249,542 research outputs found

    Managed ecosystems of networked objects

    Get PDF
    Small embedded devices such as sensors and actuators will become the cornerstone of the Future Internet. To this end, generic, open and secure communication and service platforms are needed in order to be able to exploit the new business opportunities these devices bring. In this paper, we evaluate the current efforts to integrate sensors and actuators into the Internet and identify the limitations at the level of cooperation of these Internet-connected objects and the possible intelligence at the end points. As a solution, we propose the concept of Managed Ecosystem of Networked Objects, which aims to create a smart network architecture for groups of Internet-connected objects by combining network virtualization and clean-slate end-to-end protocol design. The concept maps to many real-life scenarios and should empower application developers to use sensor data in an easy and natural way. At the same time, the concept introduces many new challenging research problems, but their realization could offer a meaningful contribution to the realization of the Internet of Things

    Authentication protocol for an IoT-enabled LTE networks

    Get PDF
    The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol of the long-term evolution (LTE) network does not support Internet of Things (IoT) objects and has several security limitations, including transmission of the object’s (user/device) identity and key set identifier in plaintext over the network, synchronization, large overhead, limited identity privacy, and security attack vulnerabilities. In this article, we propose a new secure and efficient AKA protocol for the LTE network that supports secure and efficient communications among various IoT devices as well as among the users. Analysis shows that our protocol is secure, efficient, and privacy preserved, and reduces bandwidth consumption during authentication

    Artificial Metrics of Electric Devices and Their Applications

    Get PDF
    An Identification of artificial objects is lately receiving much attention for two reasons: the problem of counterfeiting of artificial objects, such as goods that use brand names, in international trade and the necessity of achieving a secure communication in the Internet of Things (IoT), which is a network of artificial objects that are embedded with network connectivity. To identify artificial objects, “fingerprints” of artificial objects, introduced during manufacturing and non-separable characteristics from artificial objects themselves, have to be discovered. This article reports fingerprints for acceleration sensors, flash memory, non-Foster matching circuits and elemental techniques for identifying fingerprints or measuring fingerprints with stability. This article demonstrates an encoding method for recording fingerprints securely in a distributed storage system

    Securing Marine Data Networks in an IoT Environment

    Get PDF
    With the huge proliferation of sensory applications, the Internet of Things (IoT) is promising connectivity capacity far beyond the conventional computing platforms, with an ultimate goal of connecting all everyday objects. Sensory applications in the marine environment are foreseen to be an integral part of this connected world, forming the Internet of Marine Things (IoMaT). While some efforts that aim to establish network connectivity in such a sparse environment exist, securing these networks is still an unreached goal. This paper introduces a secure Mobile Ad-hoc/Delay Tolerant routing protocol (S-MADNET) for the marine environment over VHF equipment available on the majority of ships. The proposed secure network is designed to use the existing Automatic Identification System (AIS) that ships use for positioning and navigation aid. An IoMaT routing module that forwards marine sensory data using the proposed secure protocol is also presented, taking the AIS system level considerations into account. Furthermore, a new AIS message format with IoMaT support is proposed that accommodates the requirements of the secure routing protocol. Evaluation results show that the proposed S-MADNET routing protocol outperforms its counterparts in terms of packet delivery rates and packet duplication rates, while maintaining data security
    corecore