An Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT networks

Chithaluru, Premkumar and Singh, Aman and Dhatterwal, Jagjit Singh and Sodhro, Ali Hassan and Albahar, Marwan Ali and Jurcut, Anca and Alkhayyat, Ahmed UNSPECIFIED, aman.singh@uneatlantico.es, UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, UNSPECIFIED (2023) An Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT networks. Future Generation Computer Systems, 148. pp. 225-239. ISSN 0167739X

Full text not available from this repository.

Abstract

The Internet of Things (IoT) has recently surpassed wired communication. WiMAX is a wireless transmission technology that allows for faster internet access. Wireless network innovations, like some other communication networks, are not safe and secure. Security and authorization models are intended to prevent unauthorized use of network services. Numerous authorization and encrypted communication mechanisms have been introduced for WiMAX privacy, but the communication systems are still insecure and vulnerable to attacks such as zero-day attacks, rouge base station attacks, Man in the Middle (MITM) attacks, and Denial of Service (DoS) attacks. Wireless technologies have come a long way in the last few decades. Because most wireless transmission systems rely on radio signals, the system channel is essentially vulnerable to interception. As a result, data security is always critical in the presentation of a system. Because WiMAX is a wireless communication technology, it is particularly vulnerable to interception, so security is a top priority. Individuals must be protected from security breaches that occur across network interfaces, networking devices, and everything in between. Robust security management is required to protect WiMAX from attacks and vulnerabilities, despite the fact that emerging Artificial Intelligence (AI) technologies necessitate different security governance than existing technologies. We proposed an Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT that addresses vulnerabilities and threats during the identification and authorization phases to improve the functionality and performance characteristics of the traditional system. The Scyther tool was used to validate the proposed privacy scheme, which is safer and more secure than existing systems.

Item Type: Article
Subjects: Subjects > Engineering
Divisions: Europe University of Atlantic > Research > Scientific Production
Depositing User: Sr Bibliotecario
Date Deposited: 19 Jul 2023 06:17
Last Modified: 19 Jul 2023 06:17
URI: http://repositorio.funiber.org/id/eprint/8065

Actions (login required)

View Item View Item