7 research outputs found

    Tactical approach to identify and quarantine spurious node participation request in sensory application

    Get PDF
    Securing Wireless Sensor Network (WSN) from variable forms of adversary is still an open end challenge. Review of diversified security apprroaches towards such problems that they are highly symptomatic with respect to resiliency strength against attack. Therefore, the proposed system highlights a novel and effective solution that is capable of identify the spurios request for participating in teh network building process from attacker and in return could deviate the route of attacker to some virtual nodes and links. A simple trust based mechanism is constructed for validating the legitimacy of such request generated from adversary node. The proposed system not only presents a security solution but also assists in enhancing the routing process significantly. The simulated outcome of the study shows that proposed system offers significantly good energy conservation, satisfactory data forwarding performance, reduced processing time in contrast to existing standard security practices

    A solution to smart health and state of art

    Get PDF
    A medical cyber–physical system (MCPS) is a unique cyber–physical system (CPS), which combines embedded software control devices, networking capabilities, and complex physiological dynamics of patients in the modern medical field. In the process of communication, device, and information system interaction of MCPS, medical cyber–physical data are generated digitally, stored electronically, and accessed remotely by medical staff or patients. With the advent of the era of medical big data, a large amount of medical cyber–physical data is collected, and its sharing provides great value for diagnosis, pathological analysis, epidemic tracking, pharmaceutical, insurance, and so on. This overview will present MCPS’s architectures and frameworks from different perspectives, modeling and verification methods, identification and sign sensing technologies, key communications’ technologies, data storage and analysis technologies, monitoring systems, data security and privacy protection technologies, and key research perspectives and directions. We can have a com- prehensive understanding of the important characteristics and technical route of MCPS, and grasp its research status and progress

    Optimized Load Centroid and Rabin Onion Secured Routing in Wireless Sensor Network for IoT

    Get PDF
    Advances in wireless communication have geared up extensive insights wherein the sensors can themselves communicate with other sensors that form significant parts of the Internet of Things (IoT). However, the large-scale acceptance of WSN for IoT is still surfacing threats and controversies that apprehend the security aspects. There are a lot of attacks that can manipulate the routein WSN for IoT. In this work, an Optimized Load Centroid and Rabin Onion Routing (OLC-ROR) method are designed to improve the throughput rate with minimum routing overhead and latency. The proposed method is based on a Centroid and Rabin Signature, a Digital Signature technique. First, the optimal route is identified by considering both the load and residual energy using Load Centroid function. Then onion routing is used for selecting secured route amongst the optimality. Besides, the node genuineness is checked by applying the Rabin Signature

    Optimized Load Centroid and Rabin Onion Secured Routing in Wireless Sensor Network for IoT

    Get PDF
    Advances in wireless communication have geared up extensive insights wherein the sensors can themselves communicate with other sensors that form significant parts of the Internet of Things (IoT). However, the large-scale acceptance of WSN for IoT is still surfacing threats and controversies that apprehend the security aspects. There are a lot of attacks that can manipulate the routein WSN for IoT. In this work, an Optimized Load Centroid and Rabin Onion Routing (OLC-ROR) method are designed to improve the throughput rate with minimum routing overhead and latency. The proposed method is based on a Centroid and Rabin Signature, a Digital Signature technique. First, the optimal route is identified by considering both the load and residual energy using Load Centroid function. Then onion routing is used for selecting secured route amongst the optimality. Besides, the node genuineness is checked by applying the Rabin Signature

    Security in 5G-Enabled Internet of Things Communication: Issues: Challenges, and Future Research Roadmap

    Get PDF
    5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and surveillance and many more. These applications help and assist the routine works of the community. In such communication environment, all the devices and users communicate through the Internet. Therefore, this communication agonizes from different types of security and privacy issues. It is also vulnerable to different types of possible attacks (for example, replay, impersonation, password reckoning, physical device stealing, session key computation, privileged-insider, malware, man-in-the-middle, malicious routing, and so on). It is then very crucial to protect the infrastructure of 5G-enabled IoT communication environment against these attacks. This necessitates the researchers working in this domain to propose various types of security protocols under different types of categories, like key management, user authentication/device authentication, access control/user access control and intrusion detection. In this survey paper, the details of various system models (i.e., network model and threat model) required for 5G-enabled IoT communication environment are provided. The details of security requirements and attacks possible in this communication environment are further added. The different types of security protocols are also provided. The analysis and comparison of the existing security protocols in 5G-enabled IoT communication environment are conducted. Some of the future research challenges and directions in the security of 5G-enabled IoT environment are displayed. The motivation of this work is to bring the details of different types of security protocols in 5G-enabled IoT under one roof so that the future researchers will be benefited with the conducted work

    5G και IoT και σύγχρονες εφαρμογές

    Get PDF
    Η παρούσα εργασία ασχολείται με το ΙοΤ με δυνατότητα 5G. Αρχικά στην εργασία γίνεται αναφορά στην ιστορική εξέλιξη του 5G. Ακολουθεί αναφορά στην τεχνολογία 5G, όπου αναφέρονται τα χαρακτηριστικά του 5G, τα οφέλη της τεχνολογίας 5G και παρουσιάζονται αναλυτικά οι τεχνολογίες για αλληλεπίδραση με ΙοΤ. Επίσης, γίνεται περιγραφή της τεχνολογίας ΙοΤ, όπου αποτυπώνονται οι προκλήσεις και τα χαρακτηριστικά του ΙοΤ, οι τεχνολογίες IoT και οι τεχνολογίες για αλληλεπίδραση με 5G. Ακολουθεί εκτενής αναφορά στην αρχιτεκτονική του συστήματος 5G - IoT, καθώς και στις απαιτήσεις ασφαλείας και τις πιθανές επιθέσεις σε επικοινωνία IoT με δυνατότητα. Στη συνέχεια, αναφέρονται τα υπάρχοντα πρωτόκολλα ασφαλείας σε περιβάλλον επικοινωνιών IoT με δυνατότητα 5G. Η εργασία ολοκληρώνεται με αναφορά στο υφιστάμενο εμπορικό πλαίσιο του 5G στην παγκόσμια βιομηχανία, αλλά και με ιδιαίτερη αναφορά στις μελλοντικές προκλήσεις της τεχνολογίας που μελετήθηκε.The present work deals with IoT with 5G capability. Initially, the work refers to the historical development of 5G. The following is a reference to 5G technology, which mentions the features of 5G, the benefits of 5G technology and presents in detail the technologies for interaction with IoT. It also describes IoT technology, which captures the challenges and features of IoT, IoT technologies and technologies for 5G interaction. The following is an extensive reference to the 5G - IoT system architecture, as well as security requirements and possible attacks on IoT communication capabilities. The following is a list of existing security protocols in a 5G IoT communication environment. The work concludes with a reference to the current commercial context of 5G in the global industry, but also with a special reference to the future challenges of the technology studied

    Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    No full text
    Nowadays wireless sensor network (WSN) is increasingly being used in the Internet of Things (IoT) for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC) environment to communicate with a sensor node in an identity-based cryptography (IBC) environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS) that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT
    corecore