Saturday, August 9, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Mathematics

Between one and all: Proposed system to control selected devices on network

April 30, 2024
in Mathematics
Reading Time: 3 mins read
0
Broadcast authentication system with one-to-many communications
66
SHARES
600
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT
ADVERTISEMENT

One or all — that’s the current choice many networks give users when it comes to controlling smart devices. With the evolving Internet of Things (IoT), referring to the technology that connects devices to one another and to the cloud, users need more specific control over their devices. Now, a Japanese team of researchers has developed a solution that may allow both more efficient and more secure control.

Broadcast authentication system with one-to-many communications

Credit: Yokohama National University

One or all — that’s the current choice many networks give users when it comes to controlling smart devices. With the evolving Internet of Things (IoT), referring to the technology that connects devices to one another and to the cloud, users need more specific control over their devices. Now, a Japanese team of researchers has developed a solution that may allow both more efficient and more secure control.

The United Nations’ International Telecommunication Union published the proposed broadcast authentication system as ITU-T Technical Report “TR.ba-iot” in February.

“In the future, a wide variety of many IoT devices will be connected to the network,” said Junji Shikata, who is a professor on the Faculty of Environment and Information Sciences, and at the Institute of Advanced Sciences at Yokohama National University in Japan. “Our research team has proposed a broadcast authentication system in which a sender has the ability to control a number of arbitrary target devices remotely and simultaneously.”

Imagine a smart home, with lights, a security system, entertainment devices and a thermostat, all controlled from a contracted service provider. The smart home service provider can monitor lifetime and abnormal communication of each IoT device and send commands to the devices one at a time. It’s possible for the owner and smart home service provider to automate the process but the device-to-device communication remains the same.

“When unauthorized communication, such as a cyber-attack, is detected in a wide variety of IoT devices installed in a smart factory, administrators can control the IoT devices and prevent the spread of damage,” Shikata said. “In addition, this system could be also applied to services such as remotely shutting down IoT devices installed at dams, underground facilities and more that are difficult for people to access when the device reaches the end of its lifecycle.”

The broadcast authentication system proposed by Shikata acts as a simplified remote control. The sender can broadcast a control command to all IoT devices in the network but limit it so that only designated devices may execute the command. Every device receives and assess the command, but only target devices will follow the direction.

“The broadcast authentication system makes it possible to efficiently control arbitrary multiple IoT devices simultaneously with a broadcast communication for IoT devices connected to the network,” Shikata said. “For example, it can be applied to the control of IoT devices infected with malware or IoT devices that are left in the network beyond their lifespan, in order to turn them off and isolate them from the network.”

Crucially, Shikata said, the conceptual model clarifies the security characteristics and requirements required for a broadcast authentication scheme. This includes using a message authentication code and a digital signature, both of which help ensure the integrity of the data shared was not compromised in transit.

Next, Shikata said he plans to continue developing practical and secure next-generation cryptographic technology.

##

Yokohama National University (YNU or Yokokoku) is a Japanese national university founded in 1949. YNU provides students with a practical education utilizing the wide expertise of its faculty and facilitates engagement with the global community. YNU’s strength in the academic research of practical application sciences leads to high-impact publications and contributes to international scientific research and the global society. For more information, please see:



Article Title

Broadcast authentication scheme for Internet of things (IoT) system

Share26Tweet17
Previous Post

Validated rules help prevent overuse of CT scans for diagnosing traumatic head and abdominal injuries in kids

Next Post

Researchers at Houston Methodist find difference in pancreatic cancer cells, offering new hope for immunotherapy effectiveness

Related Posts

blank
Mathematics

AI Powers Breakthroughs in Advanced Heat-Dissipating Polymer Development

August 7, 2025
blank
Mathematics

Mathematical Proof Reveals Fresh Insights into the Impact of Blending

August 7, 2025
blank
Mathematics

Researchers Discover a Natural ‘Speed Limit’ to Innovation

August 5, 2025
blank
Mathematics

World’s First Successful Parallelization of Cryptographic Protocol Analyzer Maude-NPA Drastically Cuts Analysis Time, Enhancing Internet Security

August 5, 2025
blank
Mathematics

Encouraging Breakthroughs in Quantum Computing

August 4, 2025
blank
Mathematics

Groundbreaking Real-Time Visualization of Two-Dimensional Melting Unveiled

August 4, 2025
Next Post
Pancreas diagram

Researchers at Houston Methodist find difference in pancreatic cancer cells, offering new hope for immunotherapy effectiveness

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27531 shares
    Share 11009 Tweet 6881
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    943 shares
    Share 377 Tweet 236
  • Bee body mass, pathogens and local climate influence heat tolerance

    641 shares
    Share 256 Tweet 160
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    507 shares
    Share 203 Tweet 127
  • Warm seawater speeding up melting of ‘Doomsday Glacier,’ scientists warn

    310 shares
    Share 124 Tweet 78
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • Pocillopora Hosts: Thriving in Harsh Environments
  • COVID-19 Impact on Asset Allocation Performance Explored
  • Vaccine Targeting Abp2D Shields Against Catheter UTIs
  • Revolutionizing Energy Storage: Batteries, Capacitors, and Innovations

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 4,860 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine

Discover more from Science

Subscribe now to keep reading and get access to the full archive.

Continue reading