Article
Computer Science, Software Engineering
Siddharth Katyal, Shashank Gupta, Oshin Rawlley, Debjani Ghosh
Summary: The Internet of Vehicles (IoV) poses challenges to privacy and security. This article proposes a three-factor authentication system based on CROPUF to secure transmissions and protect against physical intervention.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2023)
Article
Chemistry, Analytical
Kavita Bhatia, Santosh K. Pandey, Vivek K. Singh, Deena Nath Gupta
Summary: This paper proposes a privacy-preserving authentication protocol that combines the mechanisms of hashing and PUF in a simplified manner, overcoming the complexity of existing solutions and providing more security properties and performance.
Article
Engineering, Civil
Akhtar Badshah, Muhammad Waqas, Fazal Muhammad, Ghulam Abbas, Ziaul Haq Abbas, Shehzad Ashraf Chaudhry, Sheng Chen
Summary: This study proposes an anonymous authenticated key exchange mechanism (AAKE-BIVT) for the smart transportation Internet of Vehicles (IoVs) supported by blockchain. AAKE-BIVT securely transmits traffic information and generates transactions through mutual authentication and key agreement. The study reveals that AAKE-BIVT is resistant to security attacks and outperforms existing techniques in terms of security, functionality, communication, and computation.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Chemistry, Analytical
Yohan Park, Daeun Ryu, Deokkyu Kwon, Youngho Park
Summary: Internet of Drones (IoD) is a specific application of the Internet of Things (IoT) that aims to coordinate access and services of unmanned aerial vehicles (UAVs). However, IoD faces privacy and security issues such as compromised data security, stolen device data extraction, and drone capture attacks. Therefore, the development of a secure and lightweight authentication scheme is crucial to address these vulnerabilities.
Article
Computer Science, Hardware & Architecture
Xiangwei Meng, Jianbo Xu, Wei Liang, Zisang Xu, Kuan-Ching Li
Summary: This paper discusses the application of IoT technology in transportation to form the Internet of Vehicles system. It proposes a scheme using blockchain technology for lightweight anonymous mutual authentication and key agreement, which is proven through formal verification and simulation, and has advantages in lightweight characteristics compared to other related schemes.
COMPUTERS & ELECTRICAL ENGINEERING
(2021)
Article
Quantum Science & Technology
Myrto Arapinis, Mahshid Delavar, Mina Doosti, Elham Kashefi
Summary: PUFs are devices with unique behaviors that are hard to clone, providing a secure fingerprint. Quantum PUFs use the inherent unclonability of quantum states to enhance security and introduce new testability features. Different levels of security for qPUFs have been defined, with unitary PUFs capable of providing the desired level of security for most PUF-based applications.
Article
Computer Science, Information Systems
Manasha Saqib, Bhat Jasra, Ayaz Hassan Moon
Summary: IoT is a vast heterogeneous network that provides digital services for smart city applications. Ensuring communication security is crucial when accessing these services remotely. Both entity and message authentication are important for this purpose. While mutual authentication between subscribers and gateway nodes has received attention, there is still a need to improve mutual authentication between gateway nodes and IoT sensor nodes.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Zigang Chen, Zhiquan Cheng, Wenjun Luo, Jin Ao, Yuhong Liu, Kai Sheng, Long Chen
Summary: With the rapid development of 5G mobile communication technology and the expansion of the IoT industry, the number of IoT devices has grown exponentially. Uneven security guarantees and threats to IoT devices and systems prompted the proposal of a Firmware-Secure Multi-Factor Authentication protocol based on PUF and device firmware integrity, achieving mutual authentication and key negotiation between devices and servers. The proposed protocol also includes challenge response pairs and a firmware update scheme to ensure the safety of the device's life cycle.
INTERNET OF THINGS
(2023)
Article
Engineering, Electrical & Electronic
Sensen Li, Tikui Zhang, Bin Yu, Kuan He
Summary: The research proposes an end-to-end mutual authentication and key exchange protocol for IoT devices, combining PUF with CL-PKC, requiring only three handshakes without the real-time participation of the server. The protocol can secure devices from various attacks and provide perfect forward secrecy, outperforming existing related protocols in terms of security features, protocol rounds, and communication cost.
IEEE SENSORS JOURNAL
(2021)
Article
Computer Science, Information Systems
Mubarak Umar, Jiandong Wang, Feng Li, Shuguang Wang, Minggang Zheng, Zhiwei Zhang, Yulong Shen
Summary: This paper proposes a physical layer authentication (PLA) scheme based on Gaussian process (GP) regression, which enhances the reliability of authentication in Internet of Vehicles (IoV) by jointly considering the location and speed attributes of vehicles. The proposed scheme utilizes historical channel state information and transmitters' location and speed information to train a GP model for predicting the next legitimate location and speed for authentication. Experimental results demonstrate that the proposed approach significantly improves authentication performance compared to existing methods.
Article
Computer Science, Information Systems
Moneer Fakroon, Fayez Gebali, Mohammad Mamun
Summary: A secure telehealth system is proposed, utilizing multifactor authentication to protect mobile devices and IoT edge devices. The system uses healthcare professional's biometrics and physically unclonable functions (PUFs) for the edge devices. Security evaluation is conducted through formal and informal analysis, as well as model checking using AVISPA tool.
INTERNET OF THINGS
(2021)
Article
Computer Science, Hardware & Architecture
Leandro Loffi, Carla Merkle Westphall, Lukas Derner Grudtner, Carlos Becker Westphall
Summary: The research improved a multi-factor mutual authentication method that can be adjusted for use in fog and cloud computing environments, showing better performance compared to other studies. Factors such as response time, challenge-response function, and nonce were used to ensure the security of the method.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
Abolfazl Sajadi, Ahmad Shabani, Bijan Alizadeh
Summary: The Physical Unclonable Function (PUF) is a hardware block that assigns a unique fingerprint to each physical entity by exploiting process variations. In this paper, a low-cost PUF-based authentication mechanism called DC-PUF is developed for IoT devices to resist machine-learning attacks. The mechanism uses the dependency chain (DC) strategy to obfuscate the correlation between challenge-response pairs and propose a CNN-based attack scenario. The experimental results show that DC-PUF has a higher resistance against CNN-based attacks compared to existing PUF structures.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Qiang Li, Wenlong Su, Peng Zhang, Xinzhou Cheng, Mingxin Li, Yuanni Liu
Summary: The Internet of Vehicles (IoV) is a crucial technology for intelligent transportation systems, connecting vehicles, pedestrians, and roads through wireless networks to enhance traffic safety and efficiency. However, IoV faces significant network security risks, which can be controlled through authentication and encryption measures. To address the challenges of high computing overhead and low handover authentication efficiency in the existing IoV vehicle access authentication, a compact consensus pre-authentication and handover authentication method based on blockchain features was proposed. The method ensures authentication security, reduces consensus time, saves computing resources, and effectively solves the problems of high computing and communication costs. Performance and security analysis show that the proposed method can significantly reduce computational and communication overhead, improving the efficiency of vehicle handover authentication.
Article
Computer Science, Information Systems
Ilyes Ahmim, Nacira Ghoualmi-Zine, Ahmed Ahmim, Marwa Ahmim
Summary: The emergence of the Internet of Things has brought about new themes in the field of networking, including the Internet of Vehicles (IoV). However, IoV faces security and privacy vulnerabilities similar to other network technologies. Researchers have proposed different IoV authentication protocols, but many of them have security flaws. A recent study designed a three-factor authentication protocol for IoV but it also contains weaknesses. This paper provides a security analysis of the protocol and proposes improvements to overcome the identified security issues.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
(2022)
Article
Engineering, Electrical & Electronic
Yuntao Wang, H. Tom Luan, Zhou Su, Ning Zhang, Abderrahim Benslimane
Summary: To address security and efficiency concerns in vehicular energy networks (VENs), this paper proposes a secure and efficient wireless charging scheme based on blockchain technology and game theory. By leveraging blockchain, users can fully control and audit the usage of personal rating data to protect privacy. Using game theory, the algorithm optimizes the strategies of three energy entities, leading to improved utility and security of energy transmission.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Engineering, Electrical & Electronic
Zhongyuan Zhao, Guanjun Xu, Ning Zhang, Qinyu Zhang
Summary: This paper presents a theoretical analysis of a dual-hop communication system in a hybrid satellite-terrestrial relay network, with the introduction of shadowed-Rician distribution and Nakagami-m fading to characterize channel models. The opportunistic scheduling scheme is employed, and analytical expressions for ergodic capacity and average symbol error rate are derived. Results demonstrate that system performance can be enhanced by increasing the number of relays and users under different channel parameters and modulation schemes.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Computer Science, Hardware & Architecture
Wen Wu, Conghao Zhou, Mushu Li, Huaqing Wu, Haibo Zhou, Ning Zhang, Xuemin Sherman Shen, Weihua Zhuang
Summary: This article presents an AI-native network slicing architecture for 6G networks to facilitate intelligent network management and support emerging AI services.
IEEE WIRELESS COMMUNICATIONS
(2022)
Editorial Material
Computer Science, Information Systems
Tingting Yang, Ning Zhang, Mai Xu, Mehrdad Dianati, Fei Richard Yu
IEEE INTERNET OF THINGS JOURNAL
(2022)
Review
Computer Science, Information Systems
Zhiqing Wei, Mingyue Zhu, Ning Zhang, Lin Wang, Yingying Zou, Zeyang Meng, Huici Wu, Zhiyong Feng
Summary: This article comprehensively reviews the scenarios and key technologies of UAV-assisted data collection, including the system model, clustering of sensors, UAV data collection mode, and joint path planning and resource allocation. The open problems are also discussed, providing guidelines and insights for researchers in the field of UAV-assisted data collection for IoT.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Jianbo Du, Yan Sun, Ning Zhang, Zehui Xiong, Aijing Sun, Zhiguo Ding
Summary: This article proposes a NOMA-based vehicle edge computing network model to minimize system cost through joint optimization of offloading decision-making, VUE clustering, resource allocation, and power control. Two heuristic algorithms are used to solve the task offloading and resource assignment problems, and closed-form solutions for cloud-related optimization problems are obtained.
IEEE SYSTEMS JOURNAL
(2023)
Article
Engineering, Multidisciplinary
Xiaoming Yuan, Zedan Zhang, Chujun Feng, Yejia Cui, Sahil Garg, Georges Kaddoum, Keping Yu
Summary: The rapid expansion of wearable medical devices and health data of Internet of Medical Things (IoMT) poses new challenges to the high Quality of Service (QoS) of intelligent health care in the foreseeable 6G era. Traditional frame aggregation schemes in WBAN generate too much control frames during data transmission, which leads to high delay and energy consumption. In this paper, a Deep Q-learning Network (DQN) based Frame Aggregation and Task Offloading Approach (DQN-FATOA) is proposed, which effectively reduces delay and energy consumption, and improves the throughput and overall utilization of WBAN.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Article
Engineering, Civil
Xiaoming Yuan, Jiahui Chen, Jiayu Yang, Ning Zhang, Tingting Yang, Tao Han, Amir Taherkordi
Summary: This paper proposes a Federated Deep Learning algorithm based on the Spatial-Temporal Long and Short-Term Networks (FedSTN) for predicting traffic flow. The algorithm utilizes distributed model training and data privacy protection to improve prediction accuracy by mining spatio-temporal information and semantic features.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Computer Science, Information Systems
Guichuan Zhao, Qi Jiang, Ximeng Liu, Xindi Ma, Ning Zhang, Jianfeng Ma
Summary: This paper proposes an electrocardiogram (ECG) signals based group device pairing protocol to enhance the security and reduce the overhead of wearables. By designing a robust and lightweight fuzzy extractor and utilizing the trend of InterPulse Interval (IPI) from ECG signal to extract high-entropy keys, the protocol achieves secure and efficient group device association and dynamic update of group keys.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Information Systems
Hui Qiao, Xuewen Dong, Qi Jiang, Siqi Ma, Chao Liu, Ning Xi, Yulong Shen
Summary: The impact of fog-assisted healthcare Internet of Things (H-IoT) system is significant. Existing authenticated key agreement (AKA) protocols for secure interactions among smart H-IoT equipments, fog nodes, and a cloud server are based on expensive cryptographic primitives and fail to provide anonymity. To tackle these issues, a proposed anonymous and lightweight three-party AKA protocol (ALAKAP) leverages an efficient cryptographic primitive to achieve security and efficiency simultaneously. The protocol's security is formally proven and its performance is validated through experiments.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Chuntao Ding, Ao Zhou, Xiao Ma, Ning Zhang, Ching-Hsien Hsu, Shangguang Wang
Summary: This article proposes an IoT image recognition services framework for different needs in the MEC environment, which improves recognition accuracy by about 6% and reduces network traffic by up to 94% compared to the state-of-the-art approaches.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Information Systems
Feng Li, Jianfeng Ma, Yinbin Miao, Qi Jiang, Ximeng Liu, Kim-Kwang Raymond Choo
Summary: Searchable Symmetric Encryption (SSE) has attracted attention for enabling users to search encrypted data without decryption. However, existing SSE schemes suffer from low search efficiency and lack support for multi-keyword search, dynamic updates, and result verification. To address these issues, we propose a Verifiable and Dynamic Multi-keyword Search (VDMS) scheme using bitmap and RSA accumulator, offering efficient, verifiable, and updated multi-keyword search. The scheme employs bitmap as a data structure for indexes to improve search efficiency and reduce storage space. The combination of RSA accumulator and bitmap ensures result correctness. Security analysis shows that VDMS is adaptively secure against Chosen-Keyword Attacks (CKA), and experiments using real-world data demonstrate its efficiency and feasibility.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Computer Science, Information Systems
Mingyue Wang, Yu Guo, Chen Zhang, Cong Wang, Hejiao Huang, Xiaohua Jia
Summary: Electronic Health Record (EHR) and its privacy have gained significant attention. Existing systems for EHR sharing are vulnerable to DDoS attacks and single point of failure. In this article, we propose MedShare, a decentralized framework that utilizes blockchain technology to establish a trusted platform for secure EHR sharing. Our system incorporates a constant-size attribute-based encryption scheme for fine-grained access control and supports efficient multi-keyword boolean search operations. Evaluation results on Ethereum demonstrate the efficiency of MedShare.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2023)
Article
Computer Science, Information Systems
Fatima Salahdine, Tao Han, Ning Zhang
Summary: 5G, 6G, and beyond networks aim to provide emerging services with new requirements and challenges through key enabler technologies. While these technologies have potential interests, they also bring security concerns and challenges, making network security a primary concern for future wireless communication networks.
SECURITY AND PRIVACY
(2023)
Article
Engineering, Civil
Xindi Ma, Qi Jiang, Mohammad Shojafar, Mamoun Alazab, Sachin Kumar, Saru Kumari
Summary: This paper introduces the challenges of using federated learning in IoT-enabled Maritime Transportation System (MTS) for intelligent control and routing planning. It proposes a mechanism called DisBezant to achieve secure and Byzantine-robust federated learning. The mechanism includes a credibility-based mechanism to resist Byzantine attacks and a privacy-preserving gradient aggregation protocol based on a secure two-party calculation protocol. The effectiveness of DisBezant is verified through experiments.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Review
Computer Science, Information Systems
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani
Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas
Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang
Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Jing Xiong, Hong Zhu
Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy
Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Annisa Sarah, Gianfranco Nencioni
Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Sumana Maiti, Sudip Misra, Ayan Mondal
Summary: The broadcast proxy re-encryption methods extend traditional proxy re-encryption mechanisms and propose a scheme called MBP for IoT applications. MBP calculates a single re-encryption key for all user groups and uses multi-channel broadcast encryption to reduce security element size. However, it increases computation time for receiver IoT devices. The use of Rubinstein-Stahl bargaining game approach addresses this issue and MBP is secure against selective group chosen-ciphertext attack in the random oracle model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Pankaj Kumar, Hari Om
Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia
Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Suvrima Datta, U. Venkanna
Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo
Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Rajesh Kumar, Deepak Sinwar, Vijander Singh
Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Giovanni Nardini, Giovanni Stea
Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Zhaolin Ma, Jiali You, Haojiang Deng
Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang
Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.
COMPUTER COMMUNICATIONS
(2024)