Faculty of Engineering and Built Environment
Permanent URI for this communityhttp://ir-dev.dut.ac.za/handle/10321/9
Browse
3 results
Search Results
Item A mutual lightweight authentication scheme for fog-cloud-based e-health services(Turkish Online Journal of Qualitative Inquiry (TOJQI), 2021-12-30) Nleya, BakheThe new version Internet network, now referred to as the Internet of Things (IoT) facilitates interconnectivity among various objects and devices. The introduction of both Cloud and Fog computing paradigms, device device-to-device (D2D) communication standards, as well as enabling privacy and security approaches, have all contributed to the practical realization of E-health services in IoT-enabled networks. Gen-erally, Fog layer nodes are often located in public places, where they are easily accessible and thus vulnerable to various securi-ty threats. Should this occur, the current and previously gener-ated security keys, as well as device identities, must be kept secret thus ensuring anonymity, unlinkability, forward secrecy, e.t.c. Thus in this paper, we introduce an E-Health authenti-cation and security architecture for the D2D-Aided fog compu-ting model, that facilitates verification of key components such as patients and peripheral devices without involving a central-ized cloud server. This is followed by a proposal for a light-weight anonymous authentication protocol (LAAP) to carry out authentication of the various parties in an E-health system. The proposed protocol is evaluated for various scenarios in D2D-Aided fog computing. Lightweight crypto- graphic primi-tives such as exclusive-or operations and one-way hash func-tion are relied upon to facilitate the inclusion of resource-constrained end-user devices mostly incorporated in body area networks (BANs). Ultimately we carry out an evaluation of the proposed proposal in terms of its efficacy, and security. The proposed protocol is generally found to be practically feasible for implementation in E-health service infrastructures.Item A mutual authentication protocol for telecare services in an IoT network(Auricle Technologies, Pvt., Ltd., 2021-05-05) Nleya, BakheThe emergence of Internet of Things (IoT), Cloud computing as well as the introducing of device to device communication for devices in proximity has resulted in the emerging of new innovative services such as Tele-care in the health sector. However, issues such as privacy and security associated with such a service (Tele-care) are a challenge as most of the associated devices are resource constrained in terms of both operational power and computing capability requirements. As such it becomes problematic to implement any traditional as well as current privacy and security measures. Thus, in this paper, we mitigate on a framework to that will ensure a robust privacy as well as security for a Tele-care service. Notably our focus is in ensuring computational simplicity, privacy preservation as well as energy efficiency. Overall analysis shows that the proposed protocol has improved performance in comparison with existing ones.Item A privacy and security preservation framework for D2D communication based smart grid services(IEEE, 2020-04-30) Bopape, Lebogang P.; Nleya, Bakhe; Khumalo, P.Long-Term-Evolution (LTE) based Device-to-Device (D2D) communication in future generation networks are envisaged to become the basis for deployment of various applications and services in Smart Grids (SGs). However related privacy and security aspects are also under serious consideration especially when dealing with large-scale deployment of services and applications related D2D groups. Current and legacy related algorithms cannot be applied directly to this new paradigm shift (i.e D2D communication and group formations). Using the IoT as the pillar communication subsystem for SGs, the service providers can deploy several applications and services some of which may include the acquisition and storage of personal information of individual SG users. However, the challenge will always be in the strict preservation of privacy and security of their personal data and thus a necessity in eliminating such concerns. In this paper we propose a general framework that employs a Group Key Management (GKM) mechanism to ensure enhanced privacy and security especially during the discovery and communication phases. We further mitigate on the impact of enhanced privacy and security in SG services and applications.