Please use this identifier to cite or link to this item: https://hdl.handle.net/10321/3492
DC FieldValueLanguage
dc.contributor.authorKhumalo, Zephaniah Philanien_US
dc.contributor.authorNleya, Bakheen_US
dc.contributor.authorGomba, Ndadzibaya Masimbaen_US
dc.contributor.authorMutsvangwa, Andrewen_US
dc.date.accessioned2020-10-02T06:18:19Z-
dc.date.available2020-10-02T06:18:19Z-
dc.date.issued2018-12-
dc.identifier.citationKhumalo, P. et al. 2018. Services and applications security in IoT enabled networks. 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). Presented at: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). doi:10.1109/iconic.2018.8601298en_US
dc.identifier.isbn9781538664773-
dc.identifier.urihttp://hdl.handle.net/10321/3492-
dc.description.abstract5G wireless together with optical backbone networks are expected to be the main pillars of the envisaged next /future generation networking (N/FGN) infrastructures. This is an impetus to practical realization of an IoT network that will support and ensure relatively higher bandwidth as well as enhanced quality of service (QoS) in both access and core network sections. The high-speed wireless links at the network peripherals will serve as a conducive platform for device-to-device (D2D) communication. D2D driven applications and services can only be effective as well as secure assuming the associated machine type communication devices (MTCDs) have been successfully verified and authenticated. Typically, D2D type services and applications involve the interaction of several MTCDs in a group. As such, secure and effective D2D group-based authentication and key agreement (AKA) protocols are necessary. They need to inherently achieve efficacy in maintaining the group key unlink-ability as well as generate minimal signalling overheads that otherwise may lead to network congestion. In this paper we detail a secure and efficient Group AKA (Gr-AKA) protocol for D2D communication. Its performance is compared to that of existing similar protocols and is found to comparably lower both computational as well as signalling overhead requirements. Overall the analysis shows that the Gr-AKA protocol improves performance in terms of fulfilling D2D communication's security requirements.en_US
dc.format.extent7 pen_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartof2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)en_US
dc.subject5G networken_US
dc.subjectGroup authenticationen_US
dc.subjectDevice-to-device (D2D)en_US
dc.subjectCommunicationen_US
dc.subjectSecurityen_US
dc.subjectPrivacyen_US
dc.titleServices and applications security in IoT enabled networksen_US
dc.typeConferenceen_US
dc.date.updated2020-09-25T00:15:49Z-
dc.identifier.doi10.1109/iconic.2018.8601298-
item.grantfulltextopen-
item.cerifentitytypePublications-
item.fulltextWith Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.openairetypeConference-
item.languageiso639-1en-
Appears in Collections:Research Publications (Engineering and Built Environment)
Files in This Item:
File Description SizeFormat
untitled.pdf2.25 MBAdobe PDFView/Open
Show simple item record

Page view(s)

495
checked on Dec 22, 2024

Download(s)

84
checked on Dec 22, 2024

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.