Please use this identifier to cite or link to this item: https://hdl.handle.net/10321/3742
DC FieldValueLanguage
dc.contributor.advisorNleya, Bharti-
dc.contributor.authorBopape, Lebogang Pureeen_US
dc.date.accessioned2021-12-07T14:34:51Z-
dc.date.available2021-12-07T14:34:51Z-
dc.date.issued2021-12-01-
dc.identifier.urihttps://hdl.handle.net/10321/3742-
dc.descriptionA thesis submitted in fulfillment of the requirements for the Master of Engineering Degree, Department of Electronic and Computer Engineering, Durban University of Technology, 2021.en_US
dc.description.abstractWith the advent of IoT, Device-to-Device (D2D) communications has afforded a new paradigm that reliably facilitates data exchange among devices in proximity without necessarily involving the base (core) network. It is geared towards the need to improve network performance where short-range communications is concerned, as well as supporting proximitybased services. However, the relentless growth in the number of network end-users as well as interconnected communication-capable devices, in the next-generation IoT-based 5G cellular networks has resulted in novel services and applications, most of which are security-sensitive. It is thus of paramount importance that security issues be addressed. A posing challenge is that the devices are mostly resource-constrained in both power and computing. As such, it is not practical to implement present day as well as traditional security frameworks and protocols under such a scenario, unless strides are taken towards the improvements of data throughput rates, higher bandwidth provisioning, lower round trip latencies, enhanced spectral efficiencies, and energy efficiency (leading to even lower power consumption, by the already constrained devices) in IoT 5G/LTE networks. Therefore, this work focused on exploring and designing schemes that enhance security and privacy among communicating parties. Otherwise, without reliable as well as robust privacy and security preservation measures in the network, most services and applications will be exposed to various forms of malicious attacks. With such a widened cyber-attack space, both privacy and security for end users can easily be compromised. The work herein addresses privacy for subscribers to the various available services and applications as well as security of the associated data. Ultimately, we propose a Fog-Cloud computing paradigm-assisted security framework that comprises two schemes. The aim is to implement a lightweight-based cartographic algorithm that ensures that communication overheads, round trip latencies, computational loads as well as energy consumption by the otherwise resource-constrained surveillance cameras deployed remotely, are kept minimal. Overall, by way of both analysis and simulation, we ascertain that a Fog-Cloud computing-based lightweight security-based scheme has the potential to greatly improve security and privacy preservation, as well as overall performance despite the resource-constrained nature of the devices.en_US
dc.format.extent149 pen_US
dc.language.isoenen_US
dc.subject.lcshInternet of things--Security measuresen_US
dc.subject.lcshMachine-to-machine communicationsen_US
dc.subject.lcshComputer networks--Security measuresen_US
dc.subject.lcshCloud computing--Security measuresen_US
dc.subject.lcshEmbedded internet devicesen_US
dc.titlePrivacy for D2D communications based applications and services in IoT enabled networksen_US
dc.typeThesisen_US
dc.description.levelMen_US
dc.identifier.doihttps://doi.org/10.51415/10321/3742-
local.sdgSDG05-
item.openairetypeThesis-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.grantfulltextopen-
item.languageiso639-1en-
item.fulltextWith Fulltext-
Appears in Collections:Theses and dissertations (Engineering and Built Environment)
Files in This Item:
File Description SizeFormat
BOPAPE_2021.pdfThesis3.05 MBAdobe PDFView/Open
Show simple item record

Page view(s)

347
checked on Dec 22, 2024

Download(s)

224
checked on Dec 22, 2024

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.