Security Issues in Narrowband-IoT: Towards Green Communication

被引:0
作者
Kumar, Vinod [1 ]
Jha, Rakesh Kumar [1 ]
Jain, Sanjeev [2 ]
机构
[1] SMVDU, Katra, India
[2] IIITDM, Jabalpur, India
来源
2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS) | 2021年
关键词
Game Theory; UAV; SCA; IoT; NB-IoT; Security; Channel Quality Information (CQI); INTERNET;
D O I
10.1109/COMSNETS51098.2021.9352739
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the security platform of Internet of Things (IoT), a licensed Low Power Wide Area Network (LPWAN) technology, named Narrowband Internet of Things (NB-IoT) is playing a vital role in transferring the information between objects. This technology is preferable for applications having a low data rate. As the number of subscribers increases, attack possibilities raise simultaneously. So securing the transmission between the objects becomes a big task. Bandwidth spoofing is one of the most sensitive attack that can be performed on the communication channel that lies between the access point and user equipment. This research proposal objective is to secure the system from the attack based on Unmanned Aerial vehicles (UAVs) enabled Small Cell Access (SCA) device which acts as an intruder between the user and valid SCA and investigating the scenario when any intruder device comes within the communication range of the NB-IoT enabled device. Here, this article also proposed a mathematical solution for the proposed scenario.
引用
收藏
页码:369 / 371
页数:3
相关论文
共 10 条
  • [1] Anand S, 2017, PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), P486, DOI 10.1109/ICICCT.2017.7975247
  • [2] [Anonymous], 2016, 36211 3GPP TS
  • [3] Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network
    Cao, Jin
    Yu, Pu
    Ma, Maode
    Gao, Weifeng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1561 - 1575
  • [4] Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network
    Gupta, Akhil
    Jha, Rakesh Kumar
    Gandotra, Pimmy
    Jain, Sanjeev
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (01) : 618 - 632
  • [5] Combating the Control Signal Spoofing Attack in UAV Systems
    Huang, Ke-Wen
    Wang, Hui-Ming
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (08) : 7769 - 7773
  • [6] ANGUISH: Security attack in narrowband-Internet of Things (NB-IoT) using game theory and hardware analysis
    Kumar, Vinod
    Jha, Rakesh Kumar
    Jain, Sanjeev
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (06)
  • [7] NB-IoT Security: A Survey
    Kumar, Vinod
    Jha, Rakesh Kumar
    Jain, Sanjeev
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (04) : 2661 - 2708
  • [8] UAV-Aided Secure Communications With Cooperative Jamming
    Lee, Hoon
    Eom, Subin
    Park, Junhee
    Lee, Inkyu
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (10) : 9385 - 9392
  • [9] A Survey on Energy Efficient Narrowband Internet of Things (NBIoT): Architecture, Application and Challenges
    Popli, Sakshi
    Jha, Rakesh Kumar
    Jain, Sanjeev
    [J]. IEEE ACCESS, 2019, 7 : 16739 - 16776
  • [10] A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems
    Wu, Hao
    Wang, Wei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1432 - 1445