5,955 research outputs found
Blockchain security for 5G network using Internet of Things devices
Network of vehicles using Internet of Things
(IoT) frameworks have efficient characteristics of modern
intelligent transportation system with a few challenges in
vehicular ad-hoc networks (VANETs). However, its security
framework is required to manage trust management by
preserving user privacy. Wireless mobile communication (5G)
system is regarded as an outstanding technology that provide
ultra-reliable with limited latency wireless communication
services. By extension, integrating Software Defined Network
(SDN) with 5G-VANET enhances global information gathering
and network control. Therefore, real-time IoT application for
monitoring transport services is efficiently supported. These
ensures vehicular security on this framework. This paper
provides a technical solution to a self-confidential framework
for a smart transport system. This process exploiting IoT for
vehicle communication by incorporating SDN and 5G
technology. Due to some features of blockchain, this
framework has been implemented to provide various
alternative support for vehicular smart services. This involves
real-time access to cloud to stream video information and
protection management to vehicular network. The
implemented framework presents a promising technique and
reliable vehicular IoT environment while ensuring user
privacy. Results of simulation presents that vehicular
nodes/messages (malicious) and overhead is detected and the
impact on network performance are satisfactory when
deployed in large-scale network scenarios
Recommended from our members
Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain
Unmanned aerial vehicles (UAVs) can support surveillance even in areas without network infrastructure. However, UAV networks raise security challenges because of its dynamic topology. This paper proposes a technique for maintaining security in UAV networks in the context of surveillance, by corroborating information about events from different sources. In this way, UAV networks can conform peer-to-peer information inspired by the principles of blockchain, and detect compromised UAVs based on trust policies. The proposed technique uses a secure asymmetric encryption with a pre-shared list of official UAVs. Using this technique, the wrong information can be detected when an official UAV is physically hijacked. The novel agent based simulator ABS-SecurityUAV is used to validate the proposed approach. In our experiments, around 90% of UAVs were able to corroborate information about a person walking in a controlled area, while none of the UAVs corroborated fake information coming from a hijacked UAV
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
- …