Siga este enlace para ver otros tipos de publicaciones sobre el tema: IoT, Security IoT, IoT Protocol, 5G.

Artículos de revistas sobre el tema "IoT, Security IoT, IoT Protocol, 5G"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "IoT, Security IoT, IoT Protocol, 5G".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (2020): 3625. http://dx.doi.org/10.3390/s20133625.

Texto completo
Resumen
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimi
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Sanchez-Gomez, Jesus, Dan Garcia-Carrillo, Rafael Marin-Perez, and Antonio Skarmeta. "Secure Authentication and Credential Establishment in Narrowband IoT and 5G." Sensors 20, no. 3 (2020): 882. http://dx.doi.org/10.3390/s20030882.

Texto completo
Resumen
Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, this paper presents the adaptation of bootstrapping protocols to be compliant with th
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Park, Kisung, and Youngho Park. "On the Security of a Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks." Applied Sciences 12, no. 9 (2022): 4265. http://dx.doi.org/10.3390/app12094265.

Texto completo
Resumen
The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing and monitoring various types of data. These 5G based IoT environments collect various data in real-time using micro-sensors as IoT things devices and sends the collected data to a server for further processing. In this scenario, a secure authentication and key agreement scheme is needed to ensure privacy when exchanging data between IoT nodes and the server. Recently, Cao et al. in “LSAA: A lightweight and secure access authentication scheme for both UE and mMTC devices in 5G networks” presente
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Pan, Shin-Hung, and Shu-Ching Wang. "Optimal Consensus with Dual Abnormality Mode of Cellular IoT Based on Edge Computing." Sensors 21, no. 2 (2021): 671. http://dx.doi.org/10.3390/s21020671.

Texto completo
Resumen
The continuous development of fifth-generation (5G) networks is the main driving force for the growth of Internet of Things (IoT) applications. It is expected that the 5G network will greatly expand the applications of the IoT, thereby promoting the operation of cellular networks, the security and network challenges of the IoT, and pushing the future of the Internet to the edge. Because the IoT can make anything in anyplace be connected together at any time, it can provide ubiquitous services. With the establishment and use of 5G wireless networks, the cellular IoT (CIoT) will be developed and
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Brooks, Tyson. "Authenticating Devices in Fog-mobile Edge Computing Environments through a Wireless Grid Resource Sharing Protocol." International Journal of UbiComp 13, no. 2 (2022): 1–17. http://dx.doi.org/10.5121/iju.2022.13201.

Texto completo
Resumen
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing and wireless grids has resulted in the widespread deployment of relatively immature technology. These technologies, which will primarily use 5G wireless communication networks, are becoming popular because they can be deployed quickly with little infrastructure and lends themselves to environments utilizing numerous internet connected devices (ICD). There are, however, many significant challenges faced by security designers, engineers and implementers of these networks in ensuring that the l
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Gupta, Sunita, Meenakshi Nawal, Neha Janu, and Dinesh Goyal. "IoT, Enabling Technologies, and Sensor Node Deployment Pattern in WSN." ECS Transactions 107, no. 1 (2022): 7441–55. http://dx.doi.org/10.1149/10701.7441ecst.

Texto completo
Resumen
In Internet of Things (IoT), various computing devices and mechanical and digital machines are interconnected. These devices have unique identifiers (UIDs) and transmit the information on the network with no human interaction. Sensors are the integrated part in IoT as these are used to collect the data. The IoT technologies have a lot of issues like addressing problems, scalability problems, security, and standardization issues that required to be solved. In this paper, the authors facilitate the reader to have necessary understanding of IoT, importance on protocols, technologies, application
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Wu, Tsuyang, Xinglan Guo, Yehcheng Chen, Saru Kumari, and Chienming Chen. "Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks." Drones 6, no. 1 (2021): 10. http://dx.doi.org/10.3390/drones6010010.

Texto completo
Resumen
At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Khalid, Madiha, Umar Mujahid, and Najam-ul-Islam Muhammad. "Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags." Security and Communication Networks 2019 (July 21, 2019): 1–25. http://dx.doi.org/10.1155/2019/3295616.

Texto completo
Resumen
The field of pervasive computing especially the Internet of Things (IoT) network is evolving due to high network speed and increased capacity offered by the 5G communication system. The IoT network identifies each device before giving it access to the network. The RFID system is one of the most prominent enabling technologies for the node identification. Since the communication between the node and the network takes place over an insecure wireless channel, an authentication mechanism is required to avoid the malicious devices from entering the network. This paper presents a brief survey on the
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Mathas, Christos-Minas, Costas Vassilakis, Nicholas Kolokotronis, Charilaos C. Zarakovitis, and Michail-Alexandros Kourtis. "On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids." Energies 14, no. 10 (2021): 2818. http://dx.doi.org/10.3390/en14102818.

Texto completo
Resumen
The 5G communication network will underpin a vast number of new and emerging services, paving the way for unprecedented performance and capabilities in mobile networks. In this setting, the Internet of Things (IoT) will proliferate, and IoT devices will be included in many 5G application contexts, including the Smart Grid. Even though 5G technology has been designed by taking security into account, design provisions may be undermined by software-rooted vulnerabilities in IoT devices that allow threat actors to compromise the devices, demote confidentiality, integrity and availability, and even
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Chen, Chien-Ming, Zhen Li, Shehzad Ashraf Chaudhry, and Long Li. "Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks." Security and Communication Networks 2021 (October 21, 2021): 1–12. http://dx.doi.org/10.1155/2021/3116593.

Texto completo
Resumen
As an extension of the 4G system, 5G is a new generation of broadband mobile communication with high speed, low latency, and large connection characteristics. It solves the problem of human-to-thing and thing-to-thing communication to meet the needs of intelligent medical devices, automotive networking, smart homes, industrial control, environmental monitoring, and other IoT application needs. This has resulted in new research topics related to wireless body area networks. However, such networks are still subject to significant security and privacy threats. Recently, Fotouhi et al. proposed a
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Behmanesh, Ali, Nasrin Sayfouri, and Farahnaz Sadoughi. "Technological Features of Internet of Things in Medicine: A Systematic Mapping Study." Wireless Communications and Mobile Computing 2020 (July 27, 2020): 1–27. http://dx.doi.org/10.1155/2020/9238614.

Texto completo
Resumen
Nowadays, applications for the Internet of Things (IoT) have been introduced in different fields of medicine to provide more efficient medical services to the patients. A systematic mapping study was conducted to answer ten research questions with the purposes of identifying and classifying the present medical IoT technological features as well as recognizing the opportunities for future developments. We reviewed how cloud, wearable technologies, wireless communication technologies, messaging protocols, security methods, development boards, microcontrollers, mobile/IoT operating systems, and p
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Candal-Ventureira, David, Pablo Fondo-Ferreiro, Felipe Gil-Castiñeira, and Francisco Javier González-Castaño. "Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks." Sensors 20, no. 18 (2020): 5054. http://dx.doi.org/10.3390/s20185054.

Texto completo
Resumen
The unstoppable adoption of the Internet of Things (IoT) is driven by the deployment of new services that require continuous capture of information from huge populations of sensors, or actuating over a myriad of “smart” objects. Accordingly, next generation networks are being designed to support such massive numbers of devices and connections. For example, the 3rd Generation Partnership Project (3GPP) is designing the different 5G releases specifically with IoT in mind. Nevertheless, from a security perspective this scenario is a potential nightmare: the attack surface becomes wider and many I
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Fan, Kai, Panfei Song, and Yintang Yang. "ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G." Mobile Information Systems 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/2349149.

Texto completo
Resumen
As one of the core techniques in 5G, the Internet of Things (IoT) is increasingly attracting people’s attention. Meanwhile, as an important part of IoT, the Near Field Communication (NFC) is widely used on mobile devices and makes it possible to take advantage of NFC system to complete mobile payment and merchandise information reading. But with the development of NFC, its problems are increasingly exposed, especially the security and privacy of authentication. Many NFC authentication protocols have been proposed for that, some of them only improve the function and performance without consider
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Song, Haoxiang, Zhe Tu, and Yajuan Qin. "Blockchain-Based Access Control and Behavior Regulation System for IoT." Sensors 22, no. 21 (2022): 8339. http://dx.doi.org/10.3390/s22218339.

Texto completo
Resumen
With the development of 5G and the Internet of things (IoT), the multi-domain access of massive devices brings serious data security and privacy issues. At the same time, most access systems lack the ability to identify network attacks and cannot adopt dynamic and timely defenses against various security threats. To this end, we propose a blockchain-based access control and behavior regulation system for IoT. Relying on the attribute-based access control model, this system deploys smart contracts on the blockchain to achieve distributed and fine-grained access control and ensures that the iden
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Gupta, Divya, Shalli Rani, Aman Singh, and Juan Luis Vidal Mazon. "Towards Security Mechanism in D2D Wireless Communication: A 5G Network Approach." Wireless Communications and Mobile Computing 2022 (July 22, 2022): 1–9. http://dx.doi.org/10.1155/2022/6983655.

Texto completo
Resumen
Device-to-device (D2D) communication has attracted many researchers, cellular operators, and equipment makers as mobile traffic and bandwidth demands have increased. It supports direct communication within devices with no need for any intermediate node and, therefore, offers advantage in 5G network while providing wide cell coverage range and frequency reuse. However, establishing acceptable and secure mechanism for D2D communication which ensures confidentiality, integrity, and availability is an issue encountered in this situation. Furthermore, in a resource-constrained IoT environment, thes
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Islam, Naveed, Khalid Haseeb, Muhammad Ali, and Gwanggil Jeon. "Secured Protocol with Collaborative IoT-Enabled Sustainable Communication Using Artificial Intelligence Technique." Sustainability 14, no. 14 (2022): 8919. http://dx.doi.org/10.3390/su14148919.

Texto completo
Resumen
In recent years, 5G and the Internet of Things (IoT) have been integrated into a variety of applications to support sustainable communication systems. In the presence of intermediate hardware, IoT devices collect the network data and transfer them to cloud technologies. The interconnect machines provide essential information to the connected devices over the Internet. Many solutions have been proposed to address the dynamic and unexpected characteristics of IoT-based networks and to support smart developments. However, more work needs to explore efficient quality-aware data routing for distrib
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Chuang, Yun-Hsin, and Yuh-Min Tseng. "CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks." Symmetry 13, no. 4 (2021): 698. http://dx.doi.org/10.3390/sym13040698.

Texto completo
Resumen
In a smart city, there are different types of entities, such as nature persons, IoT devices, and service providers, which have different computational limitations and storage limitations. Unfortunately, all of the existing authentication and key exchange (AKE) protocols are designed for either client–server or client–client authentication, including the ones designed for smart cities. In this paper, we present the idea of a compatible authentication and key exchange (CAKE) protocol which provides cross-species authentication. We propose the first CAKE protocol for a smart city that any two val
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Eledlebi, Khouloud, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Victor Mateu, and Yousof Al-Hammadi. "Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions." Sensors 22, no. 23 (2022): 9063. http://dx.doi.org/10.3390/s22239063.

Texto completo
Resumen
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment. Despite recent advances, the necessary security services, such as immediate and continuous authentication, high scalability, and cybersecurity handling of IoT cannot be achieved in a single broadcast authentication protocol. This paper presents a new hybrid protocol called Hybrid Two-level µ-timed-efficient stream loss-tolerant authentication (Hybrid TLI-µTESLA) protocol, which maximizes the benefits of the previous TESLA protocol
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Sai Ji, Sai Ji, Yang Yuan Sai Ji, Jian Shen Yang Yuan, Chin-Feng Lai Jian Shen, and Bofan Chen Chin-Feng Lai. "An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing." 網際網路技術學刊 23, no. 3 (2022): 437–48. http://dx.doi.org/10.53106/160792642022052303002.

Texto completo
Resumen
<p>The advancement of 5G communication technology and Internet of Things (IoT) technology has promoted the rapid development of Mobile Edge Computing (MEC). In mobile edge, all IoT devices adopt wireless communication technology. Therefore, it is particularly important to ensure the data security and the privacy of the sender in the process of data transmission. At present, a lot of researchers have proposed a large number of schemes for the authentication of the user in MEC. However, there is no effective and lightweight solution for authentication among users, edge devices and cloud se
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Wazid, Mohammad, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, and Youngho Park. "LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment." Sensors 19, no. 24 (2019): 5539. http://dx.doi.org/10.3390/s19245539.

Texto completo
Resumen
In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Liao, Han-Teng, Tsung-Ming Lo, and Chung-Lien Pan. "Knowledge Mapping Analysis of Intelligent Ports: Research Facing Global Value Chain Challenges." Systems 11, no. 2 (2023): 88. http://dx.doi.org/10.3390/systems11020088.

Texto completo
Resumen
Integrated technology management in building smart ports or intelligent ports is a crucial concern for global sustainable development, especially when human societies are facing increasing risks from climate change, sea-levels rising, and supply chain disruptions. By mapping the knowledge base of 103 papers on intelligent ports, retrieved in late December 2022 from the Web of Science, this study conducted a roadmapping exercise using knowledge mapping findings, assisted by Bibliometrix, VoSviewer, and customized Python scripts. The three structural (intellectual, social, and conceptual) aspect
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

El Mahdi, Fatna, Ahmed Habbani, Zaid Kartit, and Bachir Bouamoud. "Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol." Wireless Communications and Mobile Computing 2020 (April 4, 2020): 1–9. http://dx.doi.org/10.1155/2020/1468976.

Texto completo
Resumen
Internet of Things (IoT) is a hot and emerging topic nowadays. In the world of today, all kinds of devices are supposed to be connected and all types of information are exchanged. This makes human daily life easier and much more intelligent than before. However, this life mode is vulnerable to several security threats. In fact, the mobile networks, by nature, are more exposed to malicious attacks that may read confidential information and modify or even drop important data. This risk should be taken in consideration prior to any construction of mobile networks especially in the coming 5G techn
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Xu, Li, Jiaqi Chen, Ming Liu, and Xiaoyi Wang. "Active Eavesdropping Detection Based on Large-Dimensional Random Matrix Theory for Massive MIMO-Enabled IoT." Electronics 8, no. 2 (2019): 146. http://dx.doi.org/10.3390/electronics8020146.

Texto completo
Resumen
The increasing Internet-of-Things (IoT) applications will take a significant share of the services of the fifth generation mobile network (5G). However, IoT devices are vulnerable to security threats due to the limitation of their simple hardware and communication protocol. Massive multiple-input multiple-output (massive MIMO) is recognized as a promising technique to support massive connections of IoT devices, but it faces potential physical layer breaches. An active eavesdropper can compromises the communication security of massive MIMO systems by purposely contaminating the uplink pilots. A
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Yadav, Neha, Sagar Pande, Aditya Khamparia, and Deepak Gupta. "Intrusion Detection System on IoT with 5G Network Using Deep Learning." Wireless Communications and Mobile Computing 2022 (March 10, 2022): 1–13. http://dx.doi.org/10.1155/2022/9304689.

Texto completo
Resumen
The Internet of Things (IoT) cyberattacks of fully integrated servers, applications, and communications networks are increasing at exponential speed. As problems caused by the Internet of Things network remain undetected for longer periods, the efficiency of sensitive devices harms end users, increases cyber threats and identity misuses, increases costs, and affects revenue. For productive safety and security, Internet of Things interface assaults must be observed nearly in real time. In this paper, a smart intrusion detection system suited to detect Internet of Things-based attacks is impleme
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Xiao, Liang, He Xu, Feng Zhu, Ruchuan Wang, and Peng Li. "SKINNY-Based RFID Lightweight Authentication Protocol." Sensors 20, no. 5 (2020): 1366. http://dx.doi.org/10.3390/s20051366.

Texto completo
Resumen
With the rapid development of the Internet of Things and the popularization of 5G communication technology, the security of resource-constrained IoT devices such as Radio Frequency Identification (RFID)-based applications have received extensive attention. In traditional RFID systems, the communication channel between the tag and the reader is vulnerable to various threats, including denial of service, spoofing, and desynchronization. Thus, the confidentiality and integrity of the transmitted data cannot be guaranteed. In order to solve these security problems, in this paper, we propose a new
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Gupta, Nishu, Ravikanti Manaswini, Bongaram Saikrishna, Francisco Silva, and Ariel Teles. "Authentication-Based Secure Data Dissemination Protocol and Framework for 5G-Enabled VANET." Future Internet 12, no. 4 (2020): 63. http://dx.doi.org/10.3390/fi12040063.

Texto completo
Resumen
The amalgamation of Vehicular Ad hoc Network (VANET) with the Internet of Things (IoT) leads to the concept of the Internet of Vehicles (IoV). IoV forms a solid backbone for Intelligent Transportation Systems (ITS), which paves the way for technologies that better explain about traffic efficiency and their management applications. IoV architecture is seen as a big player in different areas such as the automobile industry, research organizations, smart cities and intelligent transportation for various commercial and scientific applications. However, as VANET is vulnerable to various types of se
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Hazratifard, Mehdi, Fayez Gebali, and Mohammad Mamun. "Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial." Sensors 22, no. 19 (2022): 7655. http://dx.doi.org/10.3390/s22197655.

Texto completo
Resumen
Telehealth systems have evolved into more prevalent services that can serve people in remote locations and at their homes via smart devices and 5G systems. Protecting the privacy and security of users is crucial in such online systems. Although there are many protocols to provide security through strong authentication systems, sophisticated IoT attacks are becoming more prevalent. Using machine learning to handle biometric information or physical layer features is key to addressing authentication problems for human and IoT devices, respectively. This tutorial discusses machine learning applica
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Lin, Yen, Jeng-Ywan Jeng, Yi-Yu Liu, and Jheng-Jia Huang. "A Review of PCI Express Protocol-Based Systems in Response to 5G Application Demand." Electronics 11, no. 5 (2022): 678. http://dx.doi.org/10.3390/electronics11050678.

Texto completo
Resumen
In the Personal Computer (PC) industry, systems with updated configurations, components, and new technologies are introduced to the market each year. Resource arrangement and the prediction of market requirements for products are common challenges in each development phase of these products. Technologies such as Artificial Intelligence (AI), the Internet of Things (IoT), and cloud services influence the PC industry, and product strategies must be examined to fit the requirements of the market. Common designs and market predictions can influence product line resource arrangements, and 5G applic
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Chaudhari, Bharat S., Marco Zennaro, and Suresh Borkar. "LPWAN Technologies: Emerging Application Characteristics, Requirements, and Design Considerations." Future Internet 12, no. 3 (2020): 46. http://dx.doi.org/10.3390/fi12030046.

Texto completo
Resumen
Low power wide area network (LPWAN) is a promising solution for long range and low power Internet of Things (IoT) and machine to machine (M2M) communication applications. This paper focuses on defining a systematic and powerful approach of identifying the key characteristics of such applications, translating them into explicit requirements, and then deriving the associated design considerations. LPWANs are resource-constrained networks and are primarily characterized by long battery life operation, extended coverage, high capacity, and low device and deployment costs. These characteristics tra
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Jiao, Runhai, Hong Ouyang, Yukun Lin, et al. "A Computation-Efficient Group Key Distribution Protocol Based on a New Secret Sharing Scheme." Information 10, no. 5 (2019): 175. http://dx.doi.org/10.3390/info10050175.

Texto completo
Resumen
With the development of 5G and the Internet of Things (IoT), mobile terminals are widely used in various applications under multicast scenarios. However, due to the limited computation resources of mobile terminals, reducing the computation cost of members in group key distribution processes of dynamic groups has become an important issue. In this paper, we propose a computation-efficient group key distribution (CEGKD) protocol. First, an improved secret sharing scheme is proposed to construct faster encryption and decryption algorithms. Second, the tree structure of logical key hierarchy (LKH
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Wong, Alice May-Kuen, Chien-Lung Hsu, Tuan-Vinh Le, Mei-Chen Hsieh, and Tzu-Wei Lin. "Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks." Sensors 20, no. 9 (2020): 2511. http://dx.doi.org/10.3390/s20092511.

Texto completo
Resumen
The fifth generation (5G) mobile network delivers high peak data rates with ultra-low latency and massive network capacity. Wireless sensor network (WSN) in Internet of Thing (IoT) architecture is of prominent use in 5G-enabled applications. The electronic healthcare (e-health) system has gained a lot of research attention since it allows e-health users to store and share data in a convenient way. By the support of 5G technology, healthcare data produced by sensor nodes are transited in the e-health system with high efficiency and reliability. It helps in reducing the treatment cost, providing
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Yan, Xiaobei, and Maode Ma. "An efficient anonymous group handover authentication protocol for MTC devices for 5G networks." MATEC Web of Conferences 355 (2022): 03052. http://dx.doi.org/10.1051/matecconf/202235503052.

Texto completo
Resumen
Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage of a new target base station simultaneously. However, the current handover mechanism specified by the Third Generation Partnership Project (3GPP) incur high signalling overhead over the access network and the core network for such scenario. Moreover, other existing solutions have several security problems in terms of failure of key forward secrecy (KFS) and lack of mutual a
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Lin, Tzu-Wei, Chien-Lung Hsu, Tuan-Vinh Le, Chung-Fu Lu, and Bo-Yu Huang. "A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems." Sensors 21, no. 8 (2021): 2880. http://dx.doi.org/10.3390/s21082880.

Texto completo
Resumen
Healthcare is now an important part of daily life because of rising consciousness of health management. Medical professionals can know users’ health condition if they are able to access information immediately. Telemedicine systems, which provides long distance medical communication and services, is a multi-functional remote medical service that can help patients in bed in long-distance communication environments. As telemedicine systems work in public networks, privacy preservation issue of sensitive and private transmitted information is important. One of the means of proving a user’s identi
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Li, Guyue, Chen Sun, Junqing Zhang, Eduard Jorswieck, Bin Xiao, and Aiqun Hu. "Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities." Entropy 21, no. 5 (2019): 497. http://dx.doi.org/10.3390/e21050497.

Texto completo
Resumen
The fifth generation (5G) and beyond wireless communications will transform many exciting applications and trigger massive data connections with private, confidential, and sensitive information. The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives. However, traditional cryptography-based key distribution protocols might be challenged in the 5G and beyond communications because of special features such as device-to-device and heterogeneous communications, and ultra-low
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Zhang, Xvpeng, Bingqiang Liu, Yaqi Zhao, et al. "Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices." Sensors 22, no. 23 (2022): 9160. http://dx.doi.org/10.3390/s22239160.

Texto completo
Resumen
Achieving low-cost and high-performance network security communication is necessary for Internet of Things (IoT) devices, including intelligent sensors and mobile robots. Designing hardware accelerators to accelerate multiple computationally intensive cryptographic primitives in various network security protocols is challenging. Different from existing unified reconfigurable cryptographic accelerators with relatively low efficiency and high latency, this paper presents design and analysis of a reconfigurable cryptographic accelerator consisting of a reconfigurable cipher unit and a reconfigura
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Wang, Yi, Zizhou Su, Kai Huang, Jie Yan, Sui Wang, and Weisheng Ye. "Research on Pulse Power Wireless Communication Network Based on LoRa Technology." Journal of Physics: Conference Series 2433, no. 1 (2023): 012003. http://dx.doi.org/10.1088/1742-6596/2433/1/012003.

Texto completo
Resumen
Abstract In this paper, the engineering of pulse power supply in electromagnetic launch technology is studied in depth, the advantages and disadvantages of optical fiber communication transmission currently used are analyzed, and then the requirements for data transmission of pulse power supply system are summarized, and several commonly used wireless communication technologies are analyzed and compared, such as ZigBee, LoRa, SigFox, NB IoT, 5G, etc. According to the comprehensive comparison of these technologies in transmission distance, rate, bandwidth, security, time delay, self built netwo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Salleras, Xavier, and Vanesa Daza. "SANS: Self-Sovereign Authentication for Network Slices." Security and Communication Networks 2020 (November 23, 2020): 1–8. http://dx.doi.org/10.1155/2020/8823573.

Texto completo
Resumen
5G communications proposed significant improvements over 4G in terms of efficiency and security. Among these novelties, the 5G network slicing seems to have a prominent role: deploy multiple virtual network slices, each providing a different service with different needs and features. Like this, a Slice Operator (SO) ruling a specific slice may want to offer a service for users meeting some requirements. It is of paramount importance to provide a robust authentication protocol, able to ensure that users meet the requirements, providing at the same time a privacy-by-design architecture. This mak
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Danbatta, Kafilu, and Binta Usman. "PRICE BASED TRAFFIC CONGESTION CONTROL IN THE UPCOMING 5G DEPLOYMENT." FUDMA JOURNAL OF SCIENCES 5, no. 4 (2022): 400–405. http://dx.doi.org/10.33003/fjs-2021-0504-842.

Texto completo
Resumen
The demand for data in the 4G (Fourth Generation networks) and 5G (Fifth Generation networks) is becoming excessively high and the solution is being investigated to effectively utilize the available spectrum at the physical layer across different protocols to speed-up access from 2.5 to 10 times. Furthermore, the current proposals for 5G systems is envisaged to increase spectrum efficiency which brings about customer satisfaction, network density and operational efficiency, using newly 3.5 GHz NCC auctioned spectrum bands. The CPU processing power and cloud computing are expected to be the key
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Mourtzis, Dimitris, John Angelopoulos, and Nikos Panopoulos. "Smart Manufacturing and Tactile Internet Based on 5G in Industry 4.0: Challenges, Applications and New Trends." Electronics 10, no. 24 (2021): 3175. http://dx.doi.org/10.3390/electronics10243175.

Texto completo
Resumen
For many applications deployed in manufacturing networks, communication latency has been a significant barrier. Despite the constant development of improved communication protocols and standards during Industry 4.0, the latency problem persists, lowering quality of services (QoS) and quality of experience (QoE). Tactile internet (TI), with its high availability, security, and ultra-low latency, will add a new dimension to human-machine interaction (HMI) by enabling haptic and tactile sensations. The tactile internet (TI) is a cutting-edge technology that uses 5G and beyond (B5G) communications
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Khelf, Roumaissa, Nacira Ghoualmi-Zine, and Marwa Ahmim. "TAKE-IoT." International Journal of Embedded and Real-Time Communication Systems 11, no. 3 (2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.

Texto completo
Resumen
The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements a
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Salva-Garcia, Pablo, Jose M. Alcaraz-Calero, Qi Wang, Jorge Bernal Bernabe, and Antonio Skarmeta. "5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks." Security and Communication Networks 2018 (December 10, 2018): 1–21. http://dx.doi.org/10.1155/2018/9291506.

Texto completo
Resumen
Internet of Things (IoT) is a key business driver for the upcoming fifth-generation (5G) mobile networks, which in turn will enable numerous innovative IoT applications such as smart city, mobile health, and other massive IoT use cases being defined in 5G standards. To truly unlock the hidden value of such mission-critical IoT applications in a large scale in the 5G era, advanced self-protection capabilities are entailed in 5G-based Narrowband IoT (NB-IoT) networks to efficiently fight off cyber-attacks such as widespread Distributed Denial of Service (DDoS) attacks. However, insufficient rese
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Ogbodo, Emmanuel Utochukwu, Adnan M. Abu-Mahfouz, and Anish M. Kurien. "A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security." Sensors 22, no. 16 (2022): 6313. http://dx.doi.org/10.3390/s22166313.

Texto completo
Resumen
Addressing the recent trend of the massive demand for resources and ubiquitous use for all citizens has led to the conceptualization of technologies such as the Internet of Things (IoT) and smart cities. Ubiquitous IoT connectivity can be achieved to serve both urban and underserved remote areas such as rural communities by deploying 5G mobile networks with Low Power Wide Area Network (LPWAN). The current architectures will not offer flexible connectivity to many IoT applications due to high service demand, data exchange, emerging technologies, and security challenges. Hence, this paper explor
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Rajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, et al. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation." Mathematical Problems in Engineering 2021 (October 8, 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.

Texto completo
Resumen
In terms of growth, effect, and capability, the 5G-enabled Internet of Things (IoT) is incredible. The volume of data distributed and processed by IoT (Internet of Things) systems that trust connectivity and coverage raises some security problems. As IoT technology is directly used in our daily lives, the threats of present cyberspace may grow more prominent globally. Extended network life, coverage, and connectivity are all required for securing IoT-based 5G network devices. As a result of these failures, there are flaws that lead to security breaches. Because purposeful faults can quickly re
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Jain, Anshul, Tanya Singh, Satyendra Kumar Sharma, and Vikas Prajapati. "Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 001–38. http://dx.doi.org/10.28945/4675.

Texto completo
Resumen
Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. B
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Mohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.

Texto completo
Resumen
The Internet of Things (IoT) has expanded access to information technology by combining both digital and physical fields as an emerging technology. IoT will increasingly overshadow human life as it becomes more pervasive. IoT will be applied to important areas of the national economy, such as health care and medical care, and smart transportation. Hence, data security in IoT must be met with highlights such as distinguishing proof, unwavering quality, integration, and verifiable, and so on. Security within the field of IoT is more vital in terms of openness and reliance. Security is an critica
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Hasan*, Md Aaqeel, Dr Jaypal Medida, and N. Laxmi Prasanna. "Sliding Window Protocol for Internet of Things." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 3 (2021): 46–54. http://dx.doi.org/10.35940/ijrte.c6417.0910321.

Texto completo
Resumen
Internet of Things (IoT) refers to the concept of connecting non-traditional computers and related sources with the help of the internet. This includes incorporating basic computing and communication technologies for daily use into Physical things. Security and Confidentiality are two major challenges in IoT. In the current security mechanisms available for IoT, the limitations in the memory, energy resources, and CPU of IoT devices compromises the critical security specifications in IoT devices. Also, the centralized architectures for security are not appropriate for IoT because of a Single a
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Rekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.

Texto completo
Resumen
Abstract It is very difficult to develop a perfect security protocol for communication over the IoT network and developing a reliable authentication protocol requires a detailed understanding of cryptography. To ensure the reliability of security protocols of IoT, the validation method is not a good choice because of its several disadvantages and limitations. To prove the high reliability of Cryptographic Security Protocols(CSP) for IoT networks, the functional correctness of security protocols must be proved secure mathematically. Using the Formal Verification technique we can prove the funct
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Niveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath, and Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform." International Journal of e-Collaboration 17, no. 4 (2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.

Texto completo
Resumen
Security over internet communication has now become difficult as technology is increasingly more effective and faster, particularly in resource limited devices such as wireless sensors, embedded devices, internet of things (IoT), radio frequency identification (RFID) tags, etc. However, IoT is expected to connect billions of computers as a hopeful technology for the future. Hence, security, privacy, and authentication services must protect the communication in IoT. There are several recent considerations, such as restricted computing capacity, register width, RAM size, specific operating envir
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Al Ahmed, Mahmoud Tayseer, Fazirulhisyam Hashim, Shaiful Jahari Hashim, and Azizol Abdullah. "Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks." Electronics 12, no. 4 (2023): 867. http://dx.doi.org/10.3390/electronics12040867.

Texto completo
Resumen
Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the authentication of the devices in the network. The current security model in IoT networks uses centralized key exchange servers that present a security weak point. IoT networks need decentralized management for network security. Blockchain, with its decentralized model of authentication, can provide a solution for decentralized authentication in IoT networks. However, blockchain authentication models are known to be co
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Sarica, Alper Kaan, and Pelin Angin. "Explainable Security in SDN-Based IoT Networks." Sensors 20, no. 24 (2020): 7326. http://dx.doi.org/10.3390/s20247326.

Texto completo
Resumen
The significant advances in wireless networks in the past decade have made a variety of Internet of Things (IoT) use cases possible, greatly facilitating many operations in our daily lives. IoT is only expected to grow with 5G and beyond networks, which will primarily rely on software-defined networking (SDN) and network functions virtualization for achieving the promised quality of service. The prevalence of IoT and the large attack surface that it has created calls for SDN-based intelligent security solutions that achieve real-time, automated intrusion detection and mitigation. In this paper
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!