Abstract
Internet of things (IoT) aims at connecting a large number of devices for supporting “Connectivity to All” in the 5G networks. With connections between the majority of computing devices, capturing a single entity can expose the perimeter of the entire network. Remote diagnosis of the IoT devices can help in identification of such loopholes. However, if an intruder is already present in the network, it can falsify the diagnostic procedures and can cause serious threats to the network. Thus, an efficient strategy is required which can provide remote diagnosis along with the secure validation of IoT devices. In this paper, fuzzy logic is used to resolve the safety decisions and remote diagnosis of IoT devices in 5G networks. The proposed solution uses a two-pass methodology to generate inference rules at the central as well as the local inference engine. The proposed approach evaluates the network in two phases. The first phase emphasizes on the remote diagnosis and the second phase emphasizes on the remote validation. On the basis of these phases, a remote assessment protocol is also proposed which helps in remote validations with lower overheads and ease of deployment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
MacGillivray, C., Turner, V.: Worldwide internet of things forecast, 2015–2020, May 2015. http://www.idc.com/getdoc.jsp
Sharma, V., You, I., Kumar, R.: ISMA: intelligent sensing model for anomalies detection in cross platform osns with a case study on IOT. IEEE Access 5, 3284–3301 (2017)
Sharma, V., Lim, J.D., Kim, J.N., You, I.: SACA: self-aware communication architecture for IOT using mobile fog servers. Mob. Inf. Syst. 2017, 1–17 (2017)
Kumar, R., Sharma, V., Kaur, R.: UAVs assisted content-based sensor search in the Internet of Things. Electron. Lett. (2017). https://doi.org/10.1049/el.2016.3487
Skarlat, O., Schulte, S., Borkowski, M., Leitner, P.: Resource provisioning for IOT services in the Fog. In: 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA), pp. 32–39. IEEE (2016)
Aram, S., Shirvani, R.A., Pasero, E.G., Chouikha, M.F.: Implantable medical devices; networking security survey. J. Internet Serv. Inf. Secur. (JISIS) 6, 40–60 (2016)
Jiang, X., Ge, X., Yu, J., Kong, F., Cheng, X., Hao, R.: An efficient symmetric searchable encryption scheme for cloud storage. J. Internet Serv. Inf. Secur. (JISIS) 7, 1–18 (2017)
Sbeyti, H., Malli, M., Al-Tahat, K., Fadlallah, A., Youssef, M.: Scalable extensible middleware framework for context-aware mobile applications (SCAMMP). J. Wirel. Mob. Netw. Ubiquitous Comput. Depend. Appl. (JoWUA) 7, 77–98 (2016)
Baiardi, F., Tonelli, F., Isoni, L.: Application vulnerabilities in risk assessment and management. J. Wirel. Mob. Netw. Ubiquitous Comput. Depend. Appl. (JoWUA) 7, 41–59 (2016)
Hernández-Ramos, J.L., Jara, A.J., Marin, L., Skarmeta, A.F.: Distributed capability-based access control for the Internet of Things. J. Internet Serv. Inf. Secur. (JISIS) 3(3/4), 1–16 (2013)
Lee, J.-Y., Lin, W.-C., Huang, Y.-H.: A lightweight authentication protocol for internet of things. In: 2014 International Symposium on Next-Generation Electronics (ISNE), pp. 1–2. IEEE (2014)
Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: lightweight secure coap for the Internet of Things. IEEE Sens. J. 13(10), 3711–3720 (2013)
Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw. 11(8), 2710–2723 (2013)
Jara, A.J., Zamora-Izquierdo, M.A., Skarmeta, A.F.: Interconnection framework for mhealth and remote monitoring based on the Internet of Things. IEEE J. Sel. Areas Commun. 31(9), 47–65 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Sharma, V., Kim, J., Kwon, S., You, I., Chen, HC. (2018). Fuzzy-Based Protocol for Secure Remote Diagnosis of IoT Devices in 5G Networks. In: Lin, YB., Deng, DJ., You, I., Lin, CC. (eds) IoT as a Service. IoTaaS 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 246. Springer, Cham. https://doi.org/10.1007/978-3-030-00410-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-00410-1_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00409-5
Online ISBN: 978-3-030-00410-1
eBook Packages: Computer ScienceComputer Science (R0)