Please use this identifier to cite or link to this item:
https://hdl.handle.net/10321/3492
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Khumalo, Zephaniah Philani | en_US |
dc.contributor.author | Nleya, Bakhe | en_US |
dc.contributor.author | Gomba, Ndadzibaya Masimba | en_US |
dc.contributor.author | Mutsvangwa, Andrew | en_US |
dc.date.accessioned | 2020-10-02T06:18:19Z | - |
dc.date.available | 2020-10-02T06:18:19Z | - |
dc.date.issued | 2018-12 | - |
dc.identifier.citation | Khumalo, P. et al. 2018. Services and applications security in IoT enabled networks. 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). Presented at: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). doi:10.1109/iconic.2018.8601298 | en_US |
dc.identifier.isbn | 9781538664773 | - |
dc.identifier.uri | http://hdl.handle.net/10321/3492 | - |
dc.description.abstract | 5G wireless together with optical backbone networks are expected to be the main pillars of the envisaged next /future generation networking (N/FGN) infrastructures. This is an impetus to practical realization of an IoT network that will support and ensure relatively higher bandwidth as well as enhanced quality of service (QoS) in both access and core network sections. The high-speed wireless links at the network peripherals will serve as a conducive platform for device-to-device (D2D) communication. D2D driven applications and services can only be effective as well as secure assuming the associated machine type communication devices (MTCDs) have been successfully verified and authenticated. Typically, D2D type services and applications involve the interaction of several MTCDs in a group. As such, secure and effective D2D group-based authentication and key agreement (AKA) protocols are necessary. They need to inherently achieve efficacy in maintaining the group key unlink-ability as well as generate minimal signalling overheads that otherwise may lead to network congestion. In this paper we detail a secure and efficient Group AKA (Gr-AKA) protocol for D2D communication. Its performance is compared to that of existing similar protocols and is found to comparably lower both computational as well as signalling overhead requirements. Overall the analysis shows that the Gr-AKA protocol improves performance in terms of fulfilling D2D communication's security requirements. | en_US |
dc.format.extent | 7 p | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC) | en_US |
dc.subject | 5G network | en_US |
dc.subject | Group authentication | en_US |
dc.subject | Device-to-device (D2D) | en_US |
dc.subject | Communication | en_US |
dc.subject | Security | en_US |
dc.subject | Privacy | en_US |
dc.title | Services and applications security in IoT enabled networks | en_US |
dc.type | Conference | en_US |
dc.date.updated | 2020-09-25T00:15:49Z | - |
dc.identifier.doi | 10.1109/iconic.2018.8601298 | - |
item.grantfulltext | open | - |
item.cerifentitytype | Publications | - |
item.fulltext | With Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.openairetype | Conference | - |
item.languageiso639-1 | en | - |
Appears in Collections: | Research Publications (Engineering and Built Environment) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
untitled.pdf | 2.25 MB | Adobe PDF | View/Open |
Page view(s)
495
checked on Dec 22, 2024
Download(s)
84
checked on Dec 22, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.