675 research outputs found

    Next Generation Cloud Computing: New Trends and Research Directions

    Get PDF
    The landscape of cloud computing has significantly changed over the last decade. Not only have more providers and service offerings crowded the space, but also cloud infrastructure that was traditionally limited to single provider data centers is now evolving. In this paper, we firstly discuss the changing cloud infrastructure and consider the use of infrastructure from multiple providers and the benefit of decentralising computing away from data centers. These trends have resulted in the need for a variety of new computing architectures that will be offered by future cloud infrastructure. These architectures are anticipated to impact areas, such as connecting people and devices, data-intensive computing, the service space and self-learning systems. Finally, we lay out a roadmap of challenges that will need to be addressed for realising the potential of next generation cloud systems.Comment: Accepted to Future Generation Computer Systems, 07 September 201

    A Secure Lightweight Wireless M-Bus Protocol for IoT: Leveraging the Noise Protocol Framework

    Get PDF
    The expansion of smart metering within the Internet of Things (IoT) ecosystem underscores the need for robust security protocols that safeguard data transmission while optimizing device efficiency. Wireless Meter-Bus (wM-Bus), a key protocol for remote meter reading in utility systems such as gas, water, and heat meters, faces significant security challenges. This dissertation introduces a method to enhance wM-Bus security by integrating the Noise Protocol Framework (NPF), which secures wM-Bus against vulnerabilities and optimizes for the energy constraints of IoT devices. Initially examining wM-Bus security issues, particularly in battery-operated smart meters, the study explores the NPF’s lightweight, adaptable security solutions. Implementation analysis focuses on NPF handshake patterns NX (non-interactive with public key transmission by the initiator) and XX (mutual public key exchange), assessing their compatibility with wM-Bus through metrics such as memory use, packet size, and handshake time. Findings reveal that these patterns significantly outperform traditional methods like Transport Layer Security (TLS) in reducing energy consumption, thereby extending IoT devices’ operational lifespan. The study achieved a 5\% battery-life reduction with NX and a 25\% battery-life reduction with XX, enhancing both security and efficiency. These implementations also improved system security by reducing handshake times by up to 4.7\% and minimizing packet sizes by up to 68.38\%, critical for mitigating security threats. They also showed improvement in memory consumption compared to TLS. The proposed lightweight protocol effectively balances advanced security and efficiency, maintaining data confidentiality, integrity, and availability in smart metering without sacrificing performance. Security testing against the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) model confirmed the resilience of this new protocol, thereby enhancing the security framework. This research not only establishes a more secure foundation for smart metering but also sets a precedent for future studies on integrating lightweight cryptographic frameworks in IoT environments

    A Test Environment for Wireless Hacking in Domestic IoT Scenarios

    Get PDF
    Security is gaining importance in the daily life of every citizen. The advent of Internet of Things devices in our lives is changing our conception of being connected through a single device to a multiple connection in which the centre of connection is becoming the devices themselves. This conveys the attack vector for a potential attacker is exponentially increased. This paper presents how the concatenation of several attacks on communication protocols (WiFi, Bluetooth LE, GPS, 433 Mhz and NFC) can lead to undesired situations in a domestic environment. A comprehensive analysis of the protocols with the identification of their weaknesses is provided. Some relevant aspects of the whole attacking procedure have been presented to provide some relevant tips and countermeasures.This work has been partially supported by the Spanish Ministry of Science and Innovation through the SecureEDGE project (PID2019-110565RB-I00), and by the by the Andalusian FEDER 2014-2020 Program through the SAVE project (PY18-3724). // Open Access funding provided thanks to the CRUE-CSIC agreement with Springer Nature. // Funding for open access charge: Universidad de Málaga / CBU
    • …
    corecore