Please use this identifier to cite or link to this item:
https://hdl.handle.net/10321/3742
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Nleya, Bharti | - |
dc.contributor.author | Bopape, Lebogang Puree | en_US |
dc.date.accessioned | 2021-12-07T14:34:51Z | - |
dc.date.available | 2021-12-07T14:34:51Z | - |
dc.date.issued | 2021-12-01 | - |
dc.identifier.uri | https://hdl.handle.net/10321/3742 | - |
dc.description | A thesis submitted in fulfillment of the requirements for the Master of Engineering Degree, Department of Electronic and Computer Engineering, Durban University of Technology, 2021. | en_US |
dc.description.abstract | With the advent of IoT, Device-to-Device (D2D) communications has afforded a new paradigm that reliably facilitates data exchange among devices in proximity without necessarily involving the base (core) network. It is geared towards the need to improve network performance where short-range communications is concerned, as well as supporting proximitybased services. However, the relentless growth in the number of network end-users as well as interconnected communication-capable devices, in the next-generation IoT-based 5G cellular networks has resulted in novel services and applications, most of which are security-sensitive. It is thus of paramount importance that security issues be addressed. A posing challenge is that the devices are mostly resource-constrained in both power and computing. As such, it is not practical to implement present day as well as traditional security frameworks and protocols under such a scenario, unless strides are taken towards the improvements of data throughput rates, higher bandwidth provisioning, lower round trip latencies, enhanced spectral efficiencies, and energy efficiency (leading to even lower power consumption, by the already constrained devices) in IoT 5G/LTE networks. Therefore, this work focused on exploring and designing schemes that enhance security and privacy among communicating parties. Otherwise, without reliable as well as robust privacy and security preservation measures in the network, most services and applications will be exposed to various forms of malicious attacks. With such a widened cyber-attack space, both privacy and security for end users can easily be compromised. The work herein addresses privacy for subscribers to the various available services and applications as well as security of the associated data. Ultimately, we propose a Fog-Cloud computing paradigm-assisted security framework that comprises two schemes. The aim is to implement a lightweight-based cartographic algorithm that ensures that communication overheads, round trip latencies, computational loads as well as energy consumption by the otherwise resource-constrained surveillance cameras deployed remotely, are kept minimal. Overall, by way of both analysis and simulation, we ascertain that a Fog-Cloud computing-based lightweight security-based scheme has the potential to greatly improve security and privacy preservation, as well as overall performance despite the resource-constrained nature of the devices. | en_US |
dc.format.extent | 149 p | en_US |
dc.language.iso | en | en_US |
dc.subject.lcsh | Internet of things--Security measures | en_US |
dc.subject.lcsh | Machine-to-machine communications | en_US |
dc.subject.lcsh | Computer networks--Security measures | en_US |
dc.subject.lcsh | Cloud computing--Security measures | en_US |
dc.subject.lcsh | Embedded internet devices | en_US |
dc.title | Privacy for D2D communications based applications and services in IoT enabled networks | en_US |
dc.type | Thesis | en_US |
dc.description.level | M | en_US |
dc.identifier.doi | https://doi.org/10.51415/10321/3742 | - |
local.sdg | SDG05 | - |
item.openairetype | Thesis | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.fulltext | With Fulltext | - |
Appears in Collections: | Theses and dissertations (Engineering and Built Environment) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
BOPAPE_2021.pdf | Thesis | 3.05 MB | Adobe PDF | View/Open |
Page view(s)
347
checked on Dec 22, 2024
Download(s)
224
checked on Dec 22, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.