Repository logo
 

Faculty of Engineering and Built Environment

Permanent URI for this communityhttp://ir-dev.dut.ac.za/handle/10321/9

Browse

Search Results

Now showing 1 - 5 of 5
  • Thumbnail Image
    Item
    Privacy and security for applications and services in future generation smart grids
    (2022-05-13) Khumalo, Zephania Philani; Nleya, B.
    Growing energy demands together with the urge to supply available power in a reliable, as well as efficient manner, has led to the gradual upgrading and modernizing of existing power grid systems into Smart Grids (SGs) by way of incorporating supporting information and communication technology (ICT) subsystems. The latter facilities the two-way flow of both energy (power) and information related to the grid's performance, as well as the end user's requirements. Notably, the ICT subsystem enables key entities such as generation, distribution, transmission, and end-user subsystems to interrelated in real-time, and in the process, this achieving a well reliable, robust as well as efficiently managed SG system. The interactions of the various entities constituting the grid result in the emergence of various services and applications exchanging data throughout the interconnected systems. Whereas the SG is quite efficient in rendering its services, it, however, is exposed to various cyber security threats by adversaries. Notably, security threats vary depending on the applications. On the user end networks, the mandatory aggregation of power consumption as well as exchange of power consumption-related information on individual household area networks (HANs) or among HANs and utility's control canter (CC) can result in adversaries tempering with the processes. In particular key security concerns being that during these operations, individuals' privacy, as well as aggregated data integrity, can be compromised as a result of attacks. The resource-constrained nature of associated devices, objects, and elements of the SG at the user side networks and in the SG core, in general, brings about challenges in implementing robust security measures that inevitably involve the performing of complex crypto-operations.
  • Thumbnail Image
    Item
    A mutual lightweight authentication scheme for fog-cloud-based e-health services
    (Turkish Online Journal of Qualitative Inquiry (TOJQI), 2021-12-30) Nleya, Bakhe
    The new version Internet network, now referred to as the Internet of Things (IoT) facilitates interconnectivity among various objects and devices. The introduction of both Cloud and Fog computing paradigms, device device-to-device (D2D) communication standards, as well as enabling privacy and security approaches, have all contributed to the practical realization of E-health services in IoT-enabled networks. Gen-erally, Fog layer nodes are often located in public places, where they are easily accessible and thus vulnerable to various securi-ty threats. Should this occur, the current and previously gener-ated security keys, as well as device identities, must be kept secret thus ensuring anonymity, unlinkability, forward secrecy, e.t.c. Thus in this paper, we introduce an E-Health authenti-cation and security architecture for the D2D-Aided fog compu-ting model, that facilitates verification of key components such as patients and peripheral devices without involving a central-ized cloud server. This is followed by a proposal for a light-weight anonymous authentication protocol (LAAP) to carry out authentication of the various parties in an E-health system. The proposed protocol is evaluated for various scenarios in D2D-Aided fog computing. Lightweight crypto- graphic primi-tives such as exclusive-or operations and one-way hash func-tion are relied upon to facilitate the inclusion of resource-constrained end-user devices mostly incorporated in body area networks (BANs). Ultimately we carry out an evaluation of the proposed proposal in terms of its efficacy, and security. The proposed protocol is generally found to be practically feasible for implementation in E-health service infrastructures.
  • Thumbnail Image
    Item
    A mutual authentication protocol for telecare services in an IoT network
    (Auricle Technologies, Pvt., Ltd., 2021-05-05) Nleya, Bakhe
    The emergence of Internet of Things (IoT), Cloud computing as well as the introducing of   device to device communication for devices in proximity has resulted in the emerging of new innovative services such as Tele-care in the health sector.  However, issues such as privacy and security associated with such a service (Tele-care) are a challenge as most of the associated devices are resource constrained in terms of both operational power and computing capability requirements. As such it becomes problematic to implement any traditional as well as current privacy and security measures.  Thus, in this paper, we mitigate on a framework to that will ensure a robust privacy as well as security for a Tele-care service. Notably our focus is in ensuring computational simplicity, privacy preservation as well as energy efficiency. Overall analysis shows that the proposed protocol has improved performance in comparison with existing ones.
  • Thumbnail Image
    Item
    Services and applications security in IoT enabled networks
    (IEEE, 2018-12) Khumalo, Zephaniah Philani; Nleya, Bakhe; Gomba, Ndadzibaya Masimba; Mutsvangwa, Andrew
    5G wireless together with optical backbone networks are expected to be the main pillars of the envisaged next /future generation networking (N/FGN) infrastructures. This is an impetus to practical realization of an IoT network that will support and ensure relatively higher bandwidth as well as enhanced quality of service (QoS) in both access and core network sections. The high-speed wireless links at the network peripherals will serve as a conducive platform for device-to-device (D2D) communication. D2D driven applications and services can only be effective as well as secure assuming the associated machine type communication devices (MTCDs) have been successfully verified and authenticated. Typically, D2D type services and applications involve the interaction of several MTCDs in a group. As such, secure and effective D2D group-based authentication and key agreement (AKA) protocols are necessary. They need to inherently achieve efficacy in maintaining the group key unlink-ability as well as generate minimal signalling overheads that otherwise may lead to network congestion. In this paper we detail a secure and efficient Group AKA (Gr-AKA) protocol for D2D communication. Its performance is compared to that of existing similar protocols and is found to comparably lower both computational as well as signalling overhead requirements. Overall the analysis shows that the Gr-AKA protocol improves performance in terms of fulfilling D2D communication's security requirements.
  • Thumbnail Image
    Item
    A privacy and security preservation framework for D2D communication based smart grid services
    (IEEE, 2020-04-30) Bopape, Lebogang P.; Nleya, Bakhe; Khumalo, P.
    Long-Term-Evolution (LTE) based Device-to-Device (D2D) communication in future generation networks are envisaged to become the basis for deployment of various applications and services in Smart Grids (SGs). However related privacy and security aspects are also under serious consideration especially when dealing with large-scale deployment of services and applications related D2D groups. Current and legacy related algorithms cannot be applied directly to this new paradigm shift (i.e D2D communication and group formations). Using the IoT as the pillar communication subsystem for SGs, the service providers can deploy several applications and services some of which may include the acquisition and storage of personal information of individual SG users. However, the challenge will always be in the strict preservation of privacy and security of their personal data and thus a necessity in eliminating such concerns. In this paper we propose a general framework that employs a Group Key Management (GKM) mechanism to ensure enhanced privacy and security especially during the discovery and communication phases. We further mitigate on the impact of enhanced privacy and security in SG services and applications.