End-to-end security in embedded system for modern mobile communication technologies

被引:0
|
作者
Venu, D. [1 ]
J, Babu [2 ]
Saravanakumar, R. [3 ]
Cosio Borda, Ricardo Fernando [4 ]
Abd Algani, Yousef Methkal [5 ,6 ]
Kiran Bala, B. [7 ]
机构
[1] Department of ECE, Kakatiya Institute of Technology and Science, Warangal, India
[2] Department Electronics and Communication Engineering, Dadi Institute of Engineering & Technology, Anakapalle, India
[3] Department of Wireless Communication, Institute of ECE, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India
[4] Universidad Autónoma del Perú, Lima, Peru
[5] Department of Mathematics, Sakhnin College, Israel
[6] Department of Mathematics, The Arab Academic College for Education in Israel-Haifa, Israel
[7] Head of the Department, Department of Artificial Intelligence and Data Science, K.Ramakrishnan College of Engineering, Tamil Nadu, Trichy, India
来源
Measurement: Sensors | 2022年 / 23卷
关键词
Embedded-system - End-to-end security - IoT - Mobile communication technology - Mobile communications - Mobile electronics devices - Privacy - Remote control systems - Security - Smart phones;
D O I
暂无
中图分类号
学科分类号
摘要
Modern mobile electronic devices such as smartphones or cell phones can now be used for distant devices such as technical systems to monitor and control. While surveillance systems do not require high standards navigating about the time of transfer of the displayed data. More real-time data are needed for a remote mobile robot transfer. Therefore, it has investigated and measured not only the possibilities of employing mobile devices. But also, the supported data transmission channels, such as UMTS, GSM, Wireless LAN, and Bluetooth. The remote-control system is used in many applications such as smart homes, cities, smart hospitals, etc., but it must be today updated to ensure fast-changing technology. Extensive coverage, remote control, and reliable operation in real-time in the deployment of wireless security knowledge. The home automation control system delivers significant features together with a user-friendly interface. A secure remote-based end-to-end security system NTMobile, a technique that enables NAT to provide transverse and encrypted communication from end to end. This confirmed that evaluating the performance of the system in the ECHONET lite compatible smartphone ecosystem. This gives flexibility in configuring time-sensitive industrial networks and enables them to be secured. A safe and reliable remote-control system is also conceivable under the privacy of the user. © 2022 The Authors
引用
收藏
相关论文
共 50 条
  • [1] End-to-end encrypted communication security technology for mobile terminals
    Zhang, Xiaozhi
    [J]. INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (1-2) : 179 - 195
  • [2] Performance Evaluation on End-to-End Security Architecture for Mobile Banking System
    Narendiran, C.
    Rabara, S. Albert
    Rajendran, N.
    [J]. 2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 445 - +
  • [3] SIP signaling security for end-to-end communication
    Ono, K
    Tachimoto, S
    [J]. APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1042 - 1046
  • [4] Modelling Features-Based Birthmarks for Security of End-to-End Communication System
    Li, Meilian
    Nazir, Shah
    Khan, Habib Ullah
    Shahzad, Sara
    Amin, Rohul
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [5] Embedded end-to-end wireless security with ECDH key exchange
    Kumar, S
    Girimondo, M
    Weimerskirch, A
    Paar, C
    Patel, A
    Wander, AS
    [J]. Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 786 - 789
  • [6] The end of end-to-end security?
    Bradner, S
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [7] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications
    Dojen, Reiner
    Pasca, Vladimir
    Coffey, Tom
    [J]. SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 278 - 287
  • [8] A Network Assisted End-to-End Security Protocol for Mobile Applications
    He, Lisha
    Zhang, Ning
    He, Lirong
    Rogers, Ian
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 159 - 165
  • [9] End-to-End Security in Delay Tolerant Mobile Social Network
    Rani, Rinki
    Katti, C. P.
    [J]. APPLICATIONS OF COMPUTING AND COMMUNICATION TECHNOLOGIES, ICACCT 2018, 2018, 899 : 45 - 54
  • [10] ANALYSIS OF END-TO-END SOA SECURITY PROTOCOLS WITH MOBILE DEVICES
    Ahmed, Norman
    Gamble, Rose
    Linderman, Mark
    Bhargava, Bharat
    [J]. 2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 166 - 170