Now showing 1 - 10 of 53
  • Publication
    Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare
    Upgradation of technologies for sustainable smart cities has led to rapid growth in Internet of Things (IoT) applications, including e-healthcare services wherein smart devices collect patient data and deliver it remotely to the servers in real-time. Despite its enormous benefits, IoT in healthcare has not received much attention primarily due to the risk of unauthorized access to confidential medical information enabled by the vulnerable wireless channel for communication. Besides, tiny IoT devices have limited computing power and storage capabilities that prevent administrators from using complex and resource-hungry security protocols. The cyber attacks on the Internet of Healthcare applications (IoHA) could result in fatalities, decreased revenue, and reputation loss, hence endangering sustainability. The existing security protocols are unsuitable due to the cost complexities that necessitate developing new security protocols for resource-constrained and heterogeneous IoT networks. We introduce a confidentiality and anonymity-preserving scheme for critical infrastructures of IoT to conquer cyber threats for sustainable healthcare. This paper proposes Zero-Knowledge Proofs (ZKP) based Authenticated Key Agreement (AKA) protocol for IoHA. ZKP-AKA uses zero-knowledge proofs, physically unclonable function, biometrics, symmetric cryptography, message digest, etc., for accomplishing the protocol’s objective at minimal computation, storage, and communication expenses. ZKP-AKA retains data integrity, confidentiality, anonymity, and safety from significant cyber threats
      16Scopus© Citations 30
  • Publication
    Fog Computing and Blockchain based Security Service Architecture for 5G Industrial IoT enabled Cloud Manufacturing
    Recent evolution of the Industrial Internet of Things (IIoT) empowers the classical manufacturing model with cloud computing integration for Industry 4.0. Cloud integration advances the capabilities of manufacturing systems with cloud-based controlling and real-time process monitoring which is renowned as Cloud Manufacturing(CM). However, cloud integration exposes the entire manufacturing ecosystem to a new set of security risks and increment in end-to-end latency. Moving security services towards the edge eradicates message routing latency towards the cloud and eliminates the central point of failure while leveraging the entire system performance. We propose a blockchain and fog computing enabled security service architecture that operates on fog nodes at the edge of manufacturing equipment clusters. The proposed service facilitates CM equipment authentication and Equipment-Cloud channel privacy protection while preserving anonymity and unlinkability over the blockchain. We implemented the proposed architecture with Hyperledger Fabric and compared the performance advantage over the state of art solutions.
      38Scopus© Citations 38
  • Publication
    Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
    Data is central to the Internet of Things (IoT) ecosystem. With billions of devices connected, most of the current IoT systems are using centralized cloud-based data sharing systems, which will be difficult to scale up to meet the demands of future IoT systems. The involvement of such a third-party service provider requires also trust from both the sensor owner and sensor data user. Moreover, fees need to be paid for their services. To tackle both the scalability and trust issues and to automatize the payments, this paper presents a blockchain-based marketplace for sharing of the IoT data. We also use a proxy re-encryption scheme for transferring the data securely and anonymously, from data producer to the consumer. The system stores the IoT data in cloud storage after encryption. To share the collected IoT data, the system establishes runtime dynamic smart contracts between the sensor and data consumer without the involvement of a trusted third-party. It also uses a very efficient proxy re-encryption scheme which allows that the data is only visible by the owner and the person present in the smart contract. This novel combination of smart contracts with proxy re-encryption provides an efficient, fast and secure platform for storing, trading and managing sensor data. The proposed system is implemented using off-the-shelf IoT sensors and computer devices. We also analyze the performance of our hybrid system by using the permission-less Ethereum blockchain and compare it to the IBM Hyperledger Fabric, a permissioned blockchain.
      369Scopus© Citations 72
  • Publication
    A Survey on Mobile Augmented Reality with 5G Mobile Edge Computing: Architectures, Applications and Technical Aspects
    The Augmented Reality (AR) technology enhances the human perception of the world by combining the real environment with the virtual space. With the explosive growth of powerful, less expensive mobile devices, and the emergence of sophisticated communication infrastructure, Mobile Augmented Reality (MAR) applications are gaining increased popularity. MAR allows users to run AR applications on mobile devices with greater mobility and at a lower cost. The emerging 5G communication technologies act as critical enablers for future MAR applications to achieve ultra-low latency and extremely high data rates while Multi-access Edge Computing (MEC) brings enhanced computational power closer to the users to complement MAR. This paper extensively discusses the landscape of MAR through the past and its future prospects with respect to the 5G systems and complementary technology MEC. The paper especially provides an informative analysis of the network formation of current and future MAR systems in terms of cloud, edge, localized, and hybrid architectural options. The paper discusses key application areas for MAR and their future with the advent of 5G technologies. The paper also discusses the requirements and limitations of MAR technical aspects such as communication, mobility management, energy management, service offloading and migration, security, and privacy and analyzes the role of 5G technologies.
      547Scopus© Citations 285
  • Publication
    Proof-of-Sense: A Novel Consensus Mechanism for spectrum Misuse Detection
    Optimal use of scarce radio spectrum is essential in the proliferation of beyond 5G networks, and promising blockchain technology offers various benefits for the spectrum management. However, existing blockchain-based solutions are expensive, non-optimized, and lack spectrum fraud detection. This paper proposes a novel consensus mechanism for a blockchain-based Dynamic Spectrum Access (DSA) system. The proposed \say{\textit{Proof-of-Sense}} consensus mechanism operates based on spectrum sensing procedures rather than cryptographic calculations. It is specially designed to address fraudulent/unauthorized access to the spectrum by analyzing the sensed spectrum data. The core of the consensus mechanism is a cryptographic key sharing mechanism inspired by Shamir's secret sharing scheme. Moreover, the proposed DSA system can enable different micro-services such as automated spectrum auctions, payment and penalty handling, and spectrum fraud detection. A proof-of-concept based on experimental approaches coupled with Matlab simulations is presented to analyze the performance of the proposed consensus mechanism.
      68Scopus© Citations 11
  • Publication
    How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain?
    Several recent works talk about the potential use of network slice brokering mechanism to facilitate the resource allocation of network slicing in next generation networks. This involves network tenants on the one hand and resource/infrastructure providers on the other hand. However, the potential downside of deploying Network Slice Broker (NSB) is that it can be victimized by DoS (Denial of Service) attack. Thus, the aim of this work is three fold. First, to present the possible ways in which DoS/DDoS attacks can be mounted on NSB and their adverse effects. Second, to propose and implement initial blockchain-based solution named as Security Service Blockchain (SSB) to prevent DoS attacks on NSB. Third, to enumerate the challenges and future research directions to effectively utilize blockchain for mitigating DoS/DDoS attacks on NSB. To evaluate the performance the proposed SSB framework is implemented using Hyperledger Fabric. The results manifest that the latency impact of the legitimate slice creation over scaled up malicious traffic remains minimal with the use of SSB framework. The integration of SSB with NSB results in gaining several fold reduction in latency under DoS attack scenario.
      11Scopus© Citations 7
  • Publication
    6G Security Challenges and Potential Solutions
    Although the fifth generation wireless networks are yet to be fully investigated, the vision and key elements of the 6th generation (6G) ecosystem have already come into discussion. In order to contribute to these efforts and delineate the security and privacy aspects of 6G networks, we survey how security may impact the envisioned 6G wireless systems with the possible challenges and potential solutions. Especially, we discuss the security and privacy challenges that may emerge with the 6G requirements, novel network architecture, applications and enabling technologies including distributed ledger technologies, physical layer security, distributed artificial intelligence (AI)/ machine learning (ML), Visible Light Communication (VLC), THz bands, and quantum communication
      21Scopus© Citations 64
  • Publication
    Millimeter-Wave Channel Modeling in a Vehicular Ad-Hoc Network Using Bose–Chaudhuri–Hocquenghem (BCH) Code
    The increase in capacity demand for vehicular communication is generating interest among researchers. The standard spectra allocated to VANET tend to be saturated and are no longer enough for real-time applications. Millimeter-wave is a potential candidate for VANET applications. However, millimeter-wave is susceptible to pathloss and fading, which degrade system performance. Beamforming, multi-input multi-output (MIMO) and diversity techniques are being employed to minimize throughput, reliability and data rate issues. This paper presents a tractable channel model for VANET in which system performance degradation due to error is addressed by concatenated Alamouti space-time block coding (ASTBC) and Bose–Chaudhuri–Hocquenghem (BCH) coding. Two closed-form approximations of bit error rate (BER), one for BCH in Rayleigh fading and the second for BCH with ASTBC, are derived. These expressions comprise SNR and code rate and can be utilized in designing VANET architectures. The results show that the BER using concatenated ASTBC and BCH outmatches the conventional BER ASTBC expression. The analytical results are compared with numerical results, thereby showing the accuracy of our closed-form expressions. The performance of the proposed expressions is evaluated using different code rates.
      17Scopus© Citations 6
  • Publication
    AGE: authentication in gadget-free healthcare environments
    Mobile and sensor related technologies are significantly revolutionizing the medical healthcare sectors. In current healthcare systems, gadgets are the prominent way of acquiring medical services. However, the recent technological advancements in smart and ambient environments are offering users new ways to access the healthcare services without using any explicit gadgets. One of the key challenges in such gadget-free environments is performing secure user authentication with the intelligent surroundings. For example, a secure, efficient and user-friendly authentication mechanism is essential for elderly/disabled people or patients in critical conditions requiring medical services. Hence, modern authentication systems should be sophisticated enough to identify such patients without requiring their physical efforts or placing gadgets on them. This paper proposes an anonymous and privacy-preserving biometrics based authentication scheme for such gadget-free healthcare environment. We performed formal security verification of our proposed scheme using CDVT/AD tool and our results indicate that the proposed scheme is secure for such smart and gadget-free environments. We verify that the proposed scheme can resist against various well-known security attacks. Moreover, the proposed system showed better performance as compared with existing biometrics base remote user authentication schemes.
      269
  • Publication
    Micro-Operator driven Local 5G Network Architecture for Industrial Internet
    In addition to the high degree of flexibility and customization required by different vertical sectors, 5G calls for a network architecture that ensures ultra-responsive and ultra-reliable communication links. The novel concept called micro-operator (uO) enables a versatile set of stakeholders to operate local 5G networks within their premises with a guaranteed quality and reliability to complement mobile network operators' (MNOs) offerings. In this paper, we propose a descriptive architecture for emerging 5G uOs which provides user specific and location specific services in a spatially confined environment. The architecture is discussed in terms of network functions and the operational units which entail the core and radio access networks in a smart factory environment which supports industry 4.0 standards. Moreover, in order to realize the conceptual design, we provide simulation results for the latency measurements of the proposed uO architecture with respect to an augmented reality use case in industrial internet. Thereby we discuss the benefits of having uO driven local 5G networks for specialized user requirements, rather than continuing with the conventional approach where only MNOs can deploy cellular networks.
      423Scopus© Citations 27