The Development Of Wireless Communications And Micro

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

    The potential applications of IoT can be summarized as: military, aviation, counter-terrorism, explosion, disaster relief, environment, health care, household, commercial, logistics, warehousing, transportation, industrial production, identity, power and other fields. Security is an important consideration in all information and communication systems in these fields.

Like other technological inventions, although IoT will promises their users a better life in the near future, it is a security risk, especially today the privacy is increasingly concerned by people. In order to make the Iot be more universal or pervade people everyday’s life, the security of IoT must be strengthened.

IoT is an immature technology. The key issue that affects the development of IoT is lacking of mature and complete security model and standards. Compared to the traditional network, IoT integrates WSN, RFID systems, mobile vehicle network, 3G technology, WiMAX, personal area network (PAN), etc. When IoT environment becomes more complex, the security issues are more complex than any existing network systems.[1]

The main challenges to the security of IoT are from the following three aspects:

Cost: The devices of WSN should be available at relatively low prices to support their large-scale deployment. This requirement determines these devices are resource-constrained. It means that these devices may The devices have a small amount of memory, computational capability and limit power supply. The exaisting network security protocols do not consider about these restriction factors.

Security: Compared to traditional networks, the IoT merges more networks that perplex the security issues.

Privacy: The devices of WSN may not be able to resist all forms(physical and cyber) of attacks. The sensitive information or location privacy may be leaked.

he key technologies of IoT is not yet mature because of that the research and application of IoT is in the early stage. Compared with the Internet and mobile communication network, there are no large-scale practical applications of IoT being used. The research methods of the security issues of the IoT usually consult to the traditional network, especially consult to the research methods of analysing security issues of Internet.

At present the nodes of WSN the are multi-source and heterogeneous. The sensor nodes usually only have simple hardware and software functions, which makes them unable to have complex security protection. The research of security issues of these simple devices is one major aspect of research of security issues of IoT. RFID security mechanisms can be divided into physical security mechanisms and cryptographic security mechanisms. Physical security mechanisms includes kill command mechanism, electrostatic shielding mechanism, active interference and blocking tags; cryptographic security mechanisms includes hash-lock protocol proposed by Sarma the weis random hash-lock protocol the NTT laboratories for the hash -chian agreement, rhee proposed distributed RFID-ask - answer the security protocol.

3], Weber argues that measures ensuring the architecture's

resilience to attacks, data authentication, access control and

client privacy need to be established. Mattern [4] has pointed

out that much of the public debate on whether to accept or

reject the IoT involves the conventional dualisms of ‘security

versus freedom’ and ‘comfort versus data privacy’. The

cloud computing data centers primarily based on personal

data which is automatically collected and could be used by

third parties without people’s agreement or knowledge for

unknown and potentially damaging purposes. In [5], Ukil

considers the embedded device security only, assuming that

network security is properly in place, and provide the

requirements of embedded security, the solutions to resists

different attacks and the technology for resisting temper

proofing of the embedded devices by the concept of trusted

computing. However, existing works usually focus on one

aspect of security and do not provide a complete security

architecture as our paper does. To solve this issue, we

proposed a secure architecture for the IoT.

The issue of energy consumption for securing smart object

such as wireless sensor networks (WSN) is an open challenge

which has been discussed in bibliography in works such as Shi

et al. (2004) and Boyle and Newe (2008). Experimental investigations

concerning the energy consumption of WSN have

been made on Reyes et al. (2010) and Javier et al. (2006).

Theoretical analysis and simulation results for mitigating

mechanisms to detect jam attacks in wireless sensors

networks are presented in Shin et al. (2009) and Bhus et al.

(2007). Moreover, experiments for intrusion detection of

jamming attacks and passive listening in 802.11 using software

defined radios, are described in Bayraktaroglu et al.

(2008); Ma et al. (2007) and Fragkiadakis et al. (2012). Finally,

channel assignment based on energy detection and received

signal strength in wireless networks are presented in Siris and

Delakis (2011). The decrease of energy due to the security

protocols and the attempt to mitigate attacks from eavesdroppers,

passive listeners and denial of services such as

jamming attacks are critical points for research. To our best of

our knowledge, the contribution of this research advances the

state of the art by the development of an experimental testbed

including all the previous different described research

areas. The setup consists of two users interconnected with

their smart devices and one smart attacker, a software defined

radios (SDR), whose main objective is to break any security

wall on the communication channel either as a passive

listener or as a jammer. The investigation due to different

security threats, need different types of mitigation techniques

such as channel assignment, power control and encryption.

Many kinds of security technologies for the RFID system

are proposed. The physical technologies for security in RFID

system are the ‘Kill command’ approach [11]. However the

physical technologies to protect RFID system have problems

such that additional devices are needed or the form of the

protection devices is limited or legal problems exist.

Therefore, in the recent RFID system, the authentication

technologies using cryptographic approach are proposed.

O-FRAP (Optimistic Forward secure RFID Authentication

Protocol) [12] is shown to achieve privacy-preserving mutual

authentication and forward security under a security model

called Universal Composable Security Framework (UCSF)

[13]. The UCSF guarantees not only the security of a protocol

running in isolation, but also the security of the same protocol

running as a component of a bigger system. But in Ref. [14],

the authors’ analysis of O-FRAP shows that it is vulnerable to

a denial-of-service (DoS) attack.

However previous protocols have many problems that

protocols are vulnerable to replay and spoofing attacks or tag

can be tracked. So we propose P2P based

mutual-authentication protocol together with using RSA that

can be used to solve the inherent security problems of RFID

systems. First we present a P2P-RFID network and give a

security analysis of this kind of network. Then we propose a

new mutual authentication protocol which uses asymmetric

encryption algorithm to encrypt. Our protocol allows to be

protected against adversarial attackers. With mutual

authentication we can provide a proof for each entity of a

RFID system based on an asymmetric encryption algorithm.

The results of the security analysis show that the propose



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now