Ontology type: schema:ScholarlyArticle
2019-04
AUTHORSNur Nabila Mohamed, Yusnani Mohd Yussoff, Mohd Anuar Mat Isa, Habibah Hashim
ABSTRACTEmbedded Machine-to-Machine (M2M) is one of the hottest research topics in recent industrial Internet of Things. In order to serve the communication to effectively transfer data and messages between machines, the system must incorporate a file transfer protocol, known as Trivial File Transfer Protocol (TFTP). However, the main constraint is lack of security mechanism during TFTP Client–Server communication whereby its reliability is questionable as the protocol does not support any authentication or encryption methods, also provide no access control and zero protection from Man-In-The-Middle. Hence, in order to enhance the protocol security, hybrid security approach combining Diffie Hellman Key Exchange (DHKE) scheme and Advanced Encryption Standard symmetric encryption algorithm are proposed to be integrated into TFTP packet header. In this work, we present a performance comparison of three different protocols: the original TFTP protocol, TFTP protocol with single security extension, and our proposed TFTP protocol integrated with hybrid security approach to analyse the effectiveness of the method. The finding demonstrates that our proposed secure TFTP protocol generates comparable execution time as when implementing single encryption option, also more reliable to be used in the commercial system especially for low-cost M2M embedded infrastructure. More... »
PAGES511-523
http://scigraph.springernature.com/pub.10.1007/s11235-018-0522-5
DOIhttp://dx.doi.org/10.1007/s11235-018-0522-5
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1107828729
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"name": [
"Computer Engineering Department, Universiti Teknologi, MARA, 40450, Shah Alam, Selangor, Malaysia"
],
"type": "Organization"
},
"familyName": "Mohamed",
"givenName": "Nur Nabila",
"id": "sg:person.015250360163.98",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015250360163.98"
],
"type": "Person"
},
{
"affiliation": {
"name": [
"Computer Engineering Department, Universiti Teknologi, MARA, 40450, Shah Alam, Selangor, Malaysia"
],
"type": "Organization"
},
"familyName": "Mohd Yussoff",
"givenName": "Yusnani",
"id": "sg:person.010542373667.92",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010542373667.92"
],
"type": "Person"
},
{
"affiliation": {
"name": [
"Computer Engineering Department, Universiti Teknologi, MARA, 40450, Shah Alam, Selangor, Malaysia"
],
"type": "Organization"
},
"familyName": "Mat Isa",
"givenName": "Mohd Anuar",
"id": "sg:person.014204350135.48",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014204350135.48"
],
"type": "Person"
},
{
"affiliation": {
"name": [
"Computer Engineering Department, Universiti Teknologi, MARA, 40450, Shah Alam, Selangor, Malaysia"
],
"type": "Organization"
},
"familyName": "Hashim",
"givenName": "Habibah",
"id": "sg:person.015121662377.74",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015121662377.74"
],
"type": "Person"
}
],
"citation": [
{
"id": "https://doi.org/10.1016/j.cose.2015.09.006",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1009668658"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/j.procs.2015.04.109",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1020538334"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-0-387-74390-5_3",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1020818252",
"https://doi.org/10.1007/978-0-387-74390-5_3"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-94-017-9804-4_41",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1030004824",
"https://doi.org/10.1007/978-94-017-9804-4_41"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/j.comcom.2008.05.041",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1030143671"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11801412_8",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1041684100",
"https://doi.org/10.1007/11801412_8"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11801412_8",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1041684100",
"https://doi.org/10.1007/11801412_8"
],
"type": "CreativeWork"
},
{
"id": "https://app.dimensions.ai/details/publication/pub.1042549680",
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-04101-3",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1042549680",
"https://doi.org/10.1007/978-3-642-04101-3"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-04101-3",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1042549680",
"https://doi.org/10.1007/978-3-642-04101-3"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/tit.1976.1055638",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061647862"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1587/transinf.2013thp0009",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1068092349"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.4316/aece.2013.02004",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1072511618"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.18535/ijecs/v6i4.06",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1084637095"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s11235-017-0340-1",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1085886568",
"https://doi.org/10.1007/s11235-017-0340-1"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s11235-017-0340-1",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1085886568",
"https://doi.org/10.1007/s11235-017-0340-1"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s11235-017-0345-9",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1085999710",
"https://doi.org/10.1007/s11235-017-0345-9"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s11235-017-0345-9",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1085999710",
"https://doi.org/10.1007/s11235-017-0345-9"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/iscaie.2012.6482117",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1093276154"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/wmsvm.2010.48",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1093743116"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/siitme.2014.6967021",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1093780314"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/eucnc.2014.6882661",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094078990"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/icicic.2009.80",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094290791"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/comnet.2014.6840934",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094465119"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/emes.2015.7158440",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094757110"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/trustcom.2012.189",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094779457"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/csnt.2013.97",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094933377"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/csnt.2013.97",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094933377"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/wicom.2008.1223",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095543287"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/apmediacast.2016.7878165",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095792717"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/itnec.2017.8285102",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1100928282"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1063/1.5032036",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1108108164"
],
"type": "CreativeWork"
}
],
"datePublished": "2019-04",
"datePublishedReg": "2019-04-01",
"description": "Embedded Machine-to-Machine (M2M) is one of the hottest research topics in recent industrial Internet of Things. In order to serve the communication to effectively transfer data and messages between machines, the system must incorporate a file transfer protocol, known as Trivial File Transfer Protocol (TFTP). However, the main constraint is lack of security mechanism during TFTP Client\u2013Server communication whereby its reliability is questionable as the protocol does not support any authentication or encryption methods, also provide no access control and zero protection from Man-In-The-Middle. Hence, in order to enhance the protocol security, hybrid security approach combining Diffie Hellman Key Exchange (DHKE) scheme and Advanced Encryption Standard symmetric encryption algorithm are proposed to be integrated into TFTP packet header. In this work, we present a performance comparison of three different protocols: the original TFTP protocol, TFTP protocol with single security extension, and our proposed TFTP protocol integrated with hybrid security approach to analyse the effectiveness of the method. The finding demonstrates that our proposed secure TFTP protocol generates comparable execution time as when implementing single encryption option, also more reliable to be used in the commercial system especially for low-cost M2M embedded infrastructure.",
"genre": "research_article",
"id": "sg:pub.10.1007/s11235-018-0522-5",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isPartOf": [
{
"id": "sg:journal.1049187",
"issn": [
"1018-4864",
"1572-9451"
],
"name": "Telecommunication Systems",
"type": "Periodical"
},
{
"issueNumber": "4",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "70"
}
],
"name": "Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis",
"pagination": "511-523",
"productId": [
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"2458efc402db261ff67741ac7ed44557389ae64bc3f33df67c748e0866f128ae"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s11235-018-0522-5"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1107828729"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s11235-018-0522-5",
"https://app.dimensions.ai/details/publication/pub.1107828729"
],
"sdDataset": "articles",
"sdDatePublished": "2019-04-11T13:04",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000366_0000000366/records_112035_00000000.jsonl",
"type": "ScholarlyArticle",
"url": "https://link.springer.com/10.1007%2Fs11235-018-0522-5"
}
]
Download the RDF metadata as:Â json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11235-018-0522-5'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11235-018-0522-5'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11235-018-0522-5'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11235-018-0522-5'
This table displays all metadata directly associated to this object as RDF triples.
173 TRIPLES
21 PREDICATES
54 URIs
19 LITERALS
7 BLANK NODES