A Lightweight authentication scheme for IoT against Rogue Base Station Attacks.

Math Biosci Eng

Department of Computer Science and Engineering, Seoul National University of Science and Technology, (SeoulTech), Seoul 01811, Korea.

Published: August 2022

Internet of Things (IoT) devices supporting intelligent cloud applications such as healthcare for hospitals rely on connecting with local base stations and access points to provide rich data analysis and real-time services to users. Devices authenticate with local base stations and perform handover operations to connect with access points with higher signal strength. Attackers disguise as valid base stations and access points using publicly accessible SSID information connect with local IoT devices during the handover process and give rise to data integrity and privacy concerns. This paper proposes a lightweight authentication scheme for private blockchain-based networks for securing devices from rogue base stations during the handover process. An authentication certificate is designed for base stations and machines in local clusters using SHA256 and modulo operations for enabling quick handover operations. The keys assigned to each device and base station joining the network are hashed, and their sizes are reduced using modulo operations. Furthermore, the compressed key size forms a certificate, which is used by the machines and the base stations to authenticate mutually. In comparison with existing studies, the performance analysis of the proposed scheme is based on the transmission of three messages required for completing the authentication process. Evaluation based on the Communication Overhead demonstrates a minimum improvement of 99.30% fewer bytes exchanged during the handover process and 89.58% reduced Storage Overhead compared with existing studies.

Download full-text PDF

Source
http://dx.doi.org/10.3934/mbe.2022546DOI Listing

Publication Analysis

Top Keywords

base stations
24
access points
12
handover process
12
lightweight authentication
8
authentication scheme
8
base
8
rogue base
8
base station
8
iot devices
8
local base
8

Similar Publications

Broadband minimalist wireless base stations without energy-consuming electrical power amplifiers are the rosy scenario of the next-generation wireless communication systems. High-power radio-over-fiber (RoF) links, which are featured by large operation bandwidths, are regarded as the supporting technology for realizing such a vision. Nevertheless, the severe signal-to-noise ratio (SNR) deterioration induced by the second Brillouin scattering in high-power and long-distance RoF links must be first solved.

View Article and Find Full Text PDF

Adapting a style based generative adversarial network to create images depicting cleft lip deformity.

Sci Rep

January 2025

Division of Plastic, Craniofacial and Hand Surgery, Sidra Medicine, and Weill Cornell Medical College, C1-121, Al Gharrafa St, Ar Rayyan, Doha, Qatar.

Training a machine learning system to evaluate any type of facial deformity is impeded by the scarcity of large datasets of high-quality, ethics board-approved patient images. We have built a deep learning-based cleft lip generator called CleftGAN designed to produce an almost unlimited number of high-fidelity facsimiles of cleft lip facial images with wide variation. A transfer learning protocol testing different versions of StyleGAN as the base model was undertaken.

View Article and Find Full Text PDF

UAV selection for high-speed train communication using OTFS modulation.

Sci Rep

January 2025

Computational Learning Theory Team, RIKEN-Advanced Intelligence Project, Fukuoka, 819-0395, Japan.

Providing continuous wireless connectivity for high-speed trains (HSTs) is challenging due to their high speeds, making installing numerous ground base stations (BSs) along the HST route an expensive solution, particularly in rural and wilderness areas. This paper proposes using multiple unmanned aerial vehicles (UAVs) to deliver high data rate wireless connectivity for HSTs, taking advantage of their ability to fly, hover, and maneuver at low altitudes. However, autonomously selecting the optimal UAV by the HST is challenging.

View Article and Find Full Text PDF

The primary production of fjords across the Arctic and Subarctic is undergoing significant transformations due to the climatically driven retreat of glaciers and ice sheets. However, the implications of these changes for upper trophic levels remain largely unknown. In this study, we employ both bulk and compound-specific stable isotope analyses to investigate how shifts at the base of fjord food webs impact the carbon and energy sources of consumers.

View Article and Find Full Text PDF

Can non-human primates extract the linear trend from a noisy scatterplot?

iScience

January 2025

Cognitive Neuroimaging Unit, CEA, INSERM, Université Paris-Saclay, NeuroSpin Center, 91191 Gif/Yvette, France.

Recent studies showed that humans, regardless of age, education, and culture, can extract the linear trend of a noisy scatterplot. Although this capacity looks sophisticated, it may simply reflect the extraction of the principal trend of the graph, as if the cloud of dots was processed as an oriented object. To test this idea, we trained Guinea baboons to associate arbitrary shapes with the increasing or decreasing trends of noiseless and noisy scatterplots, while varying the number of points, the noise level, and the regression slope.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!