92 research outputs found

    Seamless key agreement framework for mobile-sink in IoT based cloud-centric secured public safety sensor networks

    Get PDF
    Recently, the Internet of Things (IoT) has emerged as a significant advancement for Internet and mobile networks with various public safety network applications. An important use of IoT-based solutions is its application in post-disaster management, where the traditional telecommunication systems may be either completely or partially damaged. Since enabling technologies have restricted authentication privileges for mobile users, in this paper, a strategy of mobile-sink is introduced for the extension of user authentication over cloud-based environments. A seamless secure authentication and key agreement (S-SAKA) approach using bilinear pairing and elliptic-curve cryptosystems is presented. It is shown that the proposed S-SAKA approach satisfies the security properties, and as well as being resilient to nodecapture attacks, it also resists significant numbers of other well-known potential attacks related with data confidentiality, mutual authentication, session-key agreement, user anonymity, password guessing, and key impersonation. Moreover, the proposed approach can provide a seamless connectivity through authentication over wireless sensor networks to alleviate the computation and communication cost constraints in the system. In addition, using Burrows–Abadi–Needham logic, it is demonstrated that the proposed S-SAKA framework offers proper mutual authentication and session key agreement between the mobile-sink and the base statio

    Path loss modelling at 60 GHz mmWave based on cognitive 3D ray tracing algorithm in 5G

    Get PDF
    The objective of the study is to consider the foremost high-tech issue of mobile radio propagation i.e. path loss for an outdoor and indoor environment for mmWave in a densely populated area.60 [GHz] mmWave is a win-win for the 5th Generation radio network. Several measurements and simulations are performed using the simulator “Smart Cognitive 3D Ray Tracer” build in MATLAB. Two of the main parameters (pathloss and received signal strength (RSS)) of the radio propagation are obtained in this study. To compute the pathloss and RSS, 5G 3GPP mobile propagation model is selected due to its flexibility of scenario and conditions beyond 6 GHz frequency. For indoor simulations, we again chose 5G 3GPP mobile propagation model. It is evident from the recent previous studies that there is still not enough findings in the ray tracing specially cognitive 3D ray tracing. The suggested alternative cognitive algorithm here deals with less iterations and effective use of resources. The conclusions of this work also comprise that the path loss is reliant on separation distance of base station and receiver. The above mentioned frequency and interconnected distance reported here provide better knowledge of mobile radio channel attributes and can be also used to design and estimate the performance of the future generation (5G) mobile networks

    Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing

    Get PDF
    Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing. At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing. Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers

    Internet of Things for Sustainable Community Development: Introduction and Overview

    Get PDF
    The two-third of the city-dwelling world population by 2050 poses numerous global challenges in the infrastructure and natural resource management domains (e.g., water and food scarcity, increasing global temperatures, and energy issues). The IoT with integrated sensing and communication capabilities has the strong potential for the robust, sustainable, and informed resource management in the urban and rural communities. In this chapter, the vital concepts of sustainable community development are discussed. The IoT and sustainability interactions are explained with emphasis on Sustainable Development Goals (SDGs) and communication technologies. Moreover, IoT opportunities and challenges are discussed in the context of sustainable community development

    Privacy enhancing technologies (PETs) for connected vehicles in smart cities

    Get PDF
    This is an accepted manuscript of an article published by Wiley in Transactions on Emerging Telecommunications Technologies, available online: https://doi.org/10.1002/ett.4173 The accepted version of the publication may differ from the final published version.Many Experts believe that the Internet of Things (IoT) is a new revolution in technology that has brought many benefits for our organizations, businesses, and industries. However, information security and privacy protection are important challenges particularly for smart vehicles in smart cities that have attracted the attention of experts in this domain. Privacy Enhancing Technologies (PETs) endeavor to mitigate the risk of privacy invasions, but the literature lacks a thorough review of the approaches and techniques that support individuals' privacy in the connection between smart vehicles and smart cities. This gap has stimulated us to conduct this research with the main goal of reviewing recent privacy-enhancing technologies, approaches, taxonomy, challenges, and solutions on the application of PETs for smart vehicles in smart cities. The significant aspect of this study originates from the inclusion of data-oriented and process-oriented privacy protection. This research also identifies limitations of existing PETs, complementary technologies, and potential research directions.Published onlin

    Quantifying uncertainty in internet of medical things and big-data services using intelligence and deep learning

    No full text
    In the cloud-based Internet of Things (IoT) environments, quantifying uncertainty is an important element input to keep the acceptable level of reliability in various configurations. In this paper, we aim to address the pricing model of delivering data over the cloud while taking into consideration the dynamic uncertainty factors such as network topology, transmission/reception energy, nodal charge and power, and computation capacity. These uncertainty factors are mapped to different nodes with varying capabilities to be processed using Artificial Intelligence (AI)-based algorithms. Accordingly, we aim to find a way to calculate and predict the price per big data service over the cloud using AI and deep learning. Therefore, in this paper, we propose a framework to address big data delivery issues in cloud-based IoT environments by considering uncertainty factors. We compare the performance of the framework using two AI-based techniques called Genetic Algorithm (GA) and Simulated Annealing Algorithm (SAA) in both centralized and distributed versions. The use of AI techniques can be applied in multilevel to provide a kind of deep learning to further improve the performance of the system under study. The results reveal that the distributed algorithm outperforms the centralized one. In addition, the results show that the GA has lower running time compared to the SAA in all the test cases such as 68% of improvement in the centralized version, and 66% of improvement in the distributed version in case when the size of uncertainty array is 256. Moreover, when the size of uncertainty array increases, the results show 60% speed up in the distributed GA compared to its centralized version. The improvements achieved would help the service providers to actually improve their profit using the proposed framework
    corecore