Wednesday, October 1, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Mathematics

Between one and all: Proposed system to control selected devices on network

April 30, 2024
in Mathematics
Reading Time: 3 mins read
0
Broadcast authentication system with one-to-many communications
66
SHARES
601
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT

One or all — that’s the current choice many networks give users when it comes to controlling smart devices. With the evolving Internet of Things (IoT), referring to the technology that connects devices to one another and to the cloud, users need more specific control over their devices. Now, a Japanese team of researchers has developed a solution that may allow both more efficient and more secure control.

Broadcast authentication system with one-to-many communications

Credit: Yokohama National University

One or all — that’s the current choice many networks give users when it comes to controlling smart devices. With the evolving Internet of Things (IoT), referring to the technology that connects devices to one another and to the cloud, users need more specific control over their devices. Now, a Japanese team of researchers has developed a solution that may allow both more efficient and more secure control.

The United Nations’ International Telecommunication Union published the proposed broadcast authentication system as ITU-T Technical Report “TR.ba-iot” in February.

“In the future, a wide variety of many IoT devices will be connected to the network,” said Junji Shikata, who is a professor on the Faculty of Environment and Information Sciences, and at the Institute of Advanced Sciences at Yokohama National University in Japan. “Our research team has proposed a broadcast authentication system in which a sender has the ability to control a number of arbitrary target devices remotely and simultaneously.”

Imagine a smart home, with lights, a security system, entertainment devices and a thermostat, all controlled from a contracted service provider. The smart home service provider can monitor lifetime and abnormal communication of each IoT device and send commands to the devices one at a time. It’s possible for the owner and smart home service provider to automate the process but the device-to-device communication remains the same.

“When unauthorized communication, such as a cyber-attack, is detected in a wide variety of IoT devices installed in a smart factory, administrators can control the IoT devices and prevent the spread of damage,” Shikata said. “In addition, this system could be also applied to services such as remotely shutting down IoT devices installed at dams, underground facilities and more that are difficult for people to access when the device reaches the end of its lifecycle.”

The broadcast authentication system proposed by Shikata acts as a simplified remote control. The sender can broadcast a control command to all IoT devices in the network but limit it so that only designated devices may execute the command. Every device receives and assess the command, but only target devices will follow the direction.

“The broadcast authentication system makes it possible to efficiently control arbitrary multiple IoT devices simultaneously with a broadcast communication for IoT devices connected to the network,” Shikata said. “For example, it can be applied to the control of IoT devices infected with malware or IoT devices that are left in the network beyond their lifespan, in order to turn them off and isolate them from the network.”

Crucially, Shikata said, the conceptual model clarifies the security characteristics and requirements required for a broadcast authentication scheme. This includes using a message authentication code and a digital signature, both of which help ensure the integrity of the data shared was not compromised in transit.

Next, Shikata said he plans to continue developing practical and secure next-generation cryptographic technology.

##

Yokohama National University (YNU or Yokokoku) is a Japanese national university founded in 1949. YNU provides students with a practical education utilizing the wide expertise of its faculty and facilitates engagement with the global community. YNU’s strength in the academic research of practical application sciences leads to high-impact publications and contributes to international scientific research and the global society. For more information, please see:



Article Title

Broadcast authentication scheme for Internet of things (IoT) system

Share26Tweet17
Previous Post

Validated rules help prevent overuse of CT scans for diagnosing traumatic head and abdominal injuries in kids

Next Post

Researchers at Houston Methodist find difference in pancreatic cancer cells, offering new hope for immunotherapy effectiveness

Related Posts

blank
Mathematics

AR and AI Technologies Enable Automatic Diagnosis of Agromyzid Leafminer Damage Levels

September 30, 2025
blank
Mathematics

Electroacupuncture Shows Promise for Early Urinary Incontinence Following Radical Prostatectomy

September 30, 2025
blank
Mathematics

Breakthrough in Scalable, Efficient Quantum Error Correction Paves the Way for Fault-Tolerant Quantum Computing

September 29, 2025
blank
Mathematics

How Blockchain Technology Can Enhance Trust in the Restaurant Industry

September 26, 2025
blank
Mathematics

The Importance of Advancing from Chiral Molecular Macrocycles to Chiral Topological Macrocycles

September 26, 2025
blank
Mathematics

ITU and UNDP Unite Global Community to Drive Technology for Social Good

September 26, 2025
Next Post
Pancreas diagram

Researchers at Houston Methodist find difference in pancreatic cancer cells, offering new hope for immunotherapy effectiveness

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27561 shares
    Share 11021 Tweet 6888
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    969 shares
    Share 388 Tweet 242
  • Bee body mass, pathogens and local climate influence heat tolerance

    646 shares
    Share 258 Tweet 162
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    513 shares
    Share 205 Tweet 128
  • Groundbreaking Clinical Trial Reveals Lubiprostone Enhances Kidney Function

    475 shares
    Share 190 Tweet 119
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • Psychological Flexibility, Mindfulness Linked to Nursing Students’ Well-being
  • Social Support Boosts Mpox Care via Stigma Reduction
  • Dual Dynamic Helical Poly(disulfide)s: Adaptive, Recyclable Polymers
  • Clinicopathological and Molecular Insights into Synovial Sarcoma

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Blog
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 5,185 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine

Discover more from Science

Subscribe now to keep reading and get access to the full archive.

Continue reading