scholarly journals Novel authentication framework for securing communication in internet-of-things

Author(s):  
Shamshekhar S. Patil ◽  
Arun Biradar

Internet-of-Things (IoT) offers a big boon towards a massive network of connected devices and is considered to offer coverage to an exponential number of the smart appliance in the very near future. Owing to the nascent stage of evolution of IoT, it is shrouded by security loopholes because of various reasons. Review of existing research-based solution highlights the usage of conventional cryptographic-based solution over the traditional mechanism of data forwarding process between IoT nodes and gateway. The proposed system presents a novel solution to this problem by a model that is capable of performing a highly secured and cost-effective authentication process. The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats. The outcome of the model shows better security strength with faster response time and energy saving of the IoT nodes.

2019 ◽  
Vol 118 (6) ◽  
pp. 90-93
Author(s):  
L. Terina Grazy ◽  
Dr.G. Parimalarani

E-commerce is a part of Internet Marketing. The arrival of Internet made the world very simple and dynamic in all the areas. Internet is the growing business as a result most of the people are using it in their day to day life. E-commerce is attractive and efficient way for both buyers and sellesr as it reduce cost, time and energy for the buyer. No surprise the insurance sector has become quite active within the internet sphere. Most insurance companies are offering policies to be brought online and also the portals for paying premiums. It actually saves from hassles involved in going to an insurance office and spend hours to get the insurance work done. Insurance has become an important and crucial aspect of life. Online insurance is the best and most cost effective approach of taking the insurance deal. This paper focused on influence of online marketing on the insurance industry in India, usage of internet in India , the internet penetration in India and the online sale of insurance product by the insurance sector.


Author(s):  
Muneer Bani Yassein ◽  
Ismail Hmeidi ◽  
Fatimah Alghazo ◽  
Bayan Odat ◽  
Ayat Smairat

Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4034
Author(s):  
Arie Haenel ◽  
Yoram Haddad ◽  
Maryline Laurent ◽  
Zonghua Zhang

The Internet of Things world is in need of practical solutions for its security. Existing security mechanisms for IoT are mostly not implemented due to complexity, budget, and energy-saving issues. This is especially true for IoT devices that are battery powered, and they should be cost effective to be deployed extensively in the field. In this work, we propose a new cross-layer approach combining existing authentication protocols and existing Physical Layer Radio Frequency Fingerprinting technologies to provide hybrid authentication mechanisms that are practically proved efficient in the field. Even though several Radio Frequency Fingerprinting methods have been proposed so far, as a support for multi-factor authentication or even on their own, practical solutions are still a challenge. The accuracy results achieved with even the best systems using expensive equipment are still not sufficient on real-life systems. Our approach proposes a hybrid protocol that can save energy and computation time on the IoT devices side, proportionally to the accuracy of the Radio Frequency Fingerprinting used, which has a measurable benefit while keeping an acceptable security level. We implemented a full system operating in real time and achieved an accuracy of 99.8% for the additional cost of energy, leading to a decrease of only ~20% in battery life.


2019 ◽  
Vol 36 (1) ◽  
pp. 203-224 ◽  
Author(s):  
Mario A. Paredes‐Valverde ◽  
Giner Alor‐Hernández ◽  
Jorge L. García‐Alcaráz ◽  
María del Pilar Salas‐Zárate ◽  
Luis O. Colombo‐Mendoza ◽  
...  

2022 ◽  
Vol 21 (1) ◽  
pp. 1-24
Author(s):  
Sheel Sindhu Manohar ◽  
Sparsh Mittal ◽  
Hemangee K. Kapoor

In the deep sub-micron region, “spin-transfer torque RAM” (STT-RAM ) suffers from “read-disturbance error” (RDE) , whereby a read operation disturbs the stored data. Mitigation of RDE requires restore operations, which imposes latency and energy penalties. Hence, RDE presents a crucial threat to the scaling of STT-RAM. In this paper, we offer three techniques to reduce the restore overhead. First, we avoid the restore operations for those reads, where the block will get updated at a higher level cache in the near future. Second, we identify read-intensive blocks using a lightweight mechanism and then migrate these blocks to a small SRAM buffer. On a future read to these blocks, the restore operation is avoided. Third, for data blocks having zero value, a write operation is avoided, and only a flag is set. Based on this flag, both read and restore operations to this block are avoided. We combine these three techniques to design our final policy, named CORIDOR. Compared to a baseline policy, which performs restore operation after each read, CORIDOR achieves a 31.6% reduction in total energy and brings the relative CPI (cycle-per-instruction) to 0.64×. By contrast, an ideal RDE-free STT-RAM saves 42.7% energy and brings the relative CPI to 0.62×. Thus, our CORIDOR policy achieves nearly the same performance as an ideal RDE-free STT-RAM cache. Also, it reaches three-fourths of the energy-saving achieved by the ideal RDE-free cache. We also compare CORIDOR with four previous techniques and show that CORIDOR provides higher restore energy savings than these techniques.


Author(s):  
Hafiz Saad Ahmad, Ali Hasnain

In recent years evolution of Internet of Things has brought revolution in many different sectors.  The agriculture sector has become efficient and cost effective due to role of IoT. Monitoring systems has become the crucial part of agriculture. In past few years lot of work is been done and many systems has been purposed in this regard. In this paper we are going to make comparison between 4 different agriculture monitoring systems. We are also going to discuss what type of hardware including different sensors are used in those systems. We are also going to discuss software and platform on which those applications run. We will also discuss processing mechanism and what kind of algorithms are used in these systems and in the last we are going to make a comparative table based on these parameters.


Author(s):  
Mohammed Radi ◽  
Ali Alwan ◽  
Abedallah Abualkishik ◽  
Adam Marks ◽  
Yonis Gulzar

Cloud computing has become a practical solution for processing big data. Cloud service providers have heterogeneous resources and offer a wide range of services with various processing capabilities. Typically, cloud users set preferences when working on a cloud platform. Some users tend to prefer the cheapest services for the given tasks, whereas other users prefer solutions that ensure the shortest response time or seek solutions that produce services ensuring an acceptable response time at a reasonable cost. The main responsibility of the cloud service broker is identifying the best data centre to be used for processing user requests. Therefore, to maintain a high level of quality of service, it is necessity to develop a service broker policy that is capable of selecting the best data centre, taking into consideration user preferences (e.g. cost, response time). This paper proposes an efficient and cost-effective plan for a service broker policy in a cloud environment based on the concept of VIKOR. The proposed solution relies on a multi-criteria decision-making technique aimed at generating an optimized solution that incorporates user preferences. The simulation results show that the proposed policy outperforms most recent policies designed for the cloud environment in many aspects, including processing time, response time, and processing cost. KEYWORDS Cloud computing, data centre selection, service broker, VIKOR, user priorities


Sign in / Sign up

Export Citation Format

Share Document