Filters








27,488 Hits in 9.2 sec

A Survey of Internet of Things (IoT) Authentication Schemes

Mohammed El-hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni
2019 Sensors  
The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other.  ...  This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature.  ...  In [97] , the authors proposed a new model for authentication in VANETs based on group authentication. Vehicles are grouped and a session key is generated to be used for V2V communication.  ... 
doi:10.3390/s19051141 fatcat:sc6et2p5vneyvietpdr4gr4ena

Secure machine-type communications in LTE networks

Chengzhe Lai, Rongxing Lu, Hui Li, Dong Zheng, Xuemin Sherman Shen
2015 Wireless Communications and Mobile Computing  
To address this problem, we propose an end-to-end security scheme for MTC based on the proxy-signature technique, called E 2 SEC.  ...  MTC is standardized by the 3rd Generation Partnership Project (3GPP), which has been regarded as the promising solution facilitating machine-to-machine communications.  ...  In this paper, we focus on building more secure machine-type communications in LTE networks by designing a unified end-to-end security scheme, called E 2 SEC.  ... 
doi:10.1002/wcm.2612 fatcat:jsp652qhangwxlowtud4lvruvq

Recent Security Trends in Internet of Things: a Comprehensive Survey

Yasmine Harbi, Zibouda Aliouat, Allaoua Refoufi, Saad Harous
2021 IEEE Access  
The end-devices can communicate to one or more gateways using ALOHA scheme through one-hop links.  ...  Table 15 compares the IoT security schemes based on machine learning algorithms.  ... 
doi:10.1109/access.2021.3103725 fatcat:elfjfrhtnjfvhjp5jqtkj7r7gy

An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application

You-Boo Jeon, Keun-Ho Lee, Doo-Soon Park, Chang-Sung Jeong
2013 International Journal of Distributed Sensor Networks  
In this paper, we proposed cluster authentication scheme that mutually authenticates between vehicles by composing vehicle movement as cluster configuration architecture.  ...  Thus, in near future, advanced wireless and mobile sensor network in M2M application will be major key factor of the future generation convergence network which is based on the state of the application  ...  As scheme and protocol establishes authentication based on a trusted layer, it guarantees end-toend security.  ... 
doi:10.1155/2013/219396 fatcat:suboawrucne7xepwytrokihpxm

Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey

Soo Fun Tan, Azman Samsudin
2021 Sensors  
We classify IIoT technologies into the four-layer security architecture, examine the deployed countermeasure based on CIA+ security requirements, report the deficiencies of today's countermeasure, and  ...  The studies gave a general overview of IIoT security threats or a detailed analysis that explicitly focuses on specific technologies.  ...  Acknowledgments: This research was supported by the Malaysia Fundamental Research Grant Scheme-FRG0530-2020 and Universiti Malaysia Sabah Research Grant-SDK0165-2020.  ... 
doi:10.3390/s21196647 pmid:34640967 fatcat:ppydbddbjfgmrdix3diq2axizy

Security in Low Powered Wide Area Networks: Opportunities for Software Defined Network-Supported Solutions

Gaurav Pathak, Jairo Gutierrez, Saeed Ur Rehman
2020 Electronics  
In addition, the emergence of software defined network (SDN) architecture for security in IoT is explained based on literature.  ...  The reviewed literature is then compared based on various network security measures addressed by them.  ...  A Dual Key-Based Activation Scheme for Secure LoRaWAN [60] Secure joining procedure for LoRa nodes. --Different keys are loaded to generate network and application session key.  ... 
doi:10.3390/electronics9081195 fatcat:ypnliknpobgwje3rilw7k5czqi

A Secure Model for Machine to Machine Device Domain Based Group in a Smart City Architecture

Mariya Ouaissa, Ecole Nationale Supérieure des Arts et Métiers Moulay-Ismail University, Abdallah Rhattoy, Moulay-Ismail University
2019 International Journal of Intelligent Engineering and Systems  
The distributed architecture of IoT aims at providing location awareness and low-latency interactions to Machine-to-Machine (M2M) applications.  ...  authentication means, so that devices can benefit from high security functionalities without however having to execute computationally intensive operations with a low communication complexity.  ...  The back-end On-the-Fly-Model-Checker (OFMC) and CL−based Attack Searcher (CL-AtSe) will be used to verify that the proposed scheme maintains its security objectives even under various attacks.  ... 
doi:10.22266/ijies2019.0228.16 fatcat:6jd4fxj6hfanlnzddhcu55lhti

ML-Based 5G Network Slicing Security: A Comprehensive Survey

Ramraj Dangi, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra, Praveen Lalwani
2022 Future Internet  
There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broadband (eMBB), massive machine type communication (eMTC), and ultra-reliable  ...  Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services.  ...  It also provides ultra-low-cost machine to machine (M2M) communication. URLLC stands for Ultra-Reliable Low Latency Communication.  ... 
doi:10.3390/fi14040116 fatcat:pe3niis5hfeohe62rj2gldh74q

Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh
2019 Zenodo  
Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators.  ...  In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly.  ...  In [12] , end to end architecture for mutual authentication based on Datagram Transport Layer Security (DTLS) was suggested.  ... 
doi:10.5281/zenodo.2576974 fatcat:22fvqtcfwrchhlmic7vrqrknz4

Analysis of Security methods in Internet of Things

Saranya C
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated  ...  Internet of Things (IoT) is a new revolution for the internet. IoT is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service.  ...  The proposed architecture provides secure and authenticated communication in static machine-to-machine (M2M) networks and in small embedded systems by using Internet of Things (IOT) [1] .  ... 
doi:10.17762/ijritcc2321-8169.150446 fatcat:cx7woa2b7jhwjgl2gxofbv5j7i

PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications

Pawani Porambage, Corinna Schmitt, Pardeep Kumar, Andrei Gurtov, Mika Ylianttila
2014 International Journal of Distributed Sensor Networks  
The established authentication scheme PAuthKey is based on implicit certificates and it provides application level end-to-end security.  ...  In order to maintain the trustworthy connectivity and the accessibility of distributed IoT, it is important to establish secure links for end-to-end communication with a strong pervasive authentication  ...  Acknowledgments This work has been supported by Tekes under Massive Scale Machine-to-Machine Service (MAMMotH) project and Academy of Finland project SEMOHealth.  ... 
doi:10.1155/2014/357430 fatcat:aslpvd3i6nczvpgymk27v5hqg4

A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks

Mariya Ouaissa, A. Rhattoy
2018 International Journal of Electrical and Computer Engineering (IJECE)  
Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention.  ...  Experimental results show that the proposed scheme can achieve robust security and avoid signaling overload on LTE networks.  ...  wih New Scheme of Group-based AKA for Machine Type Communication over LTE ….  ... 
doi:10.11591/ijece.v8i2.pp1169-1181 fatcat:dq2nmhumvrhixketcztf7pyiha

Identifying and Isolating Zombie Attack in Cloud Computing

Peter Awon-natemi Agbedemnab, Salifu Abdul-Mumin, Zakaria Abdulrahim
2020 Asian Journal of Research in Computer Science  
In this paper, a technique based on strong authentication which, is able to detect malicious users from a network and isolates them from the cloud architecture is proposed.  ...  With zombie attack, some malicious users may join the network which, in turn takes off the data of legitimate users and at the same time enable zombie nodes to communicate with a virtual machine on behalf  ...  The previous mutual authentication such as plain password, and various existing schemes such as user authentication, time bound base scheme, mutual authentication scheme based on new ticket by using smart  ... 
doi:10.9734/ajrcos/2020/v6i230157 fatcat:a5woo7y7zjdwng22hiy73kcoee

Securing a Telecom Services Using Quantum Cryptographic Mechanisms [chapter]

Abdallah Handoura
2012 Applied Cryptography and Network Security  
Therefore, the services of security provides for the current network will not be sufficient for IN, the goal is more long.  ...  the services that allow user groups to communicate by the public transmission and to change the equipment without unloading their intimacy and affluence of employment.  ...  Therefore, the SIP authentication is applied only to the communications end-to-end or end-to-proxy; the authentication proxy-by-proxy would have to count on others mechanisms as IPsec or TLS.  ... 
doi:10.5772/33977 fatcat:skgwxpoyl5c63o334yyb7git7m

An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT

Adriano Witkovski, Altair Santin, Vilmar Abreu, Joao Marynowski
2015 2015 IEEE Global Communications Conference (GLOBECOM)  
The proposal interact two key-based scheme, one for Internet and another for IoT to reach integration between both contexts.  ...  Internet of Things (IoT) brings significant challenges to authentication schemes in a scenario with several appliances for a smart house that should be accessed by a technician for maintenance tasks, for  ...  João Marynowski wishes to thanks the Coordination for the Improvement of Higher Level Personnel (CAPES) for the scholarship granting.  ... 
doi:10.1109/glocom.2015.7417597 fatcat:4gh37uplz5bz7dgzcij4l43wny
« Previous Showing results 1 — 15 out of 27,488 results