Secure Communication in UAV Assisted HetNets: A Proposed Model

Author(s):  
Aabid Rashid ◽  
Diwankshi Sharma ◽  
Tufail A. Lone ◽  
Sumeet Gupta ◽  
Sachin Kumar Gupta
Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6546
Author(s):  
Kazi Masum Sadique ◽  
Rahim Rahmani ◽  
Paul Johannesson

The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.


Author(s):  
Santhana Lakshmi M ◽  
Hemaanand M

Delay Tolerant Network is designed for long distance communication where end-to-end connectivity is not established due to frequent disconnections or delay. Long latency is encountered in this type of network. This work proposes a reliable model for secure communication in DTN that aims to achieve correct estimation of trust value between the nodes and to minimize the relay rate i.e cost involved in the message transmission with minimum delay based on the history of ownership of information. In this model, we have used data driven approach so that the malicious or selfish nodes are prevented from consuming more resources in the resource constrained network environment. This approach checks the trustworthiness of the source of information. This work adopts computing based approach to evaluate the performance of the proposed model using fuzzy logic. We conduct two comparative analyses in which one compares the four variants of the proposed model to find the best variant of the proposed model and other compares our trust model with the other existing trust models to prove the efficiency of our model over other routing protocols.


Author(s):  
Cong Sun ◽  
Ke Liu ◽  
Dahu Zheng ◽  
Wenbao Ai

This paper considers a two-way relay network, where two source nodes exchange messages through several relays in the presence of an eavesdropper, and the channel state information (CSI) of the eavesdropper is imperfectly known. The amplify-and-forward relay protocol is used and the relay beamforming weights are designed. The model is built up to minimize the total relay transmit power while guaranteeing the quality of service at users and preventing the eavesdropper from decoding the signals. Due to the imperfect CSI, a semi-infinite programming problem is obtained. An algorithm is proposed to solve the problem, and the iterative points are updated through the linesearch technique, where the feasibility are preserved during iterations. The optimality property is analyzed. The obtained subproblems are quadratic constrained quadratic programming problems, either with less than $4$ constraints or with only one variable, which are solved optimally. Simulation results demonstrate the importance of the proposed model, and imply that the proposed algorithm is efficient and converges very fast, where more than 85% of the problems are solved optimally.


Author(s):  
Pooja Sharma ◽  
SK Pahuja ◽  
Karan Veer

Background: Since now a time, the main challenge is the security of publically available audio, video & text data i.e. social media communication; hence the author presents an exceedingly secure communication system to hide the data from an attentive adversary. Objective: The aim is to design and analyze a novel algorithm to be implemented for message transmission using multiimage LSB steganography and crucial variable-length cryptography. Encoder, decoder and social media as a channel are main parts of the study. Methods: This model uses different computer techniques like cryptography and steganography with video handling. The evolution interest of this work is to implement the raw video as the cover on the QR code image. This image is to be transmitted as information by enshrouding it in the raw footage. Additionally, encryption of QR code image using VLMKG (Variable length Mixed key Generation) cryptography improve the author's endeavors. The variable-length key is generated separately to implement the cryptography. In the proposed modal, multi-image LSB steganography is imposed which gives one-bit replacement in the spatial domain. Wavelet Transform (Daubechies family) has been applied for denoising purpose in a way to enhance the accuracy of receiving message. Results: The author found that using the proposed model on an agreement of five QR Code images with three raw video grouping, any information in the form of QR code image can be transmitted successfully. Conclusion: The creator efforts with LSB steganography, variable length key cryptography and MATLAB usage had superbly extracted the image features, calculations and the consequences were observed to be palatable.


Author(s):  
B. Adithya ◽  
B. Sathish Babu

Ubiquitous computing has been studied extensively as a post desktop model. Secure communication among various heterogeneous networks is been a challenge in service environment with location dynamism of the nodes. In this paper the authors proposed model for trust worthy communications among devices of various networks in a ubiquitous environment with varied service needs, security needs and computational-storage capacities. The model uses a novel approach for computing trust - adaptive to capacity and services.


2018 ◽  
Vol 2018 ◽  
pp. 1-6 ◽  
Author(s):  
Ahsan Tanveer ◽  
Z. U. Khan ◽  
A. N. Malik ◽  
I. M. Qureshi

This work presents a Soft Queuing Model (SQM) for number of active users present in a cognitive radio network (CRN) at some given instant. Starting with the existing cellular network where the upper limit for the number of channels and active users is well defined. The idea is then extended to the complicated scenario of CRNs where the upper limit is not deterministic for both the number of channels and the active users. Accordingly a probabilistic SQM is proposed under the condition that the number of channels and active cognitive users are both random variables. The proposed model will be useful to offer the level of reliability to the clients connected with CRN and hence to offer secure communication even on a cooperative CRN. The proposed model has been verified theoretically and simulations have been carried out in diversified set ups to evaluate the performance.


Electronics ◽  
2019 ◽  
Vol 9 (1) ◽  
pp. 30 ◽  
Author(s):  
Muhammad Asghar Khan ◽  
Ijaz Mansoor Qureshi ◽  
Insaf Ullah ◽  
Suleman Khan ◽  
Fahimullah Khanzada ◽  
...  

Unmanned aerial vehicles (UAVs), when interconnected in a multi-hop ad-hoc fashion, or as a flying ad-hoc network (FANET), can efficiently accomplish mission-critical tasks. However, UAVs usually suffer from the issues of shorter lifespan and limited computational resources. Therefore, the existing security approaches, being fragile, are not capable of countering the attacks, whether known or unknown. Such a security lapse can result in a debilitated FANET system. In order to cope up with such attacks, various efficient signature schemes have been proposed. Unfortunately, none of the solutions work effectively because of incurred computational and communication costs. We aimed to resolve such issues by proposing a blind signature scheme in a certificateless setting. The scheme does not require public-key certificates, nor does it suffer from the key escrow problem. Moreover, the data that are aggregated from the platform that monitors the UAVs might be too huge to be processed by the same UAVs engaged in the monitoring task. Due to being latency-sensitive, it demands high computational capability. Luckily, the envisioned fifth generation (5G) mobile communication introduces multi-access edge computing (MEC) in its architecture. MEC, when incorporated in a UAV environment, in our proposed model, divides the workload between UAVs and the on-board microcomputer. Thus, our proposed model extends FANET to the 5G mobile network and enables a secure communication between UAVs and the base station (BS).


Author(s):  
D.P. Bazett-Jones ◽  
F.P. Ottensmeyer

It has been shown for some time that it is possible to obtain images of small unstained proteins, with a resolution of approximately 5Å using dark field electron microscopy (1,2). Applying this technique, we have observed a uniformity in size and shape of the 2-dimensional images of pure specimens of fish protamines (salmon, herring (clupeine, Y-l) and rainbow trout (Salmo irideus)). On the basis of these images, a model for the 3-dimensional structure of the fish protamines has been proposed (2).The known amino acid sequences of fish protamines show stretches of positively charged arginines, separated by regions of neutral amino acids (3). The proposed model for protamine structure (2) consists of an irregular, right-handed helix with the segments of adjacent arginines forming the loops of the coil.


2010 ◽  
Vol 15 (2) ◽  
pp. 121-131 ◽  
Author(s):  
Remus Ilies ◽  
Timothy A. Judge ◽  
David T. Wagner

This paper focuses on explaining how individuals set goals on multiple performance episodes, in the context of performance feedback comparing their performance on each episode with their respective goal. The proposed model was tested through a longitudinal study of 493 university students’ actual goals and performance on business school exams. Results of a structural equation model supported the proposed conceptual model in which self-efficacy and emotional reactions to feedback mediate the relationship between feedback and subsequent goals. In addition, as expected, participants’ standing on a dispositional measure of behavioral inhibition influenced the strength of their emotional reactions to negative feedback.


Sign in / Sign up

Export Citation Format

Share Document