2019
DOI: 10.22266/ijies2019.0228.16
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Model for Machine to Machine Device Domain Based Group in a Smart City Architecture

Abstract: The new Internet of Things (IoT) applications are enabling Smart City initiatives worldwide. It provides the ability to remotely monitor, manage and control devices. The main features of a smart city include privacy of users and security of communication. The distributed architecture of IoT aims at providing location awareness and low-latency interactions to Machine-to-Machine (M2M) applications. In this context, the Long Term Evolution (LTE) technology and its evolutions are expected to play a major role as a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…The presence of IoT technology is one of the attempts made to enhance the quality of the lives of people. This new technology is hoped to be able to change human life in all respects [33]. In safe city life, good policies will result.…”
Section: Results Datamentioning
confidence: 99%
“…The presence of IoT technology is one of the attempts made to enhance the quality of the lives of people. This new technology is hoped to be able to change human life in all respects [33]. In safe city life, good policies will result.…”
Section: Results Datamentioning
confidence: 99%
“…It has been observed that the time required for a data packet sent by the UE to reach the server in the core network and for the server to send the response back to the UE is approximately 10 ms. The UE performs one asymmetric encryption operation, which is 100 µs [15], to compute SUCI and then sends the SUCI to the core network. The UDM decrypts the SUCI to have SUPI for confirmation.…”
Section: A Performance Analysis Of Drone Authenticationmentioning
confidence: 99%
“…resists against the replay and man-in-the-middle attack. If the IF code resists against these two attacks, then the embedded tools (OFMC, ATSE, SATMC, TA4SP) give the result of SAFE, state; otherwise, it gives the UNSAFE state [25].…”
Section: Basics Of Avispamentioning
confidence: 99%