Creating Security Modelling Framework Analysing in Internet of Things Using EC-GSM-IoT

Internet of Things (IoT) placed a vital role in making effective communication because it consists of several interconnected smart devices. In IoT, device communication started via different communication protocols like Wi-Fi, ZigBee. During the communication process, smart devices are affected by intermediate attacks, which causes several communication vulnerabilities. Therefore, successful communication protocols have to be developed to reduce intermediate attacks like insider attacks, DDoS. To achieve this goal in this work, Extended Coverage-GSM-IoT protocol has been integrated with the wide-mouth frog protocol for making the secure communication process. This protocol improves the overall IoT device integrity protocol and enables mutual authentication while making the communication process. The WMFP protocol validates the user identity that leads to reduce the replay and eavesdropping attacks. Thus, the process ensures a feasible and secure IoT communication environment with minimum complexity.

[1]  Sedat Akleylek,et al.  A survey on security threats and authentication approaches in wireless sensor networks , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).

[2]  Nikolay Kakanakov,et al.  Adaptive models for security and data protection in IoT with Cloud technologies , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[3]  Igor Cavrak,et al.  Survey on Low Power Wide Area Networks in IoT , 2020, 2020 International Conference on Smart Systems and Technologies (SST).

[4]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.

[5]  Ouajdi Korbaa,et al.  A survey on attacks in Internet of Things based networks , 2017, 2017 International Conference on Engineering & MIS (ICEMIS).

[6]  Ana de Almeida,et al.  SMART sensor network: With Bluetooth low energy and CAN-BUS , 2017, 2017 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI).

[7]  Mohammed Hazim Alkawaz,et al.  Smart IOT Surveillance Multi-Camera Monitoring System , 2019, 2019 IEEE 7th Conference on Systems, Process and Control (ICSPC).

[8]  Saima Zafar,et al.  Performance Analysis of Narrowband Internet of Things (NB-IoT) Deployment Modes , 2019, 2019 22nd International Multitopic Conference (INMIC).

[9]  S. Sengupta,et al.  A survey on Classification of Cyber-attacks on IoT and IIoT devices , 2020, 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).

[10]  Sanjeev Jain,et al.  A Survey on Energy Efficient Narrowband Internet of Things (NBIoT): Architecture, Application and Challenges , 2019, IEEE Access.

[11]  Walaa Hamouda,et al.  Cellular LTE-A Technologies for the Future Internet-of-Things: Physical Layer Features and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[12]  Oksana Mnushka,et al.  Security Model of IOT-based Systems , 2020, 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET).

[13]  David Kanume Koroma,et al.  A survey on security issues and wearable sensors in wireless body area network for healthcare system , 2017, 2017 14th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP).

[14]  Anish M. Kurien,et al.  The Narrowband Internet of Things (NB-IoT) Resources Management Performance State of Art, Challenges, and Opportunities , 2020, IEEE Access.

[15]  A. V. Shvedov,et al.  Designing WI-FI Wireless Networks with High Density of Subscriber Service , 2020, 2020 Systems of Signals Generating and Processing in the Field of on Board Communications.

[16]  Ramjee Prasad,et al.  Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[17]  R. D. Garg,et al.  Environment Monitoring System through Internet of Things(IOT) , 2018, 2018 International Conference on Information , Communication, Engineering and Technology (ICICET).

[18]  Yong-Jin Park,et al.  A Survey on Trend and Classification of Internet of Things Reviews , 2020, IEEE Access.

[19]  Sherali Zeadally,et al.  Smart healthcare , 2019, PSU Research Review.

[20]  Andreas Jacobsson,et al.  IoTSM: An End-to-end Security Model for IoT Ecosystems , 2019, 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[21]  Nasib Singh Gill,et al.  Smart Sensors: Analysis of Different Types of IoT Sensors , 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI).

[22]  Shengli Sun,et al.  Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey , 2020, IEEE Access.

[23]  Wei Xiang,et al.  Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities , 2017, IEEE Access.

[24]  Shiji Zheng,et al.  Research on SDN-based IoT Security Architecture Model , 2019, 2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC).

[25]  Sameer Qazi,et al.  Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios , 2020, IEEE Access.

[26]  Jian Zhang,et al.  The Current Research of IoT Security , 2019, 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC).

[27]  Ashish Bagwari,et al.  IoT based Smart home: Security Aspects and security architecture , 2020, 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT).

[28]  Manish Kumar,et al.  Lightweight Data Security Model for IoT Applications: A Dynamic Key Approach , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[29]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2020, Information Security and Cryptography.

[30]  Ali Mansour,et al.  Internet-of-Things (IoT)-Based Smart Agriculture: Toward Making the Fields Talk , 2019, IEEE Access.

[31]  Manoj Kumar,et al.  Layer based security in Narrow Band Internet of Things (NB-IoT) , 2020, Comput. Networks.

[32]  Sakir Sezer,et al.  Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things , 2018, 2018 IEEE Conference on Dependable and Secure Computing (DSC).

[33]  Guanglin Li,et al.  Medical Information Security for Wearable Body Sensor Networks in Smart Healthcare , 2019, IEEE Consumer Electronics Magazine.

[34]  Mohieddine Benammar,et al.  Smart-home automation using IoT-based sensing and monitoring platform , 2018, 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG 2018).

[35]  Kwok-Yan Lam,et al.  Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things , 2018, Proceedings of the IEEE.