The need to establish a secure communication for most applications of Internet of Things (IoT) has become increasingly crucial. Nevertheless, one of the major issues of such networks is how to establish cryptographic keys between all IoT objects to ensure secure data exchange. Several key management schemes have been suggested in the literature to achieve this goal, but they must be revised and innovated, while taking into account the limited resources of IoT objects. Likewise, the IoT presents a system where objects belonging to the physical world, are connected to the Internet, and have the capacity to measure, communicate, and act around all over the world. Nevertheless, some information available to IoT objects is private, hence the need to ensure an access control whose aim is to guarantee that the information be accessible only to those whose the access is allowed. In this paper, we propose a scheme involving two basic modules, namely key management, and access control.The key management module is designed to ensure the symmetric key generation for the IoT objects in a completely distributed manner without resorting to a central authority. In contrast, the access control module is used to impose an access control policy so as to prevent unauthorized access to services provided by a particular IoT object. The latter is ensured thanks to the existing cooperation between the TGOs servers of dierent domains in the IoT. Through assessments based on security analysis, we demonstrate that the proposed scheme is more secure than the existing ones. Simulations were also performed to validate the proposed solution by comparing it with some relevant concurrent schemes. The obtained results are not only encouraging, but also very favorable for the proposed scheme.
SummaryThe full‐duplex radio transmission technique is a prominent feature in the physical layer of the new IEEE 802.11ax standard for promoting the use of WiFi 6, also called HEW (High‐Efficiency Wireless local area network). Based on this unprecedented technique, a WiFi transmitter has the ability to transmit and receive data simultaneously using the same radio channel, thereby doubling the network capacity and spectral efficiency. However, many challenges related to the MAC (medium access control) layer (including full‐duplex configurations, hidden relationship, unbalance between data streams, and overhead) should be addressed to fully benefit from this technique. The aim of this paper is to design, implement, and assess a new Full‐Duplex MAC protocol by meeting the inherent challenges in controlling full‐duplex radio communications. Accordingly, an efficient and coordinated control protocol is proposed, whose basic principle is to exchange all relevant control information and transmit data without loss or unnecessary delay. The performance evaluation of the proposed protocol demonstrates that the results obtained are the best, especially when the network is dense or the traffic from the access point is heavy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.