256,692 research outputs found
Secure Association for the Internet of Things
Existing standards (ZigBee and Bluetooth Low Energy) for networked low-power wireless devices do not support secure association (or pairing) of new devices into a network: their association process is vulnerable to man-in-the-middle attacks. This paper addresses three essential aspects in attaining secure association for such devices.
First, we define a user-interface primitive, oblivious comparison, that allows users to approve authentic associations and abort compromised ones. This distills and generalizes several existing approve/abort mechanisms, and moreover we experimentally show that OC can be implemented using very little hardware: one LED and one switch.
Second, we provide a new Message Recognition Protocol (MRP) that allows devices associated using oblivious comparison to exchange authenticated messages without the use of public-key cryptography (which exceeds the capabilities of many IoT devices). This protocol improves upon previously proposed MRPs in several respects.
Third, we propose a robust definition of security for MRPs that is based on universal composability, and show that our MRP satisfies this definition
Strategic Deployment of Swarm of UAVs for Secure IoT Networks
Security provisioning for low-complex and constrained devices in the Internet
of Things (IoT) is exacerbating the concerns for the design of future wireless
networks. To unveil the full potential of the sixth generation (6G), it is
becoming even more evident that security measurements should be considered at
all layers of the network. This work aims to contribute in this direction by
investigating the employment of unmanned aerial vehicles (UAVs) for providing
secure transmissions in ground IoT networks. Toward this purpose, it is
considered that a set of UAVs acting as aerial base stations provide secure
connectivity between the network and multiple ground nodes. Then, the
association of IoT nodes, the 3D positioning of the UAVs and the power
allocation of the UAVs are obtained by leveraging game theoretic and convex
optimization-based tools with the goal of improving the secrecy of the system.
It is shown that the proposed framework obtains better and more efficient
secrecy performance over an IoT network than state-of-the-art greedy algorithms
for positioning and association
An Analysis and Enumeration of the Blockchain and Future Implications
The blockchain is a relatively new technology that has grown in interest and potential research since its inception. Blockchain technology is dominated by cryptocurrency in terms of usage. Research conducted in the past few years, however, reveals blockchain has the potential to revolutionize several different industries. The blockchain consists of three major technologies: a peer-to-peer network, a distributed database, and asymmetrically encrypted transactions. The peer-to-peer network enables a decentralized, consensus-based network structure where various nodes contribute to the overall network performance. A distributed database adds additional security and immutability to the network. The process of cryptographically securing individual transactions forms a core service of the blockchain and enables semi-anonymous user network presence
- …