مقاله انگلیسی رایگان در مورد مدل امنیتی چندپخشی برای اینترنت اشیای مبتنی بر آگاهی – IEEE 2017

IEEE

 

مشخصات مقاله
ترجمه عنوان مقاله مدل امنیتی چندپخشی برای اینترنت اشیای مبتنی بر آگاهی نسبت به محتوا
عنوان انگلیسی مقاله Multicast Security Model for Internet of Things Based on Context Awareness
انتشار مقاله سال ۲۰۱۷
تعداد صفحات مقاله انگلیسی ۷ صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه IEEE
مقاله بیس این مقاله بیس نمیباشد
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط امنیت اطلاعات، اینترنت و شبکه های گسترده، شبکه های کامپیوتری
نوع ارائه مقاله
کنفرانس
مجله / کنفرانس کنفرانس بین المللی مهندسی کامپیوتر – International Computer Engineering Conference
دانشگاه Switching Department – National Telecommunication Institute – Egypt
کلمات کلیدی  اینترنت اشیا؛ مدیریت کلیدی گروه، آگاهی از زمینه
کلمات کلیدی انگلیسی Internet of Things; Group Key Management, Context Awareness
شناسه دیجیتال – doi
https://doi.org/10.1109/ICENCO.2017.8289805
کد محصول E10411
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract
I Introduction
II Background and Related Work
III The Proposed GKM Model
IV Performance Analysis
V Conlusion and Future Work
REFERENCES

 

بخشی از متن مقاله:
Abstract

Internet of Things (IoT) devices are resource constrained devices in terms of power, memory, bandwidth, and processing. On the other hand, multicast communication is considered more efficient in group oriented applications compared to unicast communication as transmission takes place using fewer resources. That is why many of IoT applications rely on multicast in their transmission. This multicast traffic need to be secured specially for critical applications involving actuators control. Securing multicast traffic by itself is cumbersome as it requires an efficient and scalable Group Key Management (GKM) protocol. In case of IoT, the situation is more difficult because of the dynamic nature of IoT scenarios. This paper introduces a solution based on using context aware security server accompanied with a group of key servers to efficiently distribute group encryption keys to IoT devices in order to secure the multicast sessions. The proposed solution is evaluated relative to the Logical Key Hierarchy (LKH) protocol. The comparison shows that the proposed scheme efficiently reduces the load on the key servers. Moreover, the key storage cost on both members and key servers is reduced.

INTRODUCTION

The Internet of Things (IoT) refers to billions of interconnected smart objects equipped with sensors or actuators. Existing and evolving communication protocols are used to enable services to such smart objects and allow them to communicate among each other and with backend users of the Internet during different activities of sensing and controlling. IoT networks, without intelligence, are just wireless sensor networks. Intelligence in IoT is achieved using context awareness. Context awareness, as defined in [1], is the ability of a system to provide information or services to users using information of a certain entity where the entity can be a person, place, piece of software, or an object. On the other hand, the IoT is naturally a resourceconstrained network regarding CPU power, memory, and energy. Therefore, many of the IoT application scenarios rely on multicast operation to preserve bandwidth and enhance the sensing and control operation among the sensors and the actuators. Multicast transmits data efficiently between one sender or multiple senders to multiple receivers. However, the constrained nature and the massive size of the IoT network make it vulnerable to many security attacks. In order to multicast information among a certain group securely, the traffic should be encrypted. So a common group key should be shared among all members of the group. Whenever membership changes, the group key should be updated. Hence, during the registration process, it is necessary to have strong authentication mechanisms to acquire the identity of the participants prior to distributing the key material. Thus, the main concern is around key management, key distribution, and access control for the key material [2]. Group Key Management (GKM) protocols are divided into three categories: centralized, decentralized, and distributed key management protocols [2][3][4]. Nevertheless, all the conventional GKM protocols under the above mentioned categories don’t suit the dynamic nature of the IoT scenarios and applications. Consequently, many research directions are carried out to adapt these protocols to IoT networks [5][6][7]. Yet, most of the research related to GKM focuses on adapting these protocols by working on just one or two of the IoT aspects such as mobility, scalability, constrained nature of devices, application nature, network access technology, or addressing. They ignore that the majority of IoT scenarios need to work on most of these aspects combined together and they lack the ability to address the resulting issues of such combination.

ارسال دیدگاه

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *