–server or client–client authentication, including the ones designed for smart cities. In this paper, we present the idea of a compatible authentication and key exchange (CAKE) protocol which provides cross-species authentication. We propose the first CAKE protocol for a smart city that any two valid entities can authenticate with each other and create a secure session key without the help of any third party, while there is also no password table and no public key issuing problem. The entity can be a natural person having biometrics, an IoT device embedded with a physical unclonable function (PUF), or a service provider. Moreover, we extend the CAKE protocol to an anonymous CAKE (ACAKE) protocol, which provides natural persons an anonymous option to protect their privacy. In addition, both the proposed CAKE and ACAKE protocols can deal with the entity revocation problem. We define the framework and the security model of CAKE and ACAKE protocols. Under the security model, we formally prove that the proposed protocols are secure under the elliptic curve computational Diffie–Hellman (ECCDH) problem, the decisional bilinear Diffie–Hellman (DBDH) problem, and hash function assumptions. Comparisons with the related protocols are conducted to demonstrate the benefits of our protocols. Performance analysis is conducted and the experience results show that the proposed protocols are practical in a smart city.
APA, Harvard, Vancouver, ISO, and other styles
18

Eledlebi, Khouloud, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Victor Mateu, and Yousof Al-Hammadi. "Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions." Sensors 22, no. 23 (November 22, 2022): 9063. http://dx.doi.org/10.3390/s22239063.

Full text
Abstract:
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment. Despite recent advances, the necessary security services, such as immediate and continuous authentication, high scalability, and cybersecurity handling of IoT cannot be achieved in a single broadcast authentication protocol. This paper presents a new hybrid protocol called Hybrid Two-level µ-timed-efficient stream loss-tolerant authentication (Hybrid TLI-µTESLA) protocol, which maximizes the benefits of the previous TESLA protocol variants, including scalability support and immediate authentication of Multilevel-µTESLA protocol and continuous authentication with minimal computation overhead of enhanced Inf-TESLA protocol. The inclusion of three different keychains and checking criteria of the packets in the Hybrid TLI-µTESLA protocol enabled resistance against Masquerading, Modification, Man-in-the-Middle, Brute-force, and DoS attacks. A solution for the authentication problem in the first and last packets of the high-level and low-level keychains of the Multilevel-µTESLA protocol was also proposed. The simulation analysis was performed using Java, where we compared the Hybrid TLI-µTESLA protocol with other variants for time complexity and computation overhead at the sender and receiver sides. We also conducted a comparative analysis between two hash functions, SHA-2 and SHA-3, and assessed the feasibility of the proposed protocol in the forthcoming 6G technology. The results demonstrated the superiority of the proposed protocol over other variants in terms of immediate and continuous authentication, scalability, cybersecurity, lifetime, network performance, and compatibility with 5G and 6G IoT generations.
APA, Harvard, Vancouver, ISO, and other styles
19

Sai Ji, Sai Ji, Yang Yuan Sai Ji, Jian Shen Yang Yuan, Chin-Feng Lai Jian Shen, and Bofan Chen Chin-Feng Lai. "An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing." 網際網路技術學刊 23, no. 3 (May 2022): 437–48. http://dx.doi.org/10.53106/160792642022052303002.

Full text
Abstract:
<p>The advancement of 5G communication technology and Internet of Things (IoT) technology has promoted the rapid development of Mobile Edge Computing (MEC). In mobile edge, all IoT devices adopt wireless communication technology. Therefore, it is particularly important to ensure the data security and the privacy of the sender in the process of data transmission. At present, a lot of researchers have proposed a large number of schemes for the authentication of the user in MEC. However, there is no effective and lightweight solution for authentication among users, edge devices and cloud server. In this paper, an efficient three-party authentication and key agreement protocol without using bilinear pairings is designed. The proposed protocol realized authentication among users, edge devices and cloud server, and at the same time, three parties conduct key agreement to obtain a common session key. The security analysis shows that our protocol is secure and meets the security attributes such as session-key security, forward secrecy. The experiment shows that the computation cost is low in this protocol.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
20

Wazid, Mohammad, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, and Youngho Park. "LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment." Sensors 19, no. 24 (December 14, 2019): 5539. http://dx.doi.org/10.3390/s19245539.

Full text
Abstract:
In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication is successful, they establish a session key between them for secure communication. To achieve this goal, a novel device authentication and key management mechanism for the edge based IoT environment, called the lightweight authentication and key management scheme for the edge based IoT environment (LDAKM-EIoT), was designed. The detailed security analysis and formal security verification conducted by the widely used “Automated Validation of Internet Security Protocols and Applications (AVISPA)” tool prove that the proposed LDAKM-EIoT is secure against several attack vectors that exist in the infrastructure of the edge based IoT environment. The elaborated comparative analysis of the proposed LDAKM-EIoT and different closely related schemes provides evidence that LDAKM-EIoT is more secure with less communication and computation costs. Finally, the network performance parameters are calculated and analyzed using the NS2 simulation to demonstrate the practical facets of the proposed LDAKM-EIoT.
APA, Harvard, Vancouver, ISO, and other styles
21

Liao, Han-Teng, Tsung-Ming Lo, and Chung-Lien Pan. "Knowledge Mapping Analysis of Intelligent Ports: Research Facing Global Value Chain Challenges." Systems 11, no. 2 (February 8, 2023): 88. http://dx.doi.org/10.3390/systems11020088.

Full text
Abstract:
Integrated technology management in building smart ports or intelligent ports is a crucial concern for global sustainable development, especially when human societies are facing increasing risks from climate change, sea-levels rising, and supply chain disruptions. By mapping the knowledge base of 103 papers on intelligent ports, retrieved in late December 2022 from the Web of Science, this study conducted a roadmapping exercise using knowledge mapping findings, assisted by Bibliometrix, VoSviewer, and customized Python scripts. The three structural (intellectual, social, and conceptual) aspects of knowledge structure reveal the significance of the internet of things (IoT), the fourth industrial revolution (Industry 4.0), digitalization and supply chains, and the need for digital transformation alignment across various stakeholders with Industry 4.0 practices. Furthermore, an even geographical distribution and institutional representation was observed across major continents. The results of the analysis of the conceptual structure demonstrated the existence of several established and emerging clusters of research, namely (1) industry data, IoT, and ICT, (2) industry 4.0, (3) smart airports, (4) automation; and (5) protocol and security. The overall empirical findings revealed the underlying technology and innovation management issues of digital transformation alignment across stakeholders in IoT, Industry 4.0, 5G, Big Data, and AI integrated solutions. In relation to roadmapping, this study proposed a socio-technical transition framework for prototyping ecosystem innovations surrounding smart sustainable ports, focusing on contributing to valuable carbon or greenhouse gas emission data governance, management, and services in global value chains.
APA, Harvard, Vancouver, ISO, and other styles
22

El Mahdi, Fatna, Ahmed Habbani, Zaid Kartit, and Bachir Bouamoud. "Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol." Wireless Communications and Mobile Computing 2020 (April 4, 2020): 1–9. http://dx.doi.org/10.1155/2020/1468976.

Full text
Abstract:
Internet of Things (IoT) is a hot and emerging topic nowadays. In the world of today, all kinds of devices are supposed to be connected and all types of information are exchanged. This makes human daily life easier and much more intelligent than before. However, this life mode is vulnerable to several security threats. In fact, the mobile networks, by nature, are more exposed to malicious attacks that may read confidential information and modify or even drop important data. This risk should be taken in consideration prior to any construction of mobile networks especially in the coming 5G technology. The present paper aims to provide a contribution in securing such kinds of environment by proposing a new protocol that can be implemented in ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
23

Xu, Li, Jiaqi Chen, Ming Liu, and Xiaoyi Wang. "Active Eavesdropping Detection Based on Large-Dimensional Random Matrix Theory for Massive MIMO-Enabled IoT." Electronics 8, no. 2 (January 31, 2019): 146. http://dx.doi.org/10.3390/electronics8020146.

Full text
Abstract:
The increasing Internet-of-Things (IoT) applications will take a significant share of the services of the fifth generation mobile network (5G). However, IoT devices are vulnerable to security threats due to the limitation of their simple hardware and communication protocol. Massive multiple-input multiple-output (massive MIMO) is recognized as a promising technique to support massive connections of IoT devices, but it faces potential physical layer breaches. An active eavesdropper can compromises the communication security of massive MIMO systems by purposely contaminating the uplink pilots. According to the random matrix theory (RMT), the eigenvalue distribution of a large dimensional matrix composed of data samples converges to the limit spectrum distribution that can be characterized by matrix dimensions. With the assistance of RMT, we propose an active eavesdropping detection method in this paper. The theoretical limit spectrum distribution is exploited to determine the distribution range of the eigenvalues of a legitimate user signal. In addition the noise components are removed using the Marčenko–Pastur law of RMT. Hypothesis testing is then carried out to determine whether the spread range of eigenvalues is “normal” or not. Simulation results show that, compared with the classical Minimum Description Length (MDL)-based detection algorithm, the proposed method significantly improves active eavesdropping detection performance.
APA, Harvard, Vancouver, ISO, and other styles
24

Yadav, Neha, Sagar Pande, Aditya Khamparia, and Deepak Gupta. "Intrusion Detection System on IoT with 5G Network Using Deep Learning." Wireless Communications and Mobile Computing 2022 (March 10, 2022): 1–13. http://dx.doi.org/10.1155/2022/9304689.

Full text
Abstract:
The Internet of Things (IoT) cyberattacks of fully integrated servers, applications, and communications networks are increasing at exponential speed. As problems caused by the Internet of Things network remain undetected for longer periods, the efficiency of sensitive devices harms end users, increases cyber threats and identity misuses, increases costs, and affects revenue. For productive safety and security, Internet of Things interface assaults must be observed nearly in real time. In this paper, a smart intrusion detection system suited to detect Internet of Things-based attacks is implemented. In particular, to detect malicious Internet of Things network traffic, a deep learning algorithm has been used. The identity solution ensures the security of operation and supports the Internet of Things connectivity protocols to interoperate. An intrusion detection system (IDS) is one of the popular types of network security technology that is used to secure the network. According to our experimental results, the proposed architecture for intrusion detection will easily recognize real global intruders. The use of a neural network to detect attacks works exceptionally well. In addition, there is an increasing focus on providing user-centric cybersecurity solutions, which necessitate the collection, processing, and analysis of massive amounts of data traffic and network connections in 5G networks. After testing, the autoencoder model, which effectively reduces detection time as well as effectively improves detection precision, has outperformed. Using the proposed technique, 99.76% of accuracy was achieved.
APA, Harvard, Vancouver, ISO, and other styles
25

Xiao, Liang, He Xu, Feng Zhu, Ruchuan Wang, and Peng Li. "SKINNY-Based RFID Lightweight Authentication Protocol." Sensors 20, no. 5 (March 2, 2020): 1366. http://dx.doi.org/10.3390/s20051366.

Full text
Abstract:
With the rapid development of the Internet of Things and the popularization of 5G communication technology, the security of resource-constrained IoT devices such as Radio Frequency Identification (RFID)-based applications have received extensive attention. In traditional RFID systems, the communication channel between the tag and the reader is vulnerable to various threats, including denial of service, spoofing, and desynchronization. Thus, the confidentiality and integrity of the transmitted data cannot be guaranteed. In order to solve these security problems, in this paper, we propose a new RFID authentication protocol based on a lightweight block cipher algorithm, SKINNY, (short for LRSAS). Security analysis shows that the LRSAS protocol guarantees mutual authentication and is resistant to various attacks, such as desynchronization attacks, replay attacks, and tracing attacks. Performance evaluations show that the proposed solution is suitable for low-cost tags while meeting security requirements. This protocol reaches a balance between security requirements and costs.
APA, Harvard, Vancouver, ISO, and other styles
26

Gupta, Nishu, Ravikanti Manaswini, Bongaram Saikrishna, Francisco Silva, and Ariel Teles. "Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET." Future Internet 12, no. 4 (April 1, 2020): 63. http://dx.doi.org/10.3390/fi12040063.

Full text
Abstract:
The amalgamation of Vehicular Ad hoc Network (VANET) with the Internet of Things (IoT) leads to the concept of the Internet of Vehicles (IoV). IoV forms a solid backbone for Intelligent Transportation Systems (ITS), which paves the way for technologies that better explain about traffic efficiency and their management applications. IoV architecture is seen as a big player in different areas such as the automobile industry, research organizations, smart cities and intelligent transportation for various commercial and scientific applications. However, as VANET is vulnerable to various types of security attacks, the IoV structure should ensure security and efficient performance for vehicular communications. To address these issues, in this article, an authentication-based protocol (A-MAC) for smart vehicular communication is proposed along with a novel framework towards an IoV architecture model. The scheme requires hash operations and uses cryptographic concepts to transfer messages between vehicles to maintain the required security. Performance evaluation helps analyzing its strength in withstanding various types of security attacks. Simulation results demonstrate that A-MAC outshines other protocols in terms of communication cost, execution time, storage cost, and overhead.
APA, Harvard, Vancouver, ISO, and other styles
27

Hazratifard, Mehdi, Fayez Gebali, and Mohammad Mamun. "Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial." Sensors 22, no. 19 (October 9, 2022): 7655. http://dx.doi.org/10.3390/s22197655.

Full text
Abstract:
Telehealth systems have evolved into more prevalent services that can serve people in remote locations and at their homes via smart devices and 5G systems. Protecting the privacy and security of users is crucial in such online systems. Although there are many protocols to provide security through strong authentication systems, sophisticated IoT attacks are becoming more prevalent. Using machine learning to handle biometric information or physical layer features is key to addressing authentication problems for human and IoT devices, respectively. This tutorial discusses machine learning applications to propose robust authentication protocols. Since machine learning methods are trained based on hidden concepts in biometric and physical layer data, these dynamic authentication models can be more reliable than traditional methods. The main advantage of these methods is that the behavioral traits of humans and devices are tough to counterfeit. Furthermore, machine learning facilitates continuous and context-aware authentication.
APA, Harvard, Vancouver, ISO, and other styles
28

Lin, Yen, Jeng-Ywan Jeng, Yi-Yu Liu, and Jheng-Jia Huang. "A Review of PCI Express Protocol-Based Systems in Response to 5G Application Demand." Electronics 11, no. 5 (February 23, 2022): 678. http://dx.doi.org/10.3390/electronics11050678.

Full text
Abstract:
In the Personal Computer (PC) industry, systems with updated configurations, components, and new technologies are introduced to the market each year. Resource arrangement and the prediction of market requirements for products are common challenges in each development phase of these products. Technologies such as Artificial Intelligence (AI), the Internet of Things (IoT), and cloud services influence the PC industry, and product strategies must be examined to fit the requirements of the market. Common designs and market predictions can influence product line resource arrangements, and 5G applications are causing an increasing demand for 5G-enabled products in the market. However, PC systems based on PCI Express, NVMe, USB, and TPM have been introduced into the market with more secure solutions, and common designs and predictable market demand can provide more reliable strategies for navigating these issues. The research reported here is based on the serial bus system, which should simplify protocol transition between PCI Express, CXL, USB 4, and NVMe. Serial bus behavior should also influence performance and power consumption. Product strategies could be based on securing demand with power and performance in AI, the IoT, cloud storage, and high-performance computing. Based on performance and power requirements, application layer devices can use PCIe-based systems to provide secure solutions to extend 5G system reliability.
APA, Harvard, Vancouver, ISO, and other styles
29

Chaudhari, Bharat S., Marco Zennaro, and Suresh Borkar. "LPWAN Technologies: Emerging Application Characteristics, Requirements, and Design Considerations." Future Internet 12, no. 3 (March 6, 2020): 46. http://dx.doi.org/10.3390/fi12030046.

Full text
Abstract:
Low power wide area network (LPWAN) is a promising solution for long range and low power Internet of Things (IoT) and machine to machine (M2M) communication applications. This paper focuses on defining a systematic and powerful approach of identifying the key characteristics of such applications, translating them into explicit requirements, and then deriving the associated design considerations. LPWANs are resource-constrained networks and are primarily characterized by long battery life operation, extended coverage, high capacity, and low device and deployment costs. These characteristics translate into a key set of requirements including M2M traffic management, massive capacity, energy efficiency, low power operations, extended coverage, security, and interworking. The set of corresponding design considerations is identified in terms of two categories, desired or expected ones and enhanced ones, which reflect the wide range of characteristics associated with LPWAN-based applications. Prominent design constructs include admission and user traffic management, interference management, energy saving modes of operation, lightweight media access control (MAC) protocols, accurate location identification, security coverage techniques, and flexible software re-configurability. Topological and architectural options for interconnecting LPWAN entities are discussed. The major proprietary and standards-based LPWAN technology solutions available in the marketplace are presented. These include Sigfox, LoRaWAN, Narrowband IoT (NB-IoT), and long term evolution (LTE)-M, among others. The relevance of upcoming cellular 5G technology and its complementary relationship with LPWAN technology are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
30

Jiao, Runhai, Hong Ouyang, Yukun Lin, Yaoming Luo, Gang Li, Zaiyu Jiang, and Qian Zheng. "A Computation-Efficient Group Key Distribution Protocol Based on a New Secret Sharing Scheme." Information 10, no. 5 (May 10, 2019): 175. http://dx.doi.org/10.3390/info10050175.

Full text
Abstract:
With the development of 5G and the Internet of Things (IoT), mobile terminals are widely used in various applications under multicast scenarios. However, due to the limited computation resources of mobile terminals, reducing the computation cost of members in group key distribution processes of dynamic groups has become an important issue. In this paper, we propose a computation-efficient group key distribution (CEGKD) protocol. First, an improved secret sharing scheme is proposed to construct faster encryption and decryption algorithms. Second, the tree structure of logical key hierarchy (LKH) is employed to implement a simple and effective key-numbering method. Theoretical analysis is given to prove that the proposed protocol meets forward security and backward security. In addition, the experiment results show that the computation cost of CEGKD on the member side is reduced by more than 85% compared with that of the LKH scheme.
APA, Harvard, Vancouver, ISO, and other styles
31

Wong, Alice May-Kuen, Chien-Lung Hsu, Tuan-Vinh Le, Mei-Chen Hsieh, and Tzu-Wei Lin. "Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks." Sensors 20, no. 9 (April 29, 2020): 2511. http://dx.doi.org/10.3390/s20092511.

Full text
Abstract:
The fifth generation (5G) mobile network delivers high peak data rates with ultra-low latency and massive network capacity. Wireless sensor network (WSN) in Internet of Thing (IoT) architecture is of prominent use in 5G-enabled applications. The electronic healthcare (e-health) system has gained a lot of research attention since it allows e-health users to store and share data in a convenient way. By the support of 5G technology, healthcare data produced by sensor nodes are transited in the e-health system with high efficiency and reliability. It helps in reducing the treatment cost, providing efficient services, better analysis reports, and faster access to treatment. However, security and privacy issues become big concerns when the number of sensors and mobile devices is increasing. Moreover, existing single-server architecture requires to store a massive number of identities and passwords, which causes a significant database cost. In this paper, we propose a three-factor fast authentication scheme with time bound and user anonymity for multi-server e-health systems in 5G-based wireless sensor networks. In our work, the three-factor authentication scheme integrating biometrics, password, and smart card ensures a high-security sensor-enabled environment for communicating parties. User anonymity is preserved during communication process. Besides, time bound authentication can be applied to various healthcare scenarios to enhance security. The proposed protocol includes fast authentication, which can provide a fast communication for participating parties. Our protocol is also designed with multi-server architecture to simplify network load and significantly save database cost. Furthermore, security proof and performance analysis results show that our proposed protocol can resist various attacks and bear a rational communication cost.
APA, Harvard, Vancouver, ISO, and other styles
32

Yan, Xiaobei, and Maode Ma. "An efficient anonymous group handover authentication protocol for MTC devices for 5G networks." MATEC Web of Conferences 355 (2022): 03052. http://dx.doi.org/10.1051/matecconf/202235503052.

Full text
Abstract:
Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage of a new target base station simultaneously. However, the current handover mechanism specified by the Third Generation Partnership Project (3GPP) incur high signalling overhead over the access network and the core network for such scenario. Moreover, other existing solutions have several security problems in terms of failure of key forward secrecy (KFS) and lack of mutual authentication. In this paper, we propose an efficient authentication protocol for a group of MTCDs in all handover scenarios. By the proposal, the messages of two MTCDs are concatenated and sent by an authenticated group member to reduce the signalling cost. The proposed protocol has been analysed on its security functionality to show its ability to preserve user privacy and resist from major typical malicious attacks. It can be expected that the proposed scheme is applicable to all kinds of group mobility scenarios such as a platoon of vehicles or a high-speed train. The performance evaluation demonstrates that the proposed protocol is efficient in terms of computational and signalling cost.
APA, Harvard, Vancouver, ISO, and other styles
33

Lin, Tzu-Wei, Chien-Lung Hsu, Tuan-Vinh Le, Chung-Fu Lu, and Bo-Yu Huang. "A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems." Sensors 21, no. 8 (April 20, 2021): 2880. http://dx.doi.org/10.3390/s21082880.

Full text
Abstract:
Healthcare is now an important part of daily life because of rising consciousness of health management. Medical professionals can know users’ health condition if they are able to access information immediately. Telemedicine systems, which provides long distance medical communication and services, is a multi-functional remote medical service that can help patients in bed in long-distance communication environments. As telemedicine systems work in public networks, privacy preservation issue of sensitive and private transmitted information is important. One of the means of proving a user’s identity are user-controlled single sign-on (UCSSO) authentication scheme, which can establish a secure communication channel using authenticated session keys between the users and servers of telemedicine systems, without threats of eavesdropping, impersonation, etc., and allow patients access to multiple telemedicine services with a pair of identity and password. In this paper, we proposed a smartcard-based user-controlled single sign-on (SC-UCSSO) for telemedicine systems that not only remains above merits but achieves privacy preservation and enhances security and performance compared to previous schemes that were proved with BAN logic and automated validation of internet security protocols and applications (AVISPA).
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Guyue, Chen Sun, Junqing Zhang, Eduard Jorswieck, Bin Xiao, and Aiqun Hu. "Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities." Entropy 21, no. 5 (May 15, 2019): 497. http://dx.doi.org/10.3390/e21050497.

Full text
Abstract:
The fifth generation (5G) and beyond wireless communications will transform many exciting applications and trigger massive data connections with private, confidential, and sensitive information. The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives. However, traditional cryptography-based key distribution protocols might be challenged in the 5G and beyond communications because of special features such as device-to-device and heterogeneous communications, and ultra-low latency requirements. Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices. This article reviews CRKG when the 5G and beyond networks employ three candidate technologies: duplex modes, massive multiple-input multiple-output (MIMO) and mmWave communications. We identify the opportunities and challenges for CRKG and provide corresponding solutions. To further demonstrate the feasibility of CRKG in practical communication systems, we overview existing prototypes with different IoT protocols and examine their performance in real-world environments. This article shows the feasibility and promising performances of CRKG with the potential to be commercialized.
APA, Harvard, Vancouver, ISO, and other styles
35

Zhang, Xvpeng, Bingqiang Liu, Yaqi Zhao, Xiaoyu Hu, Zixuan Shen, Zhaoxia Zheng, Zhenglin Liu, et al. "Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices." Sensors 22, no. 23 (November 25, 2022): 9160. http://dx.doi.org/10.3390/s22239160.

Full text
Abstract:
Achieving low-cost and high-performance network security communication is necessary for Internet of Things (IoT) devices, including intelligent sensors and mobile robots. Designing hardware accelerators to accelerate multiple computationally intensive cryptographic primitives in various network security protocols is challenging. Different from existing unified reconfigurable cryptographic accelerators with relatively low efficiency and high latency, this paper presents design and analysis of a reconfigurable cryptographic accelerator consisting of a reconfigurable cipher unit and a reconfigurable hash unit to support widely used cryptographic algorithms for IoT Devices, which require block ciphers and hash functions simultaneously. Based on a detailed and comprehensive algorithmic analysis of both the block ciphers and hash functions in terms of basic algorithm structures and common cryptographic operators, the proposed reconfigurable cryptographic accelerator is designed by reusing key register files and operators to build unified data paths. Both the reconfigurable cipher unit and the reconfigurable hash unit contain a unified data path to implement Data Encryption Standard (DES)/Advanced Encryption Standard (AES)/ShangMi 4 (SM4) and Secure Hash Algorithm-1 (SHA-1)/SHA-256/SM3 algorithms, respectively. A reconfigurable S-Box for AES and SM4 is designed based on the composite field Galois field (GF) GF(((22)2)2), which significantly reduces hardware overhead and power consumption compared with the conventional implementation by look-up tables. The experimental results based on 65-nm application-specific integrated circuit (ASIC) implementation show that the achieved energy efficiency and area efficiency of the proposed design is 441 Gbps/W and 37.55 Gbps/mm2, respectively, which is suitable for IoT devices with limited battery and form factor. The result of delay analysis also shows that the number of delay cycles of our design can be reduced by 83% compared with the state-of-the-art design, which shows that the proposed design is more suitable for applications including 5G/Wi-Fi/ZigBee/Ethernet network standards to accelerate block ciphers and hash functions simultaneously.
APA, Harvard, Vancouver, ISO, and other styles
36

Wang, Yi, Zizhou Su, Kai Huang, Jie Yan, Sui Wang, and Weisheng Ye. "Research on Pulse Power Wireless Communication Network Based on LoRa Technology." Journal of Physics: Conference Series 2433, no. 1 (February 1, 2023): 012003. http://dx.doi.org/10.1088/1742-6596/2433/1/012003.

Full text
Abstract:
Abstract In this paper, the engineering of pulse power supply in electromagnetic launch technology is studied in depth, the advantages and disadvantages of optical fiber communication transmission currently used are analyzed, and then the requirements for data transmission of pulse power supply system are summarized, and several commonly used wireless communication technologies are analyzed and compared, such as ZigBee, LoRa, SigFox, NB IoT, 5G, etc. According to the comprehensive comparison of these technologies in transmission distance, rate, bandwidth, security, time delay, self built network and other aspects, the scheme of using LoRa wireless communication technology to replace optical fiber transmission is finally determined, and the LoRa wireless communication network construction, controller hardware circuit design, module software program, data transmission communication protocol, data encryption, data storage and other contents in the scheme are further designed in detail, It also predicts the further research and development of LoRa wireless communication technology in pulse power supply.
APA, Harvard, Vancouver, ISO, and other styles
37

Salleras, Xavier, and Vanesa Daza. "SANS: Self-Sovereign Authentication for Network Slices." Security and Communication Networks 2020 (November 23, 2020): 1–8. http://dx.doi.org/10.1155/2020/8823573.

Full text
Abstract:
5G communications proposed significant improvements over 4G in terms of efficiency and security. Among these novelties, the 5G network slicing seems to have a prominent role: deploy multiple virtual network slices, each providing a different service with different needs and features. Like this, a Slice Operator (SO) ruling a specific slice may want to offer a service for users meeting some requirements. It is of paramount importance to provide a robust authentication protocol, able to ensure that users meet the requirements, providing at the same time a privacy-by-design architecture. This makes even more sense having a growing density of Internet of Things (IoT) devices exchanging private information over the network. In this paper, we improve the 5G network slicing authentication using a Self-Sovereign Identity (SSI) scheme: granting users full control over their data. We introduce an approach to allow a user to prove his right to access a specific service without leaking any information about him. Such an approach is SANS, a protocol that provides nonlinkable protection for any issued information, preventing an SO or an eavesdropper from tracking users’ activity and relating it to their real identities. Furthermore, our protocol is scalable and can be taken as a framework for improving related technologies in similar scenarios, like authentication in the 5G Radio Access Network (RAN) or other wireless networks and services. Such features can be achieved using cryptographic primitives called Zero-Knowledge Proofs (ZKPs). Upon implementing our solution using a state-of-the-art ZKP library and performing several experiments, we provide benchmarks demonstrating that our approach is affordable in speed and memory consumption.
APA, Harvard, Vancouver, ISO, and other styles
38

Danbatta, Kafilu, and Binta Usman. "PRICE BASED TRAFFIC CONGESTION CONTROL IN THE UPCOMING 5G DEPLOYMENT." FUDMA JOURNAL OF SCIENCES 5, no. 4 (February 21, 2022): 400–405. http://dx.doi.org/10.33003/fjs-2021-0504-842.

Full text
Abstract:
The demand for data in the 4G (Fourth Generation networks) and 5G (Fifth Generation networks) is becoming excessively high and the solution is being investigated to effectively utilize the available spectrum at the physical layer across different protocols to speed-up access from 2.5 to 10 times. Furthermore, the current proposals for 5G systems is envisaged to increase spectrum efficiency which brings about customer satisfaction, network density and operational efficiency, using newly 3.5 GHz NCC auctioned spectrum bands. The CPU processing power and cloud computing are expected to be the key driving factors in the evolution of wireless Network from 1G to 5G. These support wide range of new technologies like IoT, smart cities and Cyber and information Security as well as broadband penetration using entirely new Network architectural concept as a total transformation. This paper presents 5G network tariff implementation strategies and proposes a model of revenue generation which would enable a market mechanism that would allow the customer to communicate with the 5G Network and negotiate a contract based on some QoS (Quality of Service) parameters like blocking probabilities of High Priority Users (HPUs) and Low Priority Users (LPUs) , delay, and price. The percentage Improvement in Cumulative Revenue (CR) generated by the proposed model over the existing models is 10. Recommendations were made on the way forward for the optimum 5G tariffs in the Nigerian context
APA, Harvard, Vancouver, ISO, and other styles
39

Mourtzis, Dimitris, John Angelopoulos, and Nikos Panopoulos. "Smart Manufacturing and Tactile Internet Based on 5G in Industry 4.0: Challenges, Applications and New Trends." Electronics 10, no. 24 (December 20, 2021): 3175. http://dx.doi.org/10.3390/electronics10243175.

Full text
Abstract:
For many applications deployed in manufacturing networks, communication latency has been a significant barrier. Despite the constant development of improved communication protocols and standards during Industry 4.0, the latency problem persists, lowering quality of services (QoS) and quality of experience (QoE). Tactile internet (TI), with its high availability, security, and ultra-low latency, will add a new dimension to human-machine interaction (HMI) by enabling haptic and tactile sensations. The tactile internet (TI) is a cutting-edge technology that uses 5G and beyond (B5G) communications to enable real-time interaction of haptic data over the internet between tactile ends. This emerging TI technology is regarded as the next evolutionary step for the Internet of Things (IoT) and is expected to bring about massive changes towards Society 5.0 and to address complex issues in current society. To that end, the 5G mobile communication systems will support the TI at the wireless edge. As a result, TI can be used as a backbone for delay mitigation in conjunction with 5G networks, allowing for ultra-reliable low latency applications like Smart Manufacturing, virtual reality, and augmented reality. Consequently, the purpose of this paper is to present the current state of 5G and TI, as well as the challenges and future trends for 5G networks beyond 2021, as well as a conceptual framework for integrating 5G and TI into existing industrial case studies, with a focus on the design aspects and layers of TI, such as the master, network, and slave layers. Finally, the key publications focused on the key enabling technologies of TI are summarized and the beyond 5G era towards Society 5.0 based on cyber-physical systems is discussed.
APA, Harvard, Vancouver, ISO, and other styles
40

Khelf, Roumaissa, Nacira Ghoualmi-Zine, and Marwa Ahmim. "TAKE-IoT." International Journal of Embedded and Real-Time Communication Systems 11, no. 3 (July 2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.

Full text
Abstract:
The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements and withstands various types of known attacks. Moreover, TAKE-IoT aims to reduce computation costs using lightweight operations for the key generation. The proposed protocol is validated using the automated validation of internet security protocols and applications (AVISPA) tool. Hence, results show that TAKE-IoT can reach a proper level of security without sacrificing its efficiency in the context of IoT.
APA, Harvard, Vancouver, ISO, and other styles
41

Salva-Garcia, Pablo, Jose M. Alcaraz-Calero, Qi Wang, Jorge Bernal Bernabe, and Antonio Skarmeta. "5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks." Security and Communication Networks 2018 (December 10, 2018): 1–21. http://dx.doi.org/10.1155/2018/9291506.

Full text
Abstract:
Internet of Things (IoT) is a key business driver for the upcoming fifth-generation (5G) mobile networks, which in turn will enable numerous innovative IoT applications such as smart city, mobile health, and other massive IoT use cases being defined in 5G standards. To truly unlock the hidden value of such mission-critical IoT applications in a large scale in the 5G era, advanced self-protection capabilities are entailed in 5G-based Narrowband IoT (NB-IoT) networks to efficiently fight off cyber-attacks such as widespread Distributed Denial of Service (DDoS) attacks. However, insufficient research has been conducted in this crucial area, in particular, few if any solutions are capable of dealing with the multiple encapsulated 5G traffic for IoT security management. This paper proposes and prototypes a new security framework to achieve the highly desirable self-organizing networking capabilities to secure virtualized, multitenant 5G-based IoT traffic through an autonomic control loop featured with efficient 5G-aware traffic filtering. Empirical results have validated the design and implementation and demonstrated the efficiency of the proposed system, which is capable of processing thousands of 5G-aware traffic filtering rules and thus enables timely protection against large-scale attacks.
APA, Harvard, Vancouver, ISO, and other styles
42

Ogbodo, Emmanuel Utochukwu, Adnan M. Abu-Mahfouz, and Anish M. Kurien. "A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security." Sensors 22, no. 16 (August 22, 2022): 6313. http://dx.doi.org/10.3390/s22166313.

Full text
Abstract:
Addressing the recent trend of the massive demand for resources and ubiquitous use for all citizens has led to the conceptualization of technologies such as the Internet of Things (IoT) and smart cities. Ubiquitous IoT connectivity can be achieved to serve both urban and underserved remote areas such as rural communities by deploying 5G mobile networks with Low Power Wide Area Network (LPWAN). The current architectures will not offer flexible connectivity to many IoT applications due to high service demand, data exchange, emerging technologies, and security challenges. Hence, this paper explores various architectures that consider a hybrid 5G-LPWAN-IoT and Smart Cities. This includes security challenges as well as endogenous security and solutions in 5G and LPWAN-IoT. The slicing of virtual networks using software-defined network (SDN)/network function virtualization (NFV) based on the different quality of service (QoS) to satisfy different services and quality of experience (QoE) is presented. Also, a strategy that considers the implementation of 5G jointly with Weightless-N (TVWS) technologies to reduce the cell edge interference is considered. Discussions on the need for ubiquity connectivity leveraging 5G and LPWAN-IoT are presented. In addition, future research directions are presented, including a unified 5G network and LPWAN-IoT architecture that will holistically support integration with emerging technologies and endogenous security for improved/secured smart cities and remote areas IoT applications. Finally, the use of LPWAN jointly with low earth orbit (LEO) satellites for ubiquitous IoT connectivity is advocated in this paper.
APA, Harvard, Vancouver, ISO, and other styles
43

Rajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Adel R. Alharbi, and Amer Aljaedi. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation." Mathematical Problems in Engineering 2021 (October 8, 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.

Full text
Abstract:
In terms of growth, effect, and capability, the 5G-enabled Internet of Things (IoT) is incredible. The volume of data distributed and processed by IoT (Internet of Things) systems that trust connectivity and coverage raises some security problems. As IoT technology is directly used in our daily lives, the threats of present cyberspace may grow more prominent globally. Extended network life, coverage, and connectivity are all required for securing IoT-based 5G network devices. As a result of these failures, there are flaws that lead to security breaches. Because purposeful faults can quickly render the entire network dysfunctional, they are more difficult to identify than unexpected failures. Securing IoT-based 5G Network Device Connectivity and Coverage for expending Encryption and Authentication Scheme (EAS) framework is proposed in this study, which uses novel security flaws. In this research, we proposed a Boltzmann machine (BMKG)-based encryption algorithm for securing 5G-enabled IoT device network environment and compared various asymmetric algorithms for key exchange.
APA, Harvard, Vancouver, ISO, and other styles
44

Jain, Anshul, Tanya Singh, Satyendra Kumar Sharma, and Vikas Prajapati. "Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 001–38. http://dx.doi.org/10.28945/4675.

Full text
Abstract:
Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. Background: 5G and IoT are a combination of technology that will enhance the user experience and add many security issues to existing ones like DDoS, DoS. This paper aims to solve some of these problems by using network slicing and implementing an Intrusion Detection System to identify and isolate the compromised resources. Methodology: This paper proposes a 5G-IoT architecture using network slicing. Research here is an advancement to our previous implementation, a Python-based software divided into five different modules. This paper’s amplification includes induction of security using pattern matching intrusion detection methods and conducting tests in five different scenarios, with 1000 up to 5000 devices in different security modes. This enhancement in security helps differentiate and isolate attacks on IoT endpoints, base stations, and slices. Contribution: Network slicing is a known security technique; we have used it as a platform and developed a solution to host IoT devices with peculiar requirements and enhance their security by identifying intruders. This paper gives a different solution for implementing security while using slicing technology. Findings: The study entails and simulates how the IoT ecosystem can be variedly deployed on 5G networks using network slicing for different types of IoT devices and users. Simulation done in this research proves that the suggested architecture can be successfully implemented on IoT users with peculiar requirements in a network slicing environment. Recommendations for Practitioners: Practitioners can implement this solution in any live or production IoT environment to enhance security. This solution helps them get a cost-effective method for deploying IoT devices on a 5G network, which would otherwise have been an expensive technology to implement. Recommendation for Researchers: Researchers can enhance the simulations by amplifying the different types of IoT devices on varied hardware. They can even perform the simulation on a real network to unearth the actual impact. Impact on Society: This research provides an affordable and modest solution for securing the IoT ecosystem on a 5G network using network slicing technology, which will eventually benefit society as an end-user. This research can be of great assistance to all those working towards implementing security in IoT ecosystems. Future Research: All the configuration and slicing resources allocation done in this research was performed manually; it can be automated to improve accuracy and results. Our future direction will include machine learning techniques to make this application and intrusion detection more intelligent and advanced. This simulation can be combined and performed with smart network devices to obtain more varied results. A proof-of-concept system can be implemented on a real 5G network to amplify the concept further.
APA, Harvard, Vancouver, ISO, and other styles
45

Mohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (January 20, 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.

Full text
Abstract:
The Internet of Things (IoT) has expanded access to information technology by combining both digital and physical fields as an emerging technology. IoT will increasingly overshadow human life as it becomes more pervasive. IoT will be applied to important areas of the national economy, such as health care and medical care, and smart transportation. Hence, data security in IoT must be met with highlights such as distinguishing proof, unwavering quality, integration, and verifiable, and so on. Security within the field of IoT is more vital in terms of openness and reliance. Security is an critical issue for IoT applications and proceeds to confront major challenges. This think about pointed to supply a convention to extend IoT-based security. The method proposed in this paper is to show modern conveyance engineering to extend IoT security. This unused design is based on a blockchain and can be actualized as a dispersed design in all layers of IoT. The findings of recreations and usage in genuine IoT scenarios appear that the execution of the proposed security conventions can be proficient and viable within the productivity and adequacy of distinctive levels of security and IoT accessibility.
APA, Harvard, Vancouver, ISO, and other styles
46

Hasan*, Md Aaqeel, Dr Jaypal Medida, and N. Laxmi Prasanna. "Sliding Window Protocol for Internet of Things." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 3 (September 30, 2021): 46–54. http://dx.doi.org/10.35940/ijrte.c6417.0910321.

Full text
Abstract:
Internet of Things (IoT) refers to the concept of connecting non-traditional computers and related sources with the help of the internet. This includes incorporating basic computing and communication technologies for daily use into Physical things. Security and Confidentiality are two major challenges in IoT. In the current security mechanisms available for IoT, the limitations in the memory, energy resources, and CPU of IoT devices compromises the critical security specifications in IoT devices. Also, the centralized architectures for security are not appropriate for IoT because of a Single attack point. It is costly to defend against attacks targeted on centralized infrastructure. Therefore, it is important to decentralize the IoT security architecture to meet the requirements of resource constraints. Blockchain is a decentralized encryption system with a large number of uses. However, because of its high computational complexity and poor scalability, the Traditional Blockchain environment is not suitable for IoT applications. So, we introduce a Sliding window protocol to the traditional blockchain so that it will better suit the applications in the IoT environment. Changing the conventional blockchain and introducing a sliding window to it makes it use previous blocks in proof of work to shape the next hash block. SWBC's results are analyzed on a data stream generated from an IoT testbed (Smart Home) in real-time. The results show that the proposed sliding window protocol improves security and reduces memory overhead and consumes fewer resources for Security.
APA, Harvard, Vancouver, ISO, and other styles
47

Rekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (January 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.

Full text
Abstract:
Abstract It is very difficult to develop a perfect security protocol for communication over the IoT network and developing a reliable authentication protocol requires a detailed understanding of cryptography. To ensure the reliability of security protocols of IoT, the validation method is not a good choice because of its several disadvantages and limitations. To prove the high reliability of Cryptographic Security Protocols(CSP) for IoT networks, the functional correctness of security protocols must be proved secure mathematically. Using the Formal Verification technique we can prove the functional correctness of IoT security protocols by providing the proofs mathematically. In this work, The CoAP Machine to Machine authentication protocol and centralied IoT network Authentication Protocol RADIUS is formally verified using the well-known verification technique known as model checking technique and we have used the Scyther model checker for the verification of security properties of the respective protocols. The abstract protocol models of the IoT authentication protocols were specified in the security protocol description language and the security requirements of the authentication protocols were specified as claim events.
APA, Harvard, Vancouver, ISO, and other styles
48

Niveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath, and Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform." International Journal of e-Collaboration 17, no. 4 (October 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.

Full text
Abstract:
Security over internet communication has now become difficult as technology is increasingly more effective and faster, particularly in resource limited devices such as wireless sensors, embedded devices, internet of things (IoT), radio frequency identification (RFID) tags, etc. However, IoT is expected to connect billions of computers as a hopeful technology for the future. Hence, security, privacy, and authentication services must protect the communication in IoT. There are several recent considerations, such as restricted computing capacity, register width, RAM size, specific operating environment, ROM size, etc. that have compelled IoT to utilize conventional measures of security. These technologies require greater data speeds, high throughput, expanded power, lower bandwidth, and high efficiency. In addition, IoT has transformed the world in light of these new ideas by offering smooth communication between heterogeneous networks (HetNets).
APA, Harvard, Vancouver, ISO, and other styles
49

Al Ahmed, Mahmoud Tayseer, Fazirulhisyam Hashim, Shaiful Jahari Hashim, and Azizol Abdullah. "Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks." Electronics 12, no. 4 (February 8, 2023): 867. http://dx.doi.org/10.3390/electronics12040867.

Full text
Abstract:
Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the authentication of the devices in the network. The current security model in IoT networks uses centralized key exchange servers that present a security weak point. IoT networks need decentralized management for network security. Blockchain, with its decentralized model of authentication, can provide a solution for decentralized authentication in IoT networks. However, blockchain authentication models are known to be computationally demanding because they require complex mathematical calculations. In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger. The proposed protocol arranges the nodes in clusters and creates an authentication blockchain for each cluster. These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. The proposed protocol security performance is analyzed using cryptographic protocols verifier software and tested. Additionally, a test bed consisting of a Raspberry Pi network is presented to analyze the performance of the proposed protocol.
APA, Harvard, Vancouver, ISO, and other styles
50

Sarica, Alper Kaan, and Pelin Angin. "Explainable Security in SDN-Based IoT Networks." Sensors 20, no. 24 (December 20, 2020): 7326. http://dx.doi.org/10.3390/s20247326.

Full text
Abstract:
The significant advances in wireless networks in the past decade have made a variety of Internet of Things (IoT) use cases possible, greatly facilitating many operations in our daily lives. IoT is only expected to grow with 5G and beyond networks, which will primarily rely on software-defined networking (SDN) and network functions virtualization for achieving the promised quality of service. The prevalence of IoT and the large attack surface that it has created calls for SDN-based intelligent security solutions that achieve real-time, automated intrusion detection and mitigation. In this paper, we propose a real-time intrusion detection and mitigation solution for SDN, which aims to provide autonomous security in the high-traffic IoT networks of the 5G and beyond era, while achieving a high degree of interpretability by human experts. The proposed approach is built upon automated flow feature extraction and classification of flows while using random forest classifiers at the SDN application layer. We present an SDN-specific dataset that we generated for IoT and provide results on the accuracy of intrusion detection in addition to performance results in the presence and absence of our proposed security mechanism. The experimental results demonstrate that the proposed security approach is promising for achieving real-time, highly accurate detection and mitigation of attacks in SDN-managed IoT networks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography