Cyber-Physical Systems (CPS) connected in the form of Internet of Things (IoT) are vulnerable to various security threats, due to the infrastructure-less deployment of IoT devices. Device-to-Device (D2D) authentication of these networks ensures the integrity, authenticity, and confidentiality of information in the deployed area. The literature suggests different approaches to address security issues in CPS technologies. However, they are mostly based on centralized techniques or specific system deployments with higher cost of computation and communication. It is therefore necessary to develop an effective scheme that can resolve the security problems in CPS technologies of IoT devices. In this paper, a lightweight Hash-MAC-DSDV (Hash Media Access Control Destination Sequence Distance Vector) routing scheme is proposed to resolve authentication issues in CPS technologies, connected in the form of IoT networks. For this purpose, a CPS of IoT devices (multi-WSNs) is developed from the local-chain and public chain, respectively. The proposed scheme ensures D2D authentication by the Hash-MAC-DSDV mutual scheme, where the MAC addresses of individual devices are registered in the first phase and advertised in the network in the second phase. The proposed scheme allows legitimate devices to modify their routing table and unicast the one-way hash authentication mechanism to transfer their captured data from source towards the destination. Our evaluation results demonstrate that Hash-MAC-DSDV outweighs the existing schemes in terms of attack detection, energy consumption and communication metrics.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10338022 | PMC |
http://dx.doi.org/10.1109/jiot.2021.3083731 | DOI Listing |
Sensors (Basel)
January 2025
College of Electronics and Information Engineering, Sichuan University, Chengdu 610065, China.
As the Internet of Things (IoT) expands globally, the challenge of signal transmission in remote regions without traditional communication infrastructure becomes prominent. An effective solution involves integrating aerial, terrestrial, and space components to form a Space-Air-Ground Integrated Network (SAGIN). This paper discusses an uplink signal scenario in which various types of data collection sensors as IoT devices use Unmanned Aerial Vehicles (UAVs) as relays to forward signals to low-Earth-orbit satellites.
View Article and Find Full Text PDFSensors (Basel)
January 2025
Department of Instruction and Leadership, Duquesne University, Pittsburgh, PA 15282, USA.
This article examines how sensor technologies (such as environmental sensors, biometric sensors, and IoT devices) intersect with conversational AI models like ChatGPT 4.0. In particular, this article explores how data from different sensors in real time can improve AI models' comprehension of surroundings, user contexts, and physical conditions.
View Article and Find Full Text PDFSensors (Basel)
January 2025
School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea.
The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers.
View Article and Find Full Text PDFSensors (Basel)
January 2025
School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China.
This research presents an intelligent beam-hopping-based grant-free random access (GFRA) architecture designed for secure Internet of Things (IoT) communications in Low Earth Orbit (LEO) satellite networks. In light of the difficulties associated with facilitating extensive device connectivity while ensuring low latency and high reliability, we present a beam-hopping GFRA (BH-GFRA) scheme that enhances access efficiency and reduces resource collisions. Three distinct resource-hopping schemes, random hopping, group hopping, and orthogonal group hopping, are examined and utilized within the framework.
View Article and Find Full Text PDFSensors (Basel)
January 2025
Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology, Narutowicza 11/12, 80-233 Gdańsk, Poland.
A serious limitation to the deployment of IoT solutions in rural areas may be the lack of available telecommunications infrastructure enabling the continuous collection of measurement data. A nomadic computing system, using a UAV carrying an on-board gateway, can handle this; it leads, however, to a number of technical challenges. One is the intermittent collection of data from ground sensors governed by weather conditions for the UAV measurement missions.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!