preview

What Is The Security Requirement To Protect 5G Enabled IOT Middleware

Decent Essays

Security Requirement to Protect 5G enabled IOT middleware:
Inorder to protect the IOT middleware from aforementioned attacks, some of the security requirements which needs to be considered are [1,2,3]:
1) Access Control- This technique is used to allow on genuine and users that are authorized access to the network resources. Since IOT is becoming ubiquitous , privacy is of foremost important and the sensitive information should be disclosed only to authentic users.
2) Confidentiality- Cryptography techniques can be used to meet this aim, Multiple symmetric and asymmetric techniques can be used and their implementation depends on the individual device capabilities as the IOT device operate in an environment where resources are not in …show more content…

7) Integrity- This is used to ensure that the data transmitted between the IOT devices has not been tinkered with by any unauthorized nodes either due to accident or due to some malicious intent. This can be ensured using MAC ie message authentication codes and employing a single hash function, which again depends on the device capabilities.

References
1) Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw.20(8), 2481–2501 (2014). doi:10.1007/s11276-014-0761-7
2) Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw.76, 146–164 (2015). doi:10.1016/j.comnet.2014.11. 008. http://www.sciencedirect.com/science/article/pii/S1389128614003971
3) Rodriguez, J.: Fundamentals of 5G Mobile Networks. Wiley, Hoboken (2015)

The security issues have driven the VIRTUS Middleware [12], an IoT middleware relying on the open eXtensible Messaging and Presence Protocol (XMPP), to provide a reliable and secure communication channel for distributed applications in 5G networks, which is protected with both authentication (through TLS protocol) and encryption (SASL protocol) mechanisms. OneM2M [32] proposes a global service layer platform for M2M communications. It aims at unifying the Global M2M Community, by enabling the interoperability of different M2M systems, across multiple networks and topologies on top of IP. The

Get Access