68,005 research outputs found

    IoT Ecosystems Enable Smart Communication Solutions: A Case Study

    Get PDF
    The Internet of Things (IoT) is a platform for innovation, allowing people to invest in and use IoT to improve life, business, and society. It will be applicable to all or any industry sectors, verticals, people, machines, and everything. This creates difficult requirements in terms of higher system capacity, extremely low latency, such as for the tactile Internet, extremely high throughput values, a wide range of services, such as IoT and M2M, and a more uninterrupted experience. As a symbiotic confluence of up to date and existing technologies, the IOT architecture will use Hetnet RAN, Cloud enhanced RAN, and SW defined data centres to combine novel and legacy technologies. As a result, IOT will combine next-generation largearea extensible service experiences anytime and anywhere, with ultra-dense installations, nearzero latency, and GB experiences–when and where it matters. Collaboration on research, standardisation, and spectrum sharing with the IT/Internet world, industry verticals, policymakers, and academia is a significant success element. Trillions of dollars in smart ecosystems prospects covering secure connections, digital service enablement, applications and repair provisioning, and a wide range of internet of things and consumer applications are available to communications service providers and enterprises

    Flexible fog computing and telecom architecture for 5G networks

    Get PDF
    We review a novel, secure, highly distributed and ultra-dense fog computing infrastructure, which can be allocated at the extreme edge of a wired/wireless network for a Telecom Operator to provide multiple unified, cost-effective and new 5G services, such as Network Function Virtualization (NFV), Mobile Edge Computing (MEC), and services for third parties (e.g., smart cities, vertical industries or Internet of Things (IoT)). The distributed and programmable fog technologies are expected to strengthen the position of the Mobile Network and cloud markets; key benefits are the dynamic deployment of new distributed low-latency services. The architecture consists of three main building blocks: a) a scalable node, that is seamlessly integrated in the Telecom infrastructure; b) a controller, focused on service assurance, that is integrated in the management and orchestration architecture of the Telecom operator; and c) services running on top of the Telecom infrastructure.Peer ReviewedPostprint (author's final draft

    An Authentication Protocol for Future Sensor Networks

    Full text link
    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.Comment: This article is accepted for the publication in "Sensors" journal. 29 pages, 15 figure

    A secure distributed blockchain platform for use in AI-enabled IoT applications

    Get PDF
    The increased implementation of Edge Computing technology has provided The Internet of Things (IoT) with the ability of real-time data processing and tasks execution requested by smart devices. To support this processing the integration of Artificial Intelligence (AI) into IoT is considered one of the most promising approach. While AI helps in the analyses of the data, blockchain technology provides a robust environment within which to create a secure, distributed way to share and store data. This paper proposes an architecture that combines the strengths provided by edge computing, AI, and blockchain technologies to provide robust, secure, and intelligent solutions for secure and faster data processing and sharing. The pandemic created by the rapid spread of the novel Coronavirus COVID19, as well as the tracking of viruses in water sewage to help control the spread of such viruses, were used as our case study for exploring this architecture. To secure the proposed architecture a new concept for consensus mechanism based on Honesty-Based Distributed Proof of Work (DPOW) were devised and tested
    • …
    corecore