Faculty of Engineering and Built Environment
Permanent URI for this communityhttp://ir-dev.dut.ac.za/handle/10321/9
Browse
Search Results
Item A review of IoT enabled networks' architecture and access control(Ponte Academic Journal, 2020-01) Bopape, Lebogang P.; Nleya, Bakhe; Chidzonga, Richard F.Current IP and other networks such as Power Smart Grids are fast evolving, thus resulting in diverse connectivity challenges. This has led to the emergence of "the Internet of Things” (IoT) network transforming the legacy networks towards Device-to-Device (D-2-D) communication standards. By 2022, IoT will seamlessly interconnect the globe via intelligent devices and sensors of varying types and in the process large volumes of data will be generated. The resultant network structure will benefit mankind by helping in making complex decisions. In this paper, we overview both IoT enabled network architecture as well as and access and control framework for various services and applications. We commence with a review of a generalized IoT enabled network's security architecture as well as how the various elements constituting them interact. The paper then describes an access control framework applicable to the various would be applications and services.Item A privacy and security preservation framework for D2D communication based smart grid services(IEEE, 2020-04-30) Bopape, Lebogang P.; Nleya, Bakhe; Khumalo, P.Long-Term-Evolution (LTE) based Device-to-Device (D2D) communication in future generation networks are envisaged to become the basis for deployment of various applications and services in Smart Grids (SGs). However related privacy and security aspects are also under serious consideration especially when dealing with large-scale deployment of services and applications related D2D groups. Current and legacy related algorithms cannot be applied directly to this new paradigm shift (i.e D2D communication and group formations). Using the IoT as the pillar communication subsystem for SGs, the service providers can deploy several applications and services some of which may include the acquisition and storage of personal information of individual SG users. However, the challenge will always be in the strict preservation of privacy and security of their personal data and thus a necessity in eliminating such concerns. In this paper we propose a general framework that employs a Group Key Management (GKM) mechanism to ensure enhanced privacy and security especially during the discovery and communication phases. We further mitigate on the impact of enhanced privacy and security in SG services and applications.