Security and impact of the IoT on mobile networks
نویسنده
چکیده
The ongoing evolution of wireless cellular networks is creating a new ecosystem with pervasive presence of a great variety of network-enabled objects which, based on unique addressing schemes, are able to interact with each other. Cellular connectivity is reaching beyond smartphones and tablets, providing access to data networks for connected home appliances, machinery and vehicles. The rapid evolution of mobile networking technologies and the transition towards IPv6 might drive this trend to an ecosystem where every single consumer item could be reachable through the cellular network. This convergence of the Internet and cellular mobility networks is breeding new Machine-to-Machine (M2M) communication systems, which are the enabling platform for the Internet of Things (IoT) [1]. Cellular-based IoT applications are experiencing a drastic growth backed up by the large investments from network operators [2]. Current studies forecast the cellular IoT to be 1000 times more profitable than mobile data and as lucrative for operators as the Short Messaging Service (SMS) [3]. This is an attractive new market for cellular operators, which are currently dealing with a heavily competitive market and declining revenues. Consequently, IoT applications are among the common denominator of some of the largest investments in mo-1 2 CHAPTER 1. SECURITY AND IMPACT OF THE IOT ON MOBILE NETWORKS bile and cellular technology innovation. Cellular operators are seeking valuable partnerships in markets such as connected cars [4] and remote health-care systems [5]. Indeed, forecasts preview the health industry as one of the main drivers of the IoT market over the next few years [6]. Consensus exists in the industry that great growth in mobile cellular connectivity from M2M and embedded mobile applications will be experienced. More than 50 billion non-personal data-only mobile devices are expected to join existing mobile networks, supporting this plethora of emerging applications [7]. Consequently, in order to provide ubiquitous broadband connectivity to the IoT, massive device connectivity (billions of connected devices) is one of the main goals for the design and planning of future 5G mobile systems [8]. The fourth generation of mobile networks, the Long Term Evolution (LTE), has been designed for greatly enhanced capacity in order to provide support to a large number of connected devices. As such, LTE introduces significant improvements at the Radio Access Network (RAN) and a more flexible IP-only (Internet Protocol) architecture at the Evolved Packet Core (EPC). Although a substantial percentage of current M2M systems operate over legacy second and …
منابع مشابه
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملA survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملThe Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices
Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devi...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملتأثیر حریم خصوصی، امنیت و اعتماد ادراک شده بر رفتار به اشتراکگذاری اطلاعات در شبکههای اجتماعی موبایل: نقش تعدیلکننده متغیر جنسیت
The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015