New cellular networks are capable of providing high mobility, whereas WLANs are known for having relatively higher bandwidths. Therefore, interworking cellular networks with WLANs offers ubiquitous data services and relatively high data rates across modern networks. This interworking will enable a user to access new cellular services via a WLAN, while roaming within a range of hotspots. To provide secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is used. However, EAP-AKA has several vulnerabilities. This paper analyzes vulnerabilities in LTE-WLAN interworking and proposes a new authentication and key agreement protocol based on EAP-AKA.
Smartphones and other mobile computing devices are being widely adopted globally [1].The increasing popularity of smart devices has led users to perform all their day to day activities using these devices [2]. Hence, M-banking has become more convenient, effective and reliable [3]. It is extremely necessary to provide the security services including; confidentiality, integrity, and authentication between the financial institutions" servers and the mobile device used by the customer, as their communications are through unsecured networks such as the Internet [4].Users" confidential information may be at risk due to fixed valuesbased security schemes, one level authentication, separate hard token-based authentication, hardware stealing, and Android-Based attacks. This paper specifies a comprehensive sought of how M-banking schemes can be assessed. Also it introduces a solution to mitigate most of these risks.
Internet of Things (IoT) and Artificial Intelligent (AI) are considered the key technologies for emerging 5G. The IoT empowers things to exchange data together using the internet towards a human beneficiary. The rapid growth of the IoT smart city influences diversified sources of data, a growing data sphere, and a massive number of sent packets, which are leading to a collision probability problem. AI technology coexists with IoT smart city networks to solve the collision problem. The paper starts to analyze the collision probability in the RAW and PRAW access channels of IEEE 802.11ah, compared to legacy IEEE 802.11 protocols. The paper derives two collision probability formulas in IEEE 802.11ah. Machine Learning (ML) algorithms as a subset of AI technology were proposed to classify and allocate each traffic pattern in the IoT smart city use case onto an appropriate IEEE 802.11ah access channel, denoted as adaptive IEEE 802.11ah MAC protocol. It is anticipated that the proposed adaptive IEEE 802.11ah protocol reduces the collision probability in the crowded IoT smart city networks for a percentage performance of 80% ~ 90% and it was obtained by the Decision Tree (DT) algorithm of supervised ML with 99.45% accuracy and 1.066 sec processing time.
The internet of things (IoT) and cloud computing are evolving technologies in the information technology field. Merging the pervasive IoT technology with cloud computing is an innovative solution for better analytics and decision-making. Deployed IoT devices offload different types of data to the cloud, while cloud computing converges the infrastructure, links up the servers, analyzes information obtained from the IoT devices, reinforces processing power, and offers huge storage capacity. However, this merging is prone to various cyber threats that affect the IoT-Cloud environment. Mutual authentication is considered as the forefront mechanism for cyber-attacks as the IoT-Cloud participants have to ensure the authenticity of each other and generate a session key for securing the exchanged traffic. While designing these mechanisms, the constrained nature of the IoT devices must be taken into consideration. We proposed a novel lightweight protocol (Light-AHAKA) for authenticating IoT-Cloud elements and establishing a key agreement for encrypting the exchanged sensitive data was proposed. In this paper, the formal verification of (Light-AHAKA) was presented to prove and verify the correctness of our proposed protocol to ensure that the protocol is free from design flaws before the deployment phase. The verification is performed based on two different approaches, the strand space model and the automated validation of internet security protocols and applications (AVISPA) tool.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.