Repository logo
 

Services and applications security in IoT enabled networks

dc.contributor.authorKhumalo, Zephaniah Philanien_US
dc.contributor.authorNleya, Bakheen_US
dc.contributor.authorGomba, Ndadzibaya Masimbaen_US
dc.contributor.authorMutsvangwa, Andrewen_US
dc.date.accessioned2020-10-02T06:18:19Z
dc.date.available2020-10-02T06:18:19Z
dc.date.issued2018-12
dc.date.updated2020-09-25T00:15:49Z
dc.description.abstract5G wireless together with optical backbone networks are expected to be the main pillars of the envisaged next /future generation networking (N/FGN) infrastructures. This is an impetus to practical realization of an IoT network that will support and ensure relatively higher bandwidth as well as enhanced quality of service (QoS) in both access and core network sections. The high-speed wireless links at the network peripherals will serve as a conducive platform for device-to-device (D2D) communication. D2D driven applications and services can only be effective as well as secure assuming the associated machine type communication devices (MTCDs) have been successfully verified and authenticated. Typically, D2D type services and applications involve the interaction of several MTCDs in a group. As such, secure and effective D2D group-based authentication and key agreement (AKA) protocols are necessary. They need to inherently achieve efficacy in maintaining the group key unlink-ability as well as generate minimal signalling overheads that otherwise may lead to network congestion. In this paper we detail a secure and efficient Group AKA (Gr-AKA) protocol for D2D communication. Its performance is compared to that of existing similar protocols and is found to comparably lower both computational as well as signalling overhead requirements. Overall the analysis shows that the Gr-AKA protocol improves performance in terms of fulfilling D2D communication's security requirements.en_US
dc.format.extent7 pen_US
dc.identifier.citationKhumalo, P. et al. 2018. Services and applications security in IoT enabled networks. 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). Presented at: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). doi:10.1109/iconic.2018.8601298en_US
dc.identifier.doi10.1109/iconic.2018.8601298
dc.identifier.isbn9781538664773
dc.identifier.urihttp://hdl.handle.net/10321/3492
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartof2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)en_US
dc.subject5G networken_US
dc.subjectGroup authenticationen_US
dc.subjectDevice-to-device (D2D)en_US
dc.subjectCommunicationen_US
dc.subjectSecurityen_US
dc.subjectPrivacyen_US
dc.titleServices and applications security in IoT enabled networksen_US
dc.typeConferenceen_US

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
untitled.pdf
Size:
2.19 MB
Format:
Adobe Portable Document Format