1,940 research outputs found

    Authentication protocol for an IoT-enabled LTE networks

    Get PDF
    The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol of the long-term evolution (LTE) network does not support Internet of Things (IoT) objects and has several security limitations, including transmission of the object’s (user/device) identity and key set identifier in plaintext over the network, synchronization, large overhead, limited identity privacy, and security attack vulnerabilities. In this article, we propose a new secure and efficient AKA protocol for the LTE network that supports secure and efficient communications among various IoT devices as well as among the users. Analysis shows that our protocol is secure, efficient, and privacy preserved, and reduces bandwidth consumption during authentication

    A Novel Framework for Software Defined Wireless Body Area Network

    Full text link
    Software Defined Networking (SDN) has gained huge popularity in replacing traditional network by offering flexible and dynamic network management. It has drawn significant attention of the researchers from both academia and industries. Particularly, incorporating SDN in Wireless Body Area Network (WBAN) applications indicates promising benefits in terms of dealing with challenges like traffic management, authentication, energy efficiency etc. while enhancing administrative control. This paper presents a novel framework for Software Defined WBAN (SDWBAN), which brings the concept of SDN technology into WBAN applications. By decoupling the control plane from data plane and having more programmatic control would assist to overcome the current lacking and challenges of WBAN. Therefore, we provide a conceptual framework for SDWBAN with packet flow model and a future direction of research pertaining to SDWBAN.Comment: Presented on 8th International Conference on Intelligent Systems, Modelling and Simulatio

    A survey on subjecting electronic product code and non-ID objects to IP identification

    Full text link
    Over the last decade, both research on the Internet of Things (IoT) and real-world IoT applications have grown exponentially. The IoT provides us with smarter cities, intelligent homes, and generally more comfortable lives. However, the introduction of these devices has led to several new challenges that must be addressed. One of the critical challenges facing interacting with IoT devices is to address billions of devices (things) around the world, including computers, tablets, smartphones, wearable devices, sensors, and embedded computers, and so on. This article provides a survey on subjecting Electronic Product Code and non-ID objects to IP identification for IoT devices, including their advantages and disadvantages thereof. Different metrics are here proposed and used for evaluating these methods. In particular, the main methods are evaluated in terms of their: (i) computational overhead, (ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether applicable to already ID-based objects and presented in tabular format. Finally, the article proves that this field of research will still be ongoing, but any new technique must favorably offer the mentioned five evaluative parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports, Wiley, 2020 (Open Access
    • …
    corecore