4.8 Article

Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 6, 期 2, 页码 2843-2859

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2018.2875472

关键词

Authentication; energy-quality scalability; Internet of Things (IoT); network security; physically unclonable functions (PUFs)

资金

  1. Singapore Ministry of Education [MOE2016-T2-1-150]
  2. National University of Singapore through the NUS-Berkeley-Cambridge Global Alliance [R-263-000-C50-133]

向作者/读者索取更多资源

In this paper, token-based security protocols with dynamic energy-security level tradeoff for Internet of Things (IoT) devices are explored. To assure scalability in the mechanism to authenticate devices in large-sized networks, the proposed protocol is based on the OAuth 2.0 framework, and on secrets generated by on-chip physically unclonable functions. This eliminates the need to share the credentials of the protected resource (e.g., server) with all connected devices, thus overcoming the weaknesses of conventional client-server authentication. To reduce the energy consumption associated with secure data transfers, dynamic energy-quality tradeoff is introduced to save energy when lower security level (or, equivalently, quality in the security subsystem) is acceptable. Energy-quality scaling is introduced at several levels of abstraction, from the individual components in the security subsystem to the network protocol level. The analysis on an MICA 2 mote platform shows that the proposed scheme is robust against different types of attacks and reduces the energy consumption of IoT devices by up to 69% for authentication and authorization, and up to 45% during data transfer, compared to a conventional IoT device with fixed key size.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Engineering, Multidisciplinary

Exploiting Correlation Among GPS Signals to Detect GPS Spoofing in Power Grids

Xiao Wei, Muhammad Naveed Aman, Biplab Sikdar

Summary: This article introduces a lightweight GPS time spoofing detection technique based on the autocorrelation among consecutive GPS signals. The statistical runs test is used to generate training data for the classifier. The power spectral density values of multiple received GPS signals are combined to form a window, and the runs test is used to obtain a p-value to quantify the correlation between the present and previous window, thereby classifying GPS signals as spoofed or safe.

IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS (2022)

Editorial Material Computer Science, Information Systems

Security, Trust and Privacy for Cloud, Fog and Internet of Things

Chien-Ming Chen, Shehzad Ashraf Chaudhry, Kuo-Hui Yeh, Muhammad Naveed Aman

SECURITY AND COMMUNICATION NETWORKS (2022)

Article Computer Science, Information Systems

Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey

Shivani Singh, Razia Sulthana, Tanvi Shewale, Vinay Chamola, Abderrahim Benslimane, Biplab Sikdar

Summary: Edge computing is a technological advancement that connects sensors and provides services at the device end, but security is a major concern. This article explores the security and privacy issues in different layers of the Edge computing architecture and the machine learning algorithms used to address these concerns. It also discusses various types of attacks on the Edge network and introduces intrusion detection systems and machine learning algorithms that overcome these security and privacy challenges.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices

Muhammad Aman, Haroon Basheer, Siddhant Dash, Ashutosh Sancheti, Jun Wen Wong, Xu Jia, Hoon Wei Lim, Biplab Sikdar

Summary: This article introduces a hybrid attestation technique, PRoM, for multicore Internet of Things devices, which ensures security against roving malware and high availability. Experimental results show that PRoM is more effective in terms of execution time compared to other attestation techniques.

IEEE SYSTEMS JOURNAL (2022)

Article Computer Science, Information Systems

DRiVe: Detecting Malicious Roadside Units in the Internet of Vehicles With Low Latency Data Integrity

Nalam Venkata Abhishek, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar

Summary: The Internet of Vehicles (IoV) has the potential to enhance road safety and traffic flow, but also introduces security vulnerabilities. To address the challenges of ensuring data integrity and detecting malicious road side units (RSUs), this article proposes a lightweight mechanism called DRiVe, which utilizes probabilistic modeling and specially constructed authentication techniques.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Electrical & Electronic

Internal Model Control (IMC)-Based Active and Reactive Power Control of Brushless Double-Fed Induction Generator with Notch Filter

Ahsanullah Memon, Mohd Wazir Bin Mustafa, Zohaib Hussain Laghari, Touqeer Ahmed Jumani, Waqas Anjum, Shafi Ullah, Muhammad Naveed Aman

Summary: This paper proposes a vector control (VC) method for BDFIGs in wind turbines, in which the proportional-integral (PI) gains for internal model control (IMC) are optimized to improve the dynamic response of the active and reactive power during inductive load insertion. The excellent characteristics of the notch filter are utilized to reduce a double fundamental frequency component to the point-of-common-coupling (PCC) voltage.

INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS (2022)

Article Computer Science, Information Systems

IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks

Muhammad Naveed Aman, Uzair Javaid, Biplab Sikdar

Summary: This article presents a secure patching framework for IoT, using remote attestation and physical unclonable functions (PUFs) to control and mitigate malware propagation.

IEEE SYSTEMS JOURNAL (2022)

Article Energy & Fuels

Comprehensive Predictive Control Model for a Three-Phase Four-Legged Inverter

Muhammad M. Fayyaz, Irtaza M. Syed, Yi Meng, Muhammad N. Aman

Summary: This paper introduces a comprehensive model predictive control (CMPC) method for controlling a three-phase four-legged inverter (TP4LI) in PV systems. The CMPC model aims to predictively model and control switching frequency and higher voltage/current switching to reduce losses. The proposed approach successfully tracks balanced and unbalanced reference currents, reduces switching losses, and keeps the generated current total harmonic distortion (THD) within industry limits.

ENERGIES (2023)

Article Chemistry, Analytical

Dynamic Resource Optimization for Energy-Efficient 6G-IoT Ecosystems

James Adu Ansere, Mohsin Kamal, Izaz Ahmad Khan, Muhammad Naveed Aman

Summary: This paper addresses the problem of energy optimization for IoT devices. The limited energy resources of IoT devices powered by renewable energy sources and the significant energy consumption of these small and low-powered devices are the main concerns. By maximizing the energy efficiency of the radio sub-system, the performance of the IoT network can be significantly increased. The proposed technique improves the energy efficiency of IoT systems compared to the state-of-the-art work.

SENSORS (2023)

Proceedings Paper Computer Science, Information Systems

PIC: Preserving Data Integrity in UAV Assisted Communication

Nalam Venkata Abhishek, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar

Summary: This paper introduces a lightweight UAV data integrity technique PIC, which verifies the integrity of data packets by generating authentication parameters regularly, effectively reducing communication overhead and latency.

IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) (2022)

Proceedings Paper Telecommunications

MaDe: Malicious Aerial Vehicle Detection using Generalized Likelihood Ratio Test

Nalam Venkata Abhishek, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar

Summary: The use of unmanned aerial vehicles (UAVs) has increased rapidly in recent years. However, if operational cyber security is not handled effectively, these technologies can pose significant hazards. This paper proposes a lightweight data integrity technique called MaDe, which can identify malicious UAVs through packet verification.

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022) (2022)

Article Acoustics

Speech Enhancement Framework with Noise Suppression Using Block Principal Component Analysis

Abdullah Zaini Alsheibi, Kimon P. Valavanis, Asif Iqbal, Muhammad Naveed Aman

Summary: With the advancement in voice-communication-based human-machine interface technology in smart home devices, a speech enhancement framework is proposed in this manuscript to improve the performance of algorithms by suppressing noise and recovering clean signals.

ACOUSTICS (2022)

Article Education & Educational Research

A new perspective on teaching the natural exponential to engineering students

Mukhtar Ullah, Muhammad Naveed Aman, Olaf Wolkenhauer, Jamshed Iqbal

Summary: The natural exponential and logarithm can be introduced to undergraduate engineering students through a novel interpretation of derivatives that does not rely on limits. By using two common differential equations, it is demonstrated that the natural exponential/logarithm can arise from this approach, providing an intuitive introduction of these functions and time constants in first-order dynamical systems.

INTERNATIONAL JOURNAL OF MATHEMATICAL EDUCATION IN SCIENCE AND TECHNOLOGY (2022)

暂无数据