The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol of the long-term evolution (LTE) network does not support Internet of Things (IoT) objects and has several security limitations, including transmission of the object’s (user/device) identity and key set identifier in plaintext over the network, synchronization, large overhead, limited identity privacy, and security attack vulnerabilities. In this article, we propose a new secure and efficient AKA protocol for the LTE network that supports secure and efficient communications among various IoT devices as well as among the users. Analysis shows that our protocol is secure, efficient, and privacy preserved, and reduces bandwidth consumption during authentication.
Nowadays, Short Message Service is being used in many daily life applications including healthcare monitoring, mobile banking, mobile commerce etc. But when we send an SMS from one mobile phone to another, the information contained in the SMS transmit as plain text. Sometimes this information may be confidential like account numbers, passwords, license numbers etc., and it is a major drawback to send such information through SMS while the traditional SMS service does not provide encryption to the information before its transmission. In this paper, we proposed an efficient and secure protocol called EasySMS which provides end-to-end secure communication through SMS between end users. The working of the protocol is presented by considering two different scenarios. The analysis of the proposed protocol shows that this protocol is able to prevent various attacks including SMS disclosure, over the air modification, replay attack, man-in-the-middle attack, and impersonation attack. The EasySMS protocol generates minimum communication and computation overheads as compare to existing SMSSec and PK-SIM protocols. On an average, the EasySMS protocol reduces 51% and 31% of the bandwidth consumption and reduces 62% and 45% of message exchanged during the authentication process as compare to SMSSec and PK-SIM protocols respectively. Authors claim that EasySMS is the first protocol completely based on the symmetric key cryptography and retain original architecture of cellular network.
The importance of an architectural semantic for service-oriented computing starts with the characteristics of software systems that has been recognized with sharing and the utilization of resources. However, an architectural characteristic for service-oriented based applications depends on interaction patterns that utilizes a data format in communication. These patterns also help in establishing communication between service components. The goal of service-oriented computing methodologies could be achieved by adopting a logical separation of services from the actual mechanism of resource assignment and allotment. This shows that how services are reliable as interaction patterns between service provider and requester. It generates the binding patterns between these two and establishes communication between them. This article discusses the mathematical-based semantic model that presents an architectural view for systems that follows a service-oriented computing methodology. It also briefs describes about different execution states and routes, which addresses the service specifications in service-oriented computing.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.