43 research outputs found

    An Authentication Protocol for Future Sensor Networks

    Full text link
    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.Comment: This article is accepted for the publication in "Sensors" journal. 29 pages, 15 figure

    Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future

    Full text link
    Given the exponential expansion of the internet, the possibilities of security attacks and cybercrimes have increased accordingly. However, poorly implemented security mechanisms in the Internet of Things (IoT) devices make them susceptible to cyberattacks, which can directly affect users. IoT forensics is thus needed for investigating and mitigating such attacks. While many works have examined IoT applications and challenges, only a few have focused on both the forensic and security issues in IoT. Therefore, this paper reviews forensic and security issues associated with IoT in different fields. Future prospects and challenges in IoT research and development are also highlighted. As demonstrated in the literature, most IoT devices are vulnerable to attacks due to a lack of standardized security measures. Unauthorized users could get access, compromise data, and even benefit from control of critical infrastructure. To fulfil the security-conscious needs of consumers, IoT can be used to develop a smart home system by designing a FLIP-based system that is highly scalable and adaptable. Utilizing a blockchain-based authentication mechanism with a multi-chain structure can provide additional security protection between different trust domains. Deep learning can be utilized to develop a network forensics framework with a high-performing system for detecting and tracking cyberattack incidents. Moreover, researchers should consider limiting the amount of data created and delivered when using big data to develop IoT-based smart systems. The findings of this review will stimulate academics to seek potential solutions for the identified issues, thereby advancing the IoT field.Comment: 77 pages, 5 figures, 5 table

    A Concise Review on Internet of Things (IoT) - Problems, Challenges and Opportunities

    Get PDF
    Internet of things (IoT) is considered to revolutionize the way internet works and bring together the concepts such as machine to machine (M2M) communication, big data, artificial intelligence, etc. to work under a same umbrella such that cyber space and human (physical systems) are more intertwined and thus ubiquitous giving rise to cyber physical systems. This will involve billions of connections and smart products communicating with each other mostly without human intervention to achieve smart objectives. The idea of IoT has enticed significant research attentions since the massive connectivity bring varieties of challenges and obstacles including heterogeneity, scalability, security, big data, energy requirements, etc. The paper looks into providing a concise review of the concepts on IoT and applications describing the main components and features. Furthermore, open issues and challenges that need addressing by the research community and some potential solutions are discussed

    Quality-aware Tasking in Mobile Opportunistic Networks - Distributed Information Retrieval and Processing utilizing Opportunistic Heterogeneous Resources.

    Get PDF
    Advances in wireless technology have facilitated direct communication among mobile devices in recent years, enabling opportunistic networks. Opportunistic networking among mobile devices is often utilized to offload and save cellular network traffic and to maintain communication in case of impaired communication infrastructure, such as in emergency situations. With a plethora of built-in capabilities, such as built-in sensors and the ability to perform even intensive operations, mobile devices in such networks can be used to provide distributed applications for other devices upon opportunistic contact. However, ensuring quality requirements for such type of distributed applications is still challenging due to uncontrolled mobility and resource constraints of devices. Addressing this problem, in this thesis, we propose a tasking methodology, which allows for assigning tasks to capable mobile devices, considering quality requirements. To this end, we tackle two fundamental types of tasks required in a distributed application, i.e., information retrieval and distributed processing. Our first contribution is a decentralized tasking concept to obtain crowd collected data through built-in sensors of participating mobile devices. Based on the Named Data Networking paradigm, we propose a naming scheme to specify the quality requirements for crowd sensing tasks. With the proposed naming scheme, we design an adaptive self-organizing approach, in which the sensing tasks will be forwarded to the right devices, satisfying specified quality requirements for requested information. In our second contribution, we develop a tasking model for distributed processing in opportunistic networks. We design a task-oriented message template, which enhances the definition of a complex processing task, which requires multiple processing stages to accomplish a predefined goal. Our tasking concept enables distributed coordination and an autonomous decision of participating device to counter uncertainty caused by the mobility of devices in the network. Based on this proposed model, we develop computation handover strategies among mobile devices for achieving quality requirements of the distributed processing. Finally, as the third contribution and to enhance information retrieval, we integrate our proposed tasking concept for distributed processing into information retrieval. Thereby, the crowd-collected data can be processed by the devices during the forwarding process in the network. As a result, relevant information can be extracted from the crowd-collected data directly within the network without being offloaded to any remote computation entity. We show that the obtained information can be disseminated to the right information consumers, without over-utilizing the resource of participating devices in the network. Overall, we demonstrate that our contributions comprise a tasking methodology for leveraging resources of participating devices to ensure quality requirement of applications built upon an opportunistic network

    A survey on MAC-based physical layer security over wireless sensor network

    Get PDF
    Physical layer security for wireless sensor networks (WSNs) is a laborious and highly critical issue in the world. Wireless sensor networks have great importance in civil and military fields or applications. Security of data/information through wireless medium remains a challenge. The data that we transmit wirelessly has increased the speed of transmission rate. In physical layer security, the data transfer between source and destination is not confidential, and thus the user has privacy issues, which is why improving the security of wireless sensor networks is a prime concern. The loss of physical security causes a great threat to a network. We have various techniques to resolve these issues, such as interference, noise, fading in the communications, etc. In this paper we have surveyed the different parameters of a security design model to highlight the vulnerabilities. Further we have discussed the various attacks on different layers of the TCP/IP model along with their mitigation techniques. We also elaborated on the applications of WSNs in healthcare, military information integration, oil and gas. Finally, we have proposed a solution to enhance the security of WSNs by adopting the alpha method and handshake mechanism with encryption and decryption

    GREEN RADIO COMMUNICATIONS IN 5G NETWORKS TO IMPROVE ENERGY EFFICIENCY AND REDUCE GLOBAL WARMING

    Get PDF
    The technology of green radio communication helps in reducing the emission of carbon and also helps in the process of reducing the consumption of energy by the base stations of wireless networks. In addition to that, with the help of tools such as Information Communication Technology (ICT) and Multi-Hop Relay Network (MHR), the functionalities and the operational attributes of the technology of green radio communication can be improved and the process of energy consumption gets better as well. It is found from the discussion that green networking technology has mainly two core components and the two core components are energy awareness and energy efficiency. The ability of the network to measure the cost per packet is called energy awareness. On the other hand, the ability of a network to decrease the contribution of carbon and extend the lifetime of the network can be called energy efficiency. In addition, the implementation of the technology of green radio communication helps in mitigating the issue of future energy crises. Additionally, it has also been understood that Green communication in terms of energy efficiency can help IT industry which has been extensively criticised for the contribution of the carbon emissions as well as the failure to respond to the negative impact on the whole climate. In fact, the next generation networks have imposed the challenges in terms of the provision of the energy efficient solutions which are provided and the transportation of the data along with the huge range of the quality of the services requirement as well as the tolerance of lower optimum services.The technology of green radio communication helps in reducing the emission of carbon and also helps in the process of reducing the consumption of energy by the base stations of wireless networks. In addition to that, with the help of tools such as Information Communication Technology (ICT) and Multi-Hop Relay Network (MHR), the functionalities and the operational attributes of the technology of green radio communication can be improved and the process of energy consumption gets better as well. It is found from the discussion that green networking technology has mainly two core components and the two core components are energy awareness and energy efficiency. The ability of the network to measure the cost per packet is called energy awareness. On the other hand, the ability of a network to decrease the contribution of carbon and extend the lifetime of the network can be called energy efficiency. In addition, the implementation of the technology of green radio communication helps in mitigating the issue of future energy crises. Additionally, it has also been understood that Green communication in terms of energy efficiency can help IT industry which has been extensively criticised for the contribution of the carbon emissions as well as the failure to respond to the negative impact on the whole climate. In fact, the next generation networks have imposed the challenges in terms of the provision of the energy efficient solutions which are provided and the transportation of the data along with the huge range of the quality of the services requirement as well as the tolerance of lower optimum services

    Service Provisioning in Edge-Cloud Continuum Emerging Applications for Mobile Devices

    Get PDF
    Disruptive applications for mobile devices can be enhanced by Edge computing facilities. In this context, Edge Computing (EC) is a proposed architecture to meet the mobility requirements imposed by these applications in a wide range of domains, such as the Internet of Things, Immersive Media, and Connected and Autonomous Vehicles. EC architecture aims to introduce computing capabilities in the path between the user and the Cloud to execute tasks closer to where they are consumed, thus mitigating issues related to latency, context awareness, and mobility support. In this survey, we describe which are the leading technologies to support the deployment of EC infrastructure. Thereafter, we discuss the applications that can take advantage of EC and how they were proposed in the literature. Finally, after examining enabling technologies and related applications, we identify some open challenges to fully achieve the potential of EC, and also research opportunities on upcoming paradigms for service provisioning. This survey is a guide to comprehend the recent advances on the provisioning of mobile applications, as well as foresee the expected next stages of evolution for these applications
    corecore