Sunday, August 31, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Mathematics

Between one and all: Proposed system to control selected devices on network

April 30, 2024
in Mathematics
Reading Time: 3 mins read
0
Broadcast authentication system with one-to-many communications
66
SHARES
600
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT

One or all — that’s the current choice many networks give users when it comes to controlling smart devices. With the evolving Internet of Things (IoT), referring to the technology that connects devices to one another and to the cloud, users need more specific control over their devices. Now, a Japanese team of researchers has developed a solution that may allow both more efficient and more secure control.

Broadcast authentication system with one-to-many communications

Credit: Yokohama National University

One or all — that’s the current choice many networks give users when it comes to controlling smart devices. With the evolving Internet of Things (IoT), referring to the technology that connects devices to one another and to the cloud, users need more specific control over their devices. Now, a Japanese team of researchers has developed a solution that may allow both more efficient and more secure control.

The United Nations’ International Telecommunication Union published the proposed broadcast authentication system as ITU-T Technical Report “TR.ba-iot” in February.

“In the future, a wide variety of many IoT devices will be connected to the network,” said Junji Shikata, who is a professor on the Faculty of Environment and Information Sciences, and at the Institute of Advanced Sciences at Yokohama National University in Japan. “Our research team has proposed a broadcast authentication system in which a sender has the ability to control a number of arbitrary target devices remotely and simultaneously.”

Imagine a smart home, with lights, a security system, entertainment devices and a thermostat, all controlled from a contracted service provider. The smart home service provider can monitor lifetime and abnormal communication of each IoT device and send commands to the devices one at a time. It’s possible for the owner and smart home service provider to automate the process but the device-to-device communication remains the same.

“When unauthorized communication, such as a cyber-attack, is detected in a wide variety of IoT devices installed in a smart factory, administrators can control the IoT devices and prevent the spread of damage,” Shikata said. “In addition, this system could be also applied to services such as remotely shutting down IoT devices installed at dams, underground facilities and more that are difficult for people to access when the device reaches the end of its lifecycle.”

The broadcast authentication system proposed by Shikata acts as a simplified remote control. The sender can broadcast a control command to all IoT devices in the network but limit it so that only designated devices may execute the command. Every device receives and assess the command, but only target devices will follow the direction.

“The broadcast authentication system makes it possible to efficiently control arbitrary multiple IoT devices simultaneously with a broadcast communication for IoT devices connected to the network,” Shikata said. “For example, it can be applied to the control of IoT devices infected with malware or IoT devices that are left in the network beyond their lifespan, in order to turn them off and isolate them from the network.”

Crucially, Shikata said, the conceptual model clarifies the security characteristics and requirements required for a broadcast authentication scheme. This includes using a message authentication code and a digital signature, both of which help ensure the integrity of the data shared was not compromised in transit.

Next, Shikata said he plans to continue developing practical and secure next-generation cryptographic technology.

##

Yokohama National University (YNU or Yokokoku) is a Japanese national university founded in 1949. YNU provides students with a practical education utilizing the wide expertise of its faculty and facilitates engagement with the global community. YNU’s strength in the academic research of practical application sciences leads to high-impact publications and contributes to international scientific research and the global society. For more information, please see:



Article Title

Broadcast authentication scheme for Internet of things (IoT) system

Share26Tweet17
Previous Post

Validated rules help prevent overuse of CT scans for diagnosing traumatic head and abdominal injuries in kids

Next Post

Researchers at Houston Methodist find difference in pancreatic cancer cells, offering new hope for immunotherapy effectiveness

Related Posts

blank
Mathematics

Applications for the 2026 Hertz Fellowship Are Now Open

August 29, 2025
blank
Mathematics

Quantum Twist Breathes New Life into 250-Year-Old Probability Theorem

August 29, 2025
blank
Mathematics

Mount Sinai Scientists Harness AI and Laboratory Tests to Forecast Genetic Disease Risk

August 28, 2025
blank
Mathematics

Quantum Breakthrough Fueled by MRI Technology and 2D Materials

August 28, 2025
blank
Mathematics

Illinois Study Explores New Ways to Relieve Gastrointestinal Symptoms in Cancer Patients

August 28, 2025
blank
Mathematics

Wax-Assisted Exfoliation and Dual-Surface AlOx Encapsulation Dramatically Boost Topological Phases in MnBi2Te4

August 28, 2025
Next Post
Pancreas diagram

Researchers at Houston Methodist find difference in pancreatic cancer cells, offering new hope for immunotherapy effectiveness

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27542 shares
    Share 11014 Tweet 6884
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    956 shares
    Share 382 Tweet 239
  • Bee body mass, pathogens and local climate influence heat tolerance

    642 shares
    Share 257 Tweet 161
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    509 shares
    Share 204 Tweet 127
  • Warm seawater speeding up melting of ‘Doomsday Glacier,’ scientists warn

    313 shares
    Share 125 Tweet 78
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • How Teacher Beliefs Shape Classroom Behaviors
  • Advancing Normothermic Regional Perfusion in Organ Donation
  • Studying Dementia in Cuba, Dominican Republic, Puerto Rico
  • Influences of Organization on Trust in Healing

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Blog
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 5,182 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine

Discover more from Science

Subscribe now to keep reading and get access to the full archive.

Continue reading