9 research outputs found
Topology Reconstruction via Path Recording in Secure MANET
Abstract—The exchange of topology information is a poten-tial attack target in mobile ad-hoc networks. To provide an intrinsic security mechanism, it is possible to validate topology advertisements in the control plane against records of the path taken by transmission in the data plane. In this context, we provide a discussion of different path recording mechanisms. We evaluate their performance in terms of packet overhead and reconstruction complexity. I
Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring
A new method for assigning appropriate labels to create a 28 Standard Android Botnet Dataset (28-SABD)
Internet of things: the concept, inherent security challenges and recommended solutions
The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication
system which is seamless yet effective in the highly heterogeneous and resource-constrained network. The core philosophy of the proposed research work is that existing cryptographic modelling will be required to be scaled down for its complexities
by investigating the actual communication problems in security protocols between sensor nodes, Internet host, data centres, cloud clusters, virtual machines, etc. The inclusion of more operational actions while modelling security protocols is
highly prioritised in the proposed research work. In this paper, the prime emphasis is (i) to establish secure pipelining using novel public-key cryptography between the sensor network and Internet host, (ii) a robust authentication scheme considering
both local and global IoT to offer better secure pervasiveness in its applications, and (iii) to apply optimisation towards key management techniques
