scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Performance analysis of an LTE gateway for the IoT

TL;DR: The suitability of LTE for the interconnection of aggregated edge devices is investigated, under the assumption that the Constrained Application Protocol (CoAP), which is becoming increasingly popular, is used.
Abstract: In the Internet of Things (IoT) the edge devices often rely on gateways to connect to the Internet, to reduce costs and energy consumption. For those scenarios where the gateway itself does not have a wired Internet connection, LTE is a candidate solution due to its high spectral efficiency, bandwidth, and coverage. In this paper, the suitability of LTE for the interconnection of aggregated edge devices is investigated. The study is carried out under the assumption that the Constrained Application Protocol (CoAP), which is becoming increasingly popular, is used. The performance analysis is carried out through packet-level simulation with the open source simulator ns3.
Citations
More filters
Journal ArticleDOI
TL;DR: A secure handover session key management scheme via mobile relay in LTE-A networks that can successfully establish session keys between the on-board UEs and their connected DeNB, achieving backward and forward key separations, and resisting against the collusion between the MRN and the DeNB as the same time.
Abstract: Internet of Things is expanding the network by integrating huge amount of surrounding objects which requires the secure and reliable transmission of the high volume data generation, and the mobile relay technique is one of the efficient ways to meet the on-board data explosion in LTE-Advanced (LTE-A) networks. However, the practice of the mobile relay will pose potential threats to the information security during the handover process. Therefore, to address this challenge, in this paper, we propose a secure handover session key management scheme via mobile relay in LTE-A networks. Specifically, in the proposed scheme, to achieve forward and backward key separations, the session key shared between the on-board user equipment (UE) and the connected donor evolved node B (DeNB) is first generated by the on-board UE and then securely distributed to the DeNB. Furthermore, to reduce the communication overhead and the computational complexity, a novel proxy re-encryption technique is employed, where the session keys initially encrypted with the public key of the mobility management entity (MME) will be re-encrypted by a mobile relay node (MRN), so that other DeNBs can later decrypt the session keys with their own private keys while without the direct involvement of the MME. Detailed security analysis shows that the proposed scheme can successfully establish session keys between the on-board UEs and their connected DeNB, achieving backward and forward key separations, and resisting against the collusion between the MRN and the DeNB as the same time. In addition, performance evaluations via extensive simulations are carried out to demonstrate the efficiency and effectiveness of the proposed scheme.

30 citations

Journal ArticleDOI
TL;DR: Based on the research model, both the Korean government and governments of other countries can be expected to further advance smart tourism in the future by implementing policy and institutional supports that aim to enable 4G LTE network-based M2V to realize a technological access system.
Abstract: The aim of this study is to facilitate market access by Internet of things (IoT) mobile virtual network operators (MVNOs) (`M2V' hereinafter) for the purpose of providing the IoT services required to implement more advanced smart tourism in the tourism sector, which is heavily influenced not only by the Internet but also by information and communications technology (ICT) in the era of fourth generation (4G) long term evolution (LTE) networks. The study produced the following results. It established a 4G LTE network-based technological access system, which is commercially offered all over the world, and suggested business models featuring diverse interworking between network and system through M2V access to 4G LTE, as well as the resulting wholesale price calculation model according to bandwidth. Based on the research model, both the Korean government and governments of other countries can be expected to further advance smart tourism in the future by implementing policy and institutional supports that aim to enable 4G LTE network-based M2V to realize a technological access system, and by inducing M2V to make inroads into the tourism industry based on diversified business models.

28 citations


Cites background from "Performance analysis of an LTE gate..."

  • ...Thanks to the advanced network environment, IoT technology led to more personalized intelligent services in which more data can be communicated thanks to the strength of the technology, and generated data can be stored, handled and analyzed on a real-time basis [9, 13, 17, 23, 33]....

    [...]

Proceedings ArticleDOI
07 Dec 2015
TL;DR: The proposed scheme aims to achieve essential security requirements such as authentication, confidentiality, key agreement and data integrity without trusting the LTE-A networks and an aggregation scheme is used to protect the privacy of the electricity consumers.
Abstract: In smart grid Automatic Metering Infrastructure (AMI) networks, smart meters should send consumption data to the utility company (UC) for grid state estimation. Creating a new infrastructure to support this communication is costly and may take long time which may delay the deployment of the AMI networks. The Long Term Evolution-Advanced (LTE-A) networks can be used to support the communications between the AMI networks and the UC. However, since these networks are owned and operated by private companies, the UC cannot ensure the security and privacy of the communications. Moreover, the data sent by the AMI networks have different characteristics and requirements than most of the existing applications in LTE-A networks. For example, there is a strict data delay requirement, data is short and transmitted every short time, data is sent at known/predefined time slots, and there is no handover. In this paper, we study enabling secure and privacy preserving AMI-UC communications via LTE-A networks. The proposed scheme aims to achieve essential security requirements such as authentication, confidentiality, key agreement and data integrity without trusting the LTE-A networks. Furthermore, an aggregation scheme is used to protect the privacy of the electricity consumers. It can also reduce the amount of required bandwidth which can reduce the communication cost. Our evaluations have demonstrated that our proposals are secure and require low communication/computational overhead.

20 citations


Cites background from "Performance analysis of an LTE gate..."

  • ...[26] investigated the suitability of LTE for the interconnection of aggregated edge devices in the Internet of Things....

    [...]

Book ChapterDOI
09 Feb 2016
TL;DR: This chapter investigates the cyber-physical system (CPS) and their cyber- physical object (CPO) as key units, in the context of a smart city concept, providing information on the main requirements, the open challenges, and highlighting the benefits.
Abstract: The continuous growth of the urban population has generated a drastic expansion of our cities. Nowadays, indeed, more than 50 % of the world’s population is urban, and they forecast that it will reach 70 % by 2050. Therefore, cities need to be ready to accommodate this huge amount of citizens and to face new challenges (e.g., traffic congestion, air pollution, waste management, etc.). The concept of cyber-physical systems, as integration of computation and physical processes, can help toward the realization of real smart cities capable to ensure sustainability and efficiency. To this purpose, this chapter investigates the cyber-physical system (CPS) and their cyber-physical object (CPO) as key units, in the context of a smart city concept. We survey the smart city vision, providing information on the main requirements, the open challenges, and highlighting the benefits; we also browse the European Commission initiatives for smart cities and some pilot projects that are in development.

16 citations


Cites methods from "Performance analysis of an LTE gate..."

  • ...COAP [15] is an application layer protocol designed for energy constrained devices....

    [...]

Book ChapterDOI
01 Jan 2020
TL;DR: The major security as well as privacy issues and possible resolution strategies as extracted from the research work of various authors in this field are detailed.
Abstract: Internet of things (IoT) as an extension of existing global Internet is supposed to make it possible for device-to-device communication beyond the human-to-human communication pattern of the global Internet. Billions of smart devices connected to IoT environment can communicate among themselves using sensors and actuators that lead to complex security provisioning for efficient communication across IoT globally. In this paper, we detail the major security as well as privacy issues and possible resolution strategies as extracted from the research work of various authors in this field.

15 citations

References
More filters
Book ChapterDOI

[...]

01 Jan 2012

139,059 citations


"Performance analysis of an LTE gate..." refers methods in this paper

  • ...The study is carried out through packet-level simulation, with the ns3 open source environment [12] enriched by the LENA simulation model of LTE [13]....

    [...]

  • ...For an accurate description of the simulation model we refer the interested reader to [13] and references within....

    [...]

Journal ArticleDOI
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.

12,539 citations

MonographDOI
01 Dec 2007

2,421 citations

Journal ArticleDOI
TL;DR: An overview of the LTE radio interface, recently approved by the 3GPP, together with a more in-depth description of its features such as spectrum flexibility, multi-antenna transmission, and inter-cell interference control are provided.
Abstract: This article provides an overview of the LTE radio interface, recently approved by the 3GPP, together with a more in-depth description of its features such as spectrum flexibility, multi-antenna transmission, and inter-cell interference control. The performance of LTE and some of its key features is illustrated with simulation results. The article is concluded with an outlook into the future evolution of LTE.

886 citations


"Performance analysis of an LTE gate..." refers background in this paper

  • ...…alliances, e.g., the Continua Health Alliance [2] for personal health services and the Open Gateway Energy Management Alliance (OGEMA) [3] for smart grid applications, and standardization bodies, e.g., the European Telecommunications Standards Institute (ETSI) Technical Committee (TC) on M2M [4]....

    [...]

Trending Questions (1)
What is the difference between LTE and FIOS Internet?

For those scenarios where the gateway itself does not have a wired Internet connection, LTE is a candidate solution due to its high spectral efficiency, bandwidth, and coverage.