Habibullah Yajam; Mohammad Ali Akhaee
Abstract
The future of the IoT requires new methods of payment that can handle millions of transactions per second. IOTA cryptocurrency aims at providing such a solution. It uses a consensus algorithm based on directed acyclic graphs (DAG) that is called Tangle. A tip selection algorithm (TSA) is a part of Tangle ...
Read More
The future of the IoT requires new methods of payment that can handle millions of transactions per second. IOTA cryptocurrency aims at providing such a solution. It uses a consensus algorithm based on directed acyclic graphs (DAG) that is called Tangle. A tip selection algorithm (TSA) is a part of Tangle that determine which unconfirmed blocks (tips) should be confirmed by new blocks. There is always a chance that a small number of valid blocks never get confirmed and become stale. If a significant part of blocks become stale, the Tangle is considered unstable. In this paper, we mathematically prove that a TSA is stable in all transaction rates if and only if the probability of selecting all tips is at least $1/2n$ in which $n$ is the total number of tips. Accordingly, we demonstrate that the MCMC TSA used in IOTA would not be stable in high transaction rates.
Amir Ashtari; Ahmad Shabani; Bijan Alizadeh
Abstract
This paper presents a novel RF-PUF-based authentication scheme, called RKM-PUF which takes advantage of a dynamic random key generation that depends upon both communication parties in the network to detect intrusion attacks. Unlike the existing authentication schemes, our proposed approach takes the ...
Read More
This paper presents a novel RF-PUF-based authentication scheme, called RKM-PUF which takes advantage of a dynamic random key generation that depends upon both communication parties in the network to detect intrusion attacks. Unlike the existing authentication schemes, our proposed approach takes the physical characteristics of both involved parties into account to generate the secret key, resulting in securely mutual authentication of both nodes in a wireless network. The experimental results of the proposed authentication scheme show that the RKM-PUF can reach up to 99% in identification accuracy.
Wafa Abdulaziz Alkenazan; Ashraf A. Taha; Mohammed J.F. Alenazi; Wadood Abdul
Abstract
Due to the increasing number of cars and the difficulty to find vacant parking spots easily, the smart parking system is essential to save time and efforts of drivers and to protect the environment from emissions and air pollution. Wireless Sensor Networks used in smart parking systems consists of a ...
Read More
Due to the increasing number of cars and the difficulty to find vacant parking spots easily, the smart parking system is essential to save time and efforts of drivers and to protect the environment from emissions and air pollution. Wireless Sensor Networks used in smart parking systems consists of a number of sensors to monitor the events or changes and send the data, cluster head to manage the linked sensors, and base stations to manipulate and forward the data to the end system. All of these devices are used together to monitor a specific area. This paper analyzes the performance of IEEE802.11ac and compares with IEEE802.15.4 and IEEE802.11b using three different scenarios by measuring the average end to end delay and throughput with respect to the number of sensors (manually and automatically). This is done using Thing Speak cloud (An open IoT platform with MATLAB 2019 analytics) in IEEE 802.11ac and without a cloud setup in IEEE802.15.4 and IEEE802.11b. Three scenarios are considered in this work. First, the sensors are distributed manually in all the standards. Second, the sensors are distributed automatically in IEEE802.11 ac and manually in IEEE802.15.4 and IEEE802.11b. Third, the sensors are distributed automatically in IEEE802.11ac along with the cloud. While the sensors are placed manually with grid placement without the cloud in IEEE802.15.4 and IEEE802.11b. Finally, the results show that the IEEE802.11ac gave better results than other standards and it is suitable for applications with very high throughput.
Mohammad Mahdi Modiri; Javad Mohajeri; Mahmoud Salmasizadeh
Abstract
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling ...
Read More
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, various protocols and schemes were proposed to achieve security requirements in M2M communication and reduce computational and communication costs. In this paper, we propose the group-based secure lightweight handover authentication (GSLHA) protocol for M2M communication in LTE and future 5G networks. The proposed protocol mutually authenticates a group of MTC devices (MTCDs) and a new eNodeB (eNB) when these simultaneously enter the coverage of the eNB with considering all the cellular network requirements. The security analysis and formal verification by using the AVISPA tool show that the protocol has been able to achieve all the security goals and overcome various attacks. In addition, the comparative performance analysis of the handover authentication protocols shows that the proposed protocol has the best computational and communication overheads.
Saadi Hadjer; Yagoub Mustapha C.E.; Rachida TOUHAMI
Abstract
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, ...
Read More
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency identification(RFID), sensors, and mobile telephony, to name a few. This article aims to talk specifically about the RFID technology and its accompanying communication, authentication, risk, and security concerns while applied to the IoT field. An important part of this work is indeed focused on security aspects that derive from the use of RFID in IoT, especially in IoT networks. The results of our research work highlighted an excellent integration of RFID in the field of Internet of things, particularly in healthcare systems.
Areej Fatima; Muhammad Adnan Khan; Sagheer Abbas; Muhammad Waqas; Leena Anum; Muhammad Asif
Abstract
Internet of Things (IoT) approach is empowering smart city creativities all over the world. There is no specific tool or criteria for the evaluation of the services offered by the smart city. In this paper, a new Multilayer Fuzzy Inference System (MFIS) is proposed for the assessment of ...
Read More
Internet of Things (IoT) approach is empowering smart city creativities all over the world. There is no specific tool or criteria for the evaluation of the services offered by the smart city. In this paper, a new Multilayer Fuzzy Inference System (MFIS) is proposed for the assessment of the Planet Factors of smart city (PFSC). The PFSC system is categorized into two levels. The proposed MFIS based expert system can categories the evaluation level of planet factors of the smart city into low, satisfied, or good.