Research on Security Evaluation Indicator System of Smart Home
Issue:
Volume 9, Issue 1, June 2020
Pages:
11-16
Received:
18 October 2020
Published:
27 November 2020
Abstract: Nowadays, smart home technology is still in continuous development; more and more enterprises and organizations began to enter this industry. However, the security problems and the unknown of emerging technologies make that most people are still in the wait-and-see stage for smart home systems. Under the background that many enterprises have different opinions on the security of smart home systems, this study is committed to forming a set of general evaluation standard index system. The main research work of this paper: the influencing factors of smart home system security are analyzed; according to the characteristics of smart home system equipment, the system security is divided into four aspects: control system, communication technology, intelligent products and cloud services; based on the current national standards, combined with the safety standards of various organizations, safety indicators are selected for each aspect. Finally, the established smart home system security evaluation index system enables users to have a set of relatively general evaluation methods among many different standards to compare and consider the current smart home system with various brands. It is helpful for users to try or further understand the smart home industry to promote the development and progress of the smart home industry.
Abstract: Nowadays, smart home technology is still in continuous development; more and more enterprises and organizations began to enter this industry. However, the security problems and the unknown of emerging technologies make that most people are still in the wait-and-see stage for smart home systems. Under the background that many enterprises have differ...
Show More
Delay Sensitive Protocol for High Availability LTE Handovers
Vincent Omollo Nyangaresi,
Silvance Onyango Abeka,
Anthony Joachim Rodrigues
Issue:
Volume 9, Issue 1, June 2020
Pages:
1-10
Received:
30 December 2019
Accepted:
13 January 2020
Published:
1 April 2020
Abstract: Long delays during the handover process lead to dropped calls which deteriorate the network quality of service. In addition, these delays impede the incorporation of authentication during the handover process which exposes the handover process to attacks such as desynchronization, network masquerading and session hijacking. In this paper, a delay sensitive protocol is developed based on the neuro-fuzzy optimization process and tracking area partitioning into no handover region, low probability handover region and high probability handover region that facilitated advance buffering of the figures of merit. The protocol computes the average delays during the handover process such that handovers taking longer durations than the average value are queued in the mobility management entity (MME) buffer and dispatched in a first in first out (FIFO) basis. The conventional permitted duration between handover command and handover execution is between 0.5 seconds and 1.5 seconds. To prevent holding the network resources for long durations, a handover termination duration was set to the lower bound of this conventional permitted duration, which was 0.5 seconds, such that handovers taking longer this duration were explicitly dropped. The reduced delays during the handover process facilitated the incorporation of entities authentication before subscribers can be transferred to the target cell. Simulation results showed the developed protocol greatly reduced handover delays to an average of 0.048 seconds. In addition, the source evolved Node-B (eNB), user equipment (UE) and target eNB were able to authenticate each other to boost security during the handover process.
Abstract: Long delays during the handover process lead to dropped calls which deteriorate the network quality of service. In addition, these delays impede the incorporation of authentication during the handover process which exposes the handover process to attacks such as desynchronization, network masquerading and session hijacking. In this paper, a delay s...
Show More