scholarly journals Homomorphic Encryption and Network Coding in IoT Architectures: Advantages and Future Challenges

Electronics ◽  
2019 ◽  
Vol 8 (8) ◽  
pp. 827 ◽  
Author(s):  
Goiuri Peralta ◽  
Raul G. Cid-Fuentes ◽  
Josu Bilbao ◽  
Pedro M. Crespo

The introduction of the Internet of Things (IoT) is creating manifold new services and opportunities. This new technological trend enables the connection of a massive number of devices among them and with the Internet. The integration of IoT with cloud platforms also provides large storage and computing capabilities, enabling Big Data analytics and bidirectional communication between devices and users. Novel research directions are showing that Network Coding (NC) can increase the robustness and throughput of wireless networks, as well as that Homomorphic Encryption (HE) can be used to perform computations in the cloud while maintaining data privacy.

Author(s):  
Mohammed A. Salem ◽  
Sherine M. Abd El-Kader ◽  
Mohamed I. Youssef ◽  
Ibrahim F. Tarrad

Machine type communication (MTC), additionally called machine-to-machine (M2M) communications, broadly is referring to a number of cooperating machines exchange sensed data or information and make decisions with slight or zero human intervention. M2M technology will let a massive number of devices to be interconnected over the internet leading to a rapid development in recent time, which can be a promising enabling key for many areas, particularly for the internet of things (IoT) and 5th generation (5G) networks. This chapter presents a summary and state of art of M2M communications characteristics, taxonomy, applications, different technologies for deploying of M2M communications, and future challenges.


Author(s):  
Mohammed A. Salem ◽  
Sherine M. Abd El-Kader ◽  
Mohamed I. Youssef ◽  
Ibrahim F. Tarrad

Machine type communication (MTC), additionally called machine-to-machine (M2M) communications, broadly is referring to a number of cooperating machines exchange sensed data or information and make decisions with slight or zero human intervention. M2M technology will let a massive number of devices to be interconnected over the internet leading to a rapid development in recent time, which can be a promising enabling key for many areas, particularly for the internet of things (IoT) and 5th generation (5G) networks. This chapter presents a summary and state of art of M2M communications characteristics, taxonomy, applications, different technologies for deploying of M2M communications, and future challenges.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Lei Zhang ◽  
Yu Huo ◽  
Qiang Ge ◽  
Yuxiang Ma ◽  
Qiqi Liu ◽  
...  

Various applications of the Internet of Things assisted by deep learning such as autonomous driving and smart furniture have gradually penetrated people’s social life. These applications not only provide people with great convenience but also promote the progress and development of society. However, how to ensure that the important personal privacy information in the big data of the Internet of Things will not be leaked when it is stored and shared on the cloud is a challenging issue. The main challenges include (1) the changes in access rights caused by the flow of manufacturers or company personnel while sharing and (2) the lack of limitation on time and frequency. We propose a data privacy protection scheme based on time and decryption frequency limitation that can be applied in the Internet of Things. Legitimate users can obtain the original data, while users without a homomorphic encryption key can perform operation training on the homomorphic ciphertext. On the one hand, this scheme does not affect the training of the neural network model, on the other hand, it improves the confidentiality of data. Besides that, this scheme introduces a secure two-party agreement to improve security while generating keys. While revoking, each attribute is specified for the validity period in advance. Once the validity period expires, the attribute will be revoked. By using storage lists and setting tokens to limit the number of user accesses, it effectively solves the problem of data leakage that may be caused by multiple accesses in a long time. The theoretical analysis demonstrates that the proposed scheme can not only ensure safety but also improve efficiency.


Technologies ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 22
Author(s):  
Eljona Zanaj ◽  
Giuseppe Caso ◽  
Luca De Nardis ◽  
Alireza Mohammadpour ◽  
Özgü Alay ◽  
...  

In the last years, the Internet of Things (IoT) has emerged as a key application context in the design and evolution of technologies in the transition toward a 5G ecosystem. More and more IoT technologies have entered the market and represent important enablers in the deployment of networks of interconnected devices. As network and spatial device densities grow, energy efficiency and consumption are becoming an important aspect in analyzing the performance and suitability of different technologies. In this framework, this survey presents an extensive review of IoT technologies, including both Low-Power Short-Area Networks (LPSANs) and Low-Power Wide-Area Networks (LPWANs), from the perspective of energy efficiency and power consumption. Existing consumption models and energy efficiency mechanisms are categorized, analyzed and discussed, in order to highlight the main trends proposed in literature and standards toward achieving energy-efficient IoT networks. Current limitations and open challenges are also discussed, aiming at highlighting new possible research directions.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 7606-7640 ◽  
Author(s):  
Ikram Ud Din ◽  
Mohsen Guizani ◽  
Suhaidi Hassan ◽  
Byung-Seo Kim ◽  
Muhammad Khurram Khan ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document