enter search term and/or author name
Internet of Things (IoT): Smart and Secure Service Delivery
Elisa Bertino, Kim-Kwang Raymond Choo, Dimitrios Georgakopolous, Surya Nepal
Article No.: 22
The Internet of Things (IoT) is the latest Internet evolution that incorporates a diverse range of things such as sensors, actuators, and services deployed by different organizations and individuals to support a variety of applications. The...
Secure Data-Centric Access Control for Smart Grid Services Based on Publish/Subscribe Systems
Li Duan, Dongxi Liu, Yang Zhang, Shiping Chen, Ren Ping Liu, Bo Cheng, Junliang Chen
Article No.: 23
The communication systems in existing smart grids mainly take the request/reply interaction model, in which data access is under the direct control of data producers. This tightly controlled interaction model is not scalable to support complex...
Password-Authenticated Group Key Exchange: A Cross-Layer Design
Yuexin Zhang, Yang Xiang, Xinyi Huang
Article No.: 24
Two-party password-authenticated key exchange (2PAKE) protocols provide a natural mechanism for secret key establishment in distributed applications, and they have been extensively studied in past decades. However, only a few efforts have been...
Authentication Protocol for an IoT-Enabled LTE Network
Neetesh Saxena, Santiago Grijalva, Narendra S. Chaudhari
Article No.: 25
The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol of the long-term evolution (LTE) network does not support Internet of Things (IoT) objects and has several security limitations, including transmission of the...
Analyzing the security of Wearable Internet-of-Things (WIoT) devices is considered a complex task due to their heterogeneous nature. In addition, there is currently no mechanism that performs security testing for WIoT devices in different...
Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions...
Crowdsourced Mobile Data Transfer with Delay Bound
Ngoc Do, Ye Zhao, Cheng-Hsin Hsu, Nalini Venkatasubramanian
Article No.: 28
In this article, we design a crowdsourcing system, CrowdMAC, where mobile devices form a local community or marketplace to share network access and transfer data for each other. CrowdMAC enables (i) mobile clients to select and exploit multiple...
The number of wireless-enabled devices owned by a user has had huge growth over the past few years. Over one third of adults in the United States currently own three wireless devices: a smartphone, laptop, and tablet. This article provides a study...