Font Size: a A A

IoT Device Security for 5G Networ

Posted on:2019-08-17Degree:Ph.DType:Dissertation
University:The City College of New YorkCandidate:Ahmed, Kazi JFull Text:PDF
GTID:1478390017987800Subject:Electrical engineering
Abstract/Summary:
Internet of Things (IoT) is the reality of a new and powerful ubiquitous technology for the rapidly booming 5G network. IoT is not only interconnecting devices, vehicles, buildings, cities etc. but in an efficient and smart way. One of the rising IoT technologies that shall impact the society with great extent is the Vehicular technology. The IEEE was the first to have specified a standard for this rising technology. However, there are certain security issues with the existing IEEE WAVE standard such as privacy, management of certificates and certificate revocation list, and key escrow problems. Therefore, we have proposed a layered scalable WAVE security to remedy those problems using both asymmetric and symmetric encryption algorithms. Apart from fulfilling basic security requirements, our proposed scheme focuses on two other important aspects of VANET: the scalability and expedited delivery of high priority message. For scalability, the whole region is divided into security domains. At the top level, the Regional Transportation Authority (RTA) manages the keys for Master and Edge RSU (MRSU/ERSU), which in turn stores the keys and other information of RSU. MRSU/ERSU also provide the pseudonym seeds and store information of vehicles. RSU is used only as access point for contacting transportation authority or to access internet. High priority emergency message delivery is expedited by using symmetric key cryptography. In the mean time 3rd Generation Partnership Project (3GPP) also released their standard for LTE-based Vehicle-to-Everything (V2X) service. We evaluated the new LTE-based V2X architecture in regards to V2X message delivery and security requirements. We showed that a proper resource allocation and reference point (channel) selection could accommodate all types of V2X message deliveries. However, focusing more on security, we deemed that LTE-based V2X security fell short of meeting adequate security requirements, especially in preserving the privacy. Hence, we proposed a privacy preserving security for LTE-based V2X service. Considering the privacy as the top security requirement, we seamlessly integrate our security scheme with the specified LTE security architecture. However, the V2X protocol layer security alone cannot protect the privacy since resource allocation with a regular pattern (semi-persistence) to deliver V2X periodic messages may leak the location privacy. Therefore, we employ different resource allocation approaches to various types of message deliveries to preserve their privacy. Specifically, the emergency message delivery, being the most time critical and occurring in random time, is provisioned using PC5 autonomous resource allocation (ARA). To curtail the collision, we propose a novel ARA approach called Random Access with Status Feedback (RASFB) based on Rel. 12 mode 2. Further, apart from cryptographic approach, we also considered Intrusion Detection System (IDS) technique for IoT devices, especially for resource constraint ones. To this regard we proposed Stochastic Computing (SC) based IDS which consume less time and energy compare to the software based one and less area compared to its Binary Radix computing (BC) counterpart. To the best of our knowledge, this is the first effort to present SC structure for neural network based IDS.
Keywords/Search Tags:Security, Iot, V2X, IDS, Resource allocation
Related items