Abstract

Most devices in the Internet of Things (IoT) utilize WiMAX communication, and Femtocells are used to provide reliable communication by eliminating shaded areas where wireless signals become weaker with distance and underground facilities. One downfall of this method is the possibility of eavesdropping through Man-in-the-Middle attacks. Forced latency interlock protocol is used to detect these attacks. This protocol uses a fixed latency value and does not consider packet size and distance. In this paper, we propose a dynamic delay time decision method for reducing the fixed delay time of the forced latency interlock protocol in wireless communications based on the IoT. The evaluation function considers the distance between the device, the packet size, and the bit rate of the broadband internet. The simulation experiments demonstrate the validity of our method, which reduces delay time by an average of 88.19% and increases detection rate by an average of 7.97%.

Highlights

  • The Internet of Things (IoT) is the interaction of the state with or without user intervention between people/things and things

  • Interlock protocol is based on wireless communication and is applicable in WiMAX femtocells [4]

  • The Client and Server each have their own secret key, as follows: a) The Client sends his public key to the Server. b) The Server sends his public key to the Client. c) The Client is encrypted with the Server’s public key and sends half of the encrypted data to the Server. d) The Server is encrypted with the Client’s public key and sends half of the encrypted data to the Client. e) The Client sends the other half to the Server. f) The Server gathers the two parts of the data received from the Client and decrypts them using its private key

Read more

Summary

Introduction

The Internet of Things (IoT) is the interaction of the state with or without user intervention between people/things and things. When shaded areas cause door lock, refrigerators, washing machines, lighting, and electronic devices such as IoT devices may deteriorate the internet service [1]. This problem can be solved by installing base station (BS) in the shaded area; installing them over many shaded areas may expand the area where service is affected. The Client gathers the two parts of the data received from the Server, and decrypts it with his private key. In this protocol, each step is performed after receiving the information transmitted in the previous step

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call