A Secured System for Internet Enabled Host Devices
- Aderonke F. Thompson
- Oghenerukevwe E. Oyinloye
- Matthew T. David
- Boniface K. Alese
Abstract
In the world of wireless communication, heterogeneous network topologies such as Wi-Fi and Long-Term Evolution (LTE) the topologies authentication service delivery forms a major challenge with access control; which is sought to be addressed. In this paper, we propose a security model by adapting Capability-based Context Aware Access Control (CCAAC) model for internet-enabled devices for defense against hacking or unauthorized access. The steps applied during the programming of this web application was followed through using the Elliptic-Curve Diffie–Hellman (ECCDH) algorithm so that the initiation of a random prime number between a range, the encryption and exchange of the devices public keys to the decryption are interpreted the right way to the machine making use of it. The results established a security model that has a good chance of being effective against present cyber-attacks other security loopholes.
- Full Text: PDF
- DOI:10.5539/nct.v5n1p26
Journal Metrics
(The data was calculated based on Google Scholar Citations)
1. Google-based Impact Factor (2021): 0.35
2. h-index (December 2021): 11
3. i10-index (December 2021): 11
4. h5-index (December 2021): N/A
5. h5-median (December 2021): N/A
Index
Contact
- Bruce LeeEditorial Assistant
- nct@ccsenet.org