12 research outputs found
An improved performance routing protocol based on delay for MANETs in smart cities
Mobile ad-hoc networks (MANETs) is a set of mobile devices that can self-configuration, self-established parameters to transmission in-network. Although limited inability, MANETs have been applied in many domains to serve humanity in recent years, such as disaster recovery, forest fire, military, intelligent traffic, or IoT ecosystems. Because of the movement of network devices, the system performance is low. In order to MANETs could more contribution in the future of the Internet, the routing is a significant problem to enhance the performance of MANETs. In this work, we proposed a new delay-based protocol aim enhance the system performance, called performance routing protocol based on delay (PRPD). In order to analyze the efficiency of the proposed solution, we compared the proposed protocol with traditional protocols. Experiment results showed that the PRPD protocol improved packet delivery ratio, throughput, and delay compared to the traditional protocols
An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring
Blockchains have been widely used in Internet of Things(IoT) applications including smart cities, smart home and smart governance to provide high levels of security and privacy. In this article, we advance a Blockchain based decentralized architecture for the storage of IoT data produced from smart home/cities. The architecture includes a secure communication protocol using a sign-encryption technique between power constrained IoT devices and a Gateway. The sign encryption also preserves privacy. We propose that a Software Agent executing on the Gateway selects a Miner node using performance parameters of Miners. Simulations demonstrate that the recommended Miner selection outperforms Proof of Works selection used in Bitcoin and Random Miner Selection.Proceedings of the IEEE International Conference on Industrial Technolog
Statistical Review of Health Monitoring Models for Real-Time Hospital Scenarios
Health Monitoring System Models (HMSMs) need speed, efficiency, and security to work. Cascading components ensure data collection, storage, communication, retrieval, and privacy in these models. Researchers propose many methods to design such models, varying in scalability, multidomain efficiency, flexibility, usage and deployment, computational complexity, cost of deployment, security level, feature usability, and other performance metrics. Thus, HMSM designers struggle to find the best models for their application-specific deployments. They must test and validate different models, which increases design time and cost, affecting deployment feasibility. This article discusses secure HMSMs' application-specific advantages, feature-specific limitations, context-specific nuances, and deployment-specific future research scopes to reduce model selection ambiguity. The models based on the Internet of Things (IoT), Machine Learning Models (MLMs), Blockchain Models, Hashing Methods, Encryption Methods, Distributed Computing Configurations, and Bioinspired Models have better Quality of Service (QoS) and security than their counterparts. Researchers can find application-specific models. This article compares the above models in deployment cost, attack mitigation performance, scalability, computational complexity, and monitoring applicability. This comparative analysis helps readers choose HMSMs for context-specific application deployments. This article also devises performance measuring metrics called Health Monitoring Model Metrics (HM3) to compare the performance of various models based on accuracy, precision, delay, scalability, computational complexity, energy consumption, and security
Complementary Detection for Hardware Efficient On-site Monitoring of Parkinsonian Progress
The progress of Parkinson & #x2019;s disease (PD) in patients is conventionally monitored through follow-up visits. These may be insufficient for clinicians to obtain a good understanding of the occurrence and severity of symptoms in order to adjust therapy to the patients & #x2019; needs. Portable platforms for PD diagnostics can provide in-depth information, thus reducing the frequency of face-to-face visits. This paper describes the first known on-site PD detection and monitoring processor. This is achieved by employing complementary detection which uses a combination of weak k-NN classifiers to produce a classifier with a higher consistency and confidence level than the individual classifiers. Various implementations of the classifier are investigated for trade-offs in terms of area, power and detection performance. Detection performances are validated on an FPGA platform. Achieved accuracy measures were: Matthews correlation coefficient of 0.6162, mean F1-score of 91.38 & #x0025;, and mean classification accuracy of 91.91 & #x0025;. By mapping the implemented designs on a 45 nm CMOS process, the optimal configuration achieved a dynamic power per channel of 2.26 & #x03BC;W and an area per channel of 0.24 mm2
Authentication protocols for D2D communications
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2019.A comunicação Dispositivo-a-Dispositivo (D2D) é uma das tecnologias promissoras
para ser usada na conexão de grandes quantidades de dispositivos, como previsto para a
Internet das Coisas (IoT, do inglês Internet of Things), ao proporcionar a oportunidade de
conexão direta entre dispositivos, sem a obrigatoriedade de emprego da infraestrutura de redes
tradicionais.
A segurança é um item crucial para o sucesso da IoT e das comunicações D2D e pode
ser proporcionada por protocolos de autenticação e acordo de chaves (AKA, do
inglês Authentication and Key Agreement). Entretanto, os protocolos de autenticação utilizados
nas redes tradicionais (como os protocolos EPS-AKA e EAP-AKA) não estão adaptados para
D2D, e seu emprego em situação de grande aumento no número de dispositivos
conectados imporia um elevado consumo de recursos, especialmente de banda e de
processamento computacional. Adicionalmente, no início do trabalho foram identificados
poucos protocolos dessa categoria, especificamente voltados para D2D.
Este trabalho apresenta o projeto e a avaliação de 3 (três) protocolos de autenticação e
acordo de chaves para comunicações D2D, desenvolvidos para 3 (três) cenários:1) dispositivos
integrantes de Telecare Medical Information Systems (TMIS) baseados em sistema de
nuvem computacional; 2) grupos de dispositivos em cenário genérico de emprego de
comunicações D2D, onde sejam esperadas grandes quantidades de dispositivos; 3) grupos de
dispositivos em comunicações D2D em cenário m-health.
A metodologia para obtenção de novos protocolos seguros considerou, como passo
inicial, uma revisão da literatura, buscando identificar protocolos que tenham sido empregados,
de forma específica, em cada cenário considerado. Em seguida, foi definida uma arquitetura
específica de cada cenário considerado, bem como propriedades de segurança a serem
alcançadas e possíveis ataques contra os quais caberia oferecer proteção. Foram então
criados novos protocolos de autenticação para os cenários e arquiteturas citados, considerando
o emprego de comunicações D2D.
Em todos os três cenários, dentre as propriedades de segurança tidas como requisitos
para o correto funcionamento da comunicação D2D, incluem-se a preservação da
confidencialidade, a integridade e a disponibilidade do sistema; em termos de possíveis
ataques, ataques tais como os dos tipos man-in-the-middle, repetição e personificação foram
tratados, visando proteção pelo protocolo contra os mesmos.
Após a descrição de cada protocolo, esta dissertação apresenta comparações em relação
a propriedades de segurança entre cada um dos protocolos propostos e alguns de seus
respectivos trabalhos relacionados. Uma comparação envolvendo custos de computação, de
comunicação e de energia é então realizada. Os resultados obtidos mostram bom desempenho e robustez em segurança para os três esquemas propostos. As
propostas mostram-se adequadas para uso futuro, na autenticação de dispositivos IoT que
utilizarem comunicação D2D, dentro dos cenários adotados e sob as condições em que foram
avaliadas.
Uma validação semiformal dos protocolos é também apresentada. A ferramenta
AVISPA é utilizada para verificar a robustez da segurança dos protocolos desenvolvidos.Device-to-Device (D2D) communication is one of the promising technologies to be used
to connect the large quantity of devices, as forecasted for the Internet of Things (IoT), by
providing to devices the opportunity of connecting each other without mandatory use of
traditional networks infrastructure.
Security is a crucial item for the success of IoT and D2D communication and can be
provided by robust authentication and key agreement protocols (AKA). However, the
authentication protocols used for traditional networks (such as EPS-AKA and EAP-AKA) are not
adapted for D2D and their use in the situation of large number of devices connected would
impose high consume of resources, specially bandwidth and computational processing.
Additionally, in the beginning of the work, it was identified a small quantity of protocols of the
described category, specifically for D2D.
This work provides the project and evaluation of 3 (three) authentication protocols
designed to meet the demand on Device-to-Device (D2D) communications authentication and
key agreement protocols, developed for 3 (three) scenarios: 1) devices that are members of
Telecare Medical Information Systems (TMIS) based on cloud system; 2) groups of devices in
generic scenario for the use of D2D communications, which there are expected large quantities
of devices; 3) groups of devices for D2D communication in m-health scenario.
The methodology for obtaining of new secure protocols considered, as initial step, a
literature review, searching for protocols that might be specifically used in each of the scenarios
considered. Next, a specific architecture for each scenario considered was developed, as well
as security properties to be accomplished and possible attacks that might be suitable for the
protocol to have protection. Therefore, authentication protocols were created for the scenarios
and architecture cited, considering the use of D2D.
In all three cases, among the security objectives required for the proper functioning of
D2D communication, there are included the preservation of confidentiality, integrity, and
availability of the system; in terms of attacks, such as man-in-the-middle, replay and
impersonation were treated, aiming the protection of the protocols against the cited attacks.
After the description of each protocol, this dissertation presents comparisons regarding
security properties among each of the proposed protocols and some of their respective related
works. A comparison involving computational, communication and energy costs is executed.
The results obtained show good performance and robust security to the three proposed
schemes. The proposals show up suitable future use, in the authentication of IoT devices using
D2D communication, in the scenarios adopted and under the conditions evaluated.
A semi-formal validation of the protocols is also presented. The tool AVISPA is used to
verify the security robustness of the protocols developed
Securing internet of medical things with friendly-jamming schemes
The Internet of Medical Things (IoMT)-enabled e-healthcare can complement traditional medical treatments in a flexible and convenient manner. However, security and privacy become the main concerns of IoMT due to the limited computational capability, memory space and energy constraint of medical sensors, leading to the in-feasibility for conventional cryptographic approaches, which are often computationally-complicated. In contrast to cryptographic approaches, friendly jamming (Fri-jam) schemes will not cause extra computing cost to medical sensors, thereby becoming potential countermeasures to ensure security of IoMT. In this paper, we present a study on using Fri-jam schemes in IoMT. We first analyze the data security in IoMT and discuss the challenges. We then propose using Fri-jam schemes to protect the confidential medical data of patients collected by medical sensors from being eavesdropped. We also discuss the integration of Fri-jam schemes with various communication technologies, including beamforming, Simultaneous Wireless Information and Power Transfer (SWIPT) and full duplexity. Moreover, we present two case studies of Fri-jam schemes in IoMT. The results of these two case studies indicate that the Fri-jam method will significantly decrease the eavesdropping risk while leading to no significant influence on legitimate transmission
Security for 5G Mobile Wireless Networks
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding security services including authentication, availability, data confidentiality, key management and privacy. The paper further discusses the new security features involving different technologies applied to 5G such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software defined networks and Internet of Things. Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided. As a case study, we explore a handover procedure as well as a signaling load scheme to show the advantage of the proposed security architecture. The challenges and future directions of 5G wireless security are finally summarized
New Classes of Binary Random Sequences for Cryptography
In the vision for the 5G wireless communications advancement that yield new security prerequisites and challenges we propose a catalog of three new classes of pseudorandom random sequence generators. This dissertation starts with a review on the requirements of 5G wireless networking systems and the most recent development of the wireless security services applied to 5G, such as private-keys generation, key protection, and flexible authentication. This dissertation proposes new complexity theory-based, number-theoretic approaches to generate lightweight pseudorandom sequences, which protect the private information using spread spectrum techniques. For the class of new pseudorandom sequences, we obtain the generalization. Authentication issues of communicating parties in the basic model of Piggy Bank cryptography is considered and a flexible authentication using a certified authority is proposed
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
Device to Device (D2D) communication is a type of technology where two devices can communicate directly with each other without the need to contact Base Station or any central infrastructure. With emerging of Long Term Evaluation (LTE) and Fifth Generation (5G) technology, D2D has gained a lot of attention for communication between closely located mobile devices for offering high speed, energy efficiency, throughput, less delay, and efficient spectrum usage. D2D has changed recent wireless networks with new trends as D2D can play a vital role in sharing resources by load off the network in local areas by direct communication between devices and useful in natural disasters where BS is destroyed. D2D has revolutionized the direct communication as it is a basis for 5G network. D2D allows miniature devices like cell phone, tablets and radio devices to work as Non-Transparent Relays (NTR) where they can provide services as well as forward traffic, request services by direct communication without the need of Base Station (BS) or central network infrastructure. Multi-hop D2D can be used for peer-to-peer communication or even access to cellular networks. This concept of multihop D2D communication has introduced a number of issues and challenges that were not prevalent in traditional current cellular communication. One of the major issues in D2D is security that is required in D2D communication to transmit information securely over non secure channel. The major challenge when considering security is that current established security techniques cannot be modified as security-requiring devices are miniature with restricted processing and storage or are constrained by power and bandwidth issues. Another issue is that how devices can get secure mutual authentication for secure communication. To tackle these issues, a lightweight multifactor authentication scheme that allows multihop secure communication over open channel is designed called as Lightweight ECC based Multifactor Authentication Protocol (LEMAP) in multihop D2D communication. Formal analysis of scheme is performed using well known BAN Logic method which is used to check correctness of protocol. The formal analysis of LEMAP proves that it can mitigate replay attack, Man-in-the-Middle (MITM) attack, Rogue device attack, Denial of Service (DoS) attack, timestamp exploitation attack, impersonation attack and masquerading attack. LEMAP also achieves security requirements confidentiality, integrity, privacy, non-repudiation, secure mutual authentication and anonymity. The communication cost and computational overhead of benchmark protocols and the proposed scheme LEMAP are also calculated. The results show that LEMAP is 6%-28% percent stronger than the selected benchmark algorithms such as 2PAKEP, Chaotic based authentication and TwoFactor authentication protocol. Additionally, LEMAP provides additional security by using trust validation, double hashing, and reduced authentication overhead. Discrete logarithm analysis shows that LEMAP is more secure compared to current security algorithms or current security algos are used as attacks against LEMAP. LEMAP is a lightweight and flexible scheme which can be used in 5G as well as multihop D2D communication to provide secure communication environment.
Keywords: D2D security, multihop D2D security, multi factor, light-weight security, EC