To see the other types of publications on this topic, follow the link: Security IoT.

Journal articles on the topic 'Security IoT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security IoT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jogdand, Gopal, Shubham Kadam, Kiran Patil, and Gaurav Mate. "Iot Transaction Security." Journal of Advances and Scholarly Researches in Allied Education 15, no. 2 (April 1, 2018): 711–16. http://dx.doi.org/10.29070/15/57056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (May 24, 2021): 3654. http://dx.doi.org/10.3390/s21113654.

Full text
Abstract:
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising these opportunities, businesses engage in creating the Industrial Internet of Things (IIoT). IoT is vulnerable to hacks and, therefore, requires various techniques to achieve the level of security required. Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits. To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and highlights the existing security approaches for the most significant industrial applications. This paper mainly classifies the attacks and possible security solutions regarding IoT layers architecture. Consequently, each attack is connected to one or more layers of the architecture accompanied by a literature analysis on the various IoT security countermeasures. It further provides a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems. Additionally, there is a discussion of the emerging tools and simulations used for testing and evaluating security mechanisms in IoT applications. Last, this survey outlines several other relevant research issues and challenges for IoT/IIoT security.
APA, Harvard, Vancouver, ISO, and other styles
3

Toka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.

Full text
Abstract:
Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc. Blockchain is a new approach used to securely record transactions and offers potential solutions to computer and internet security issues such as confidentiality, integrity, availability, authentication, authorization, and accountability. Blockchain, as a decentralized ledger consisting of interconnected blocks, can remedy most of the security deficiencies of heavily IoT based systems. The Hyperledger Fabric blockchain network used in this study provides confidentiality, data integrity, authentication, and data security for data obtained from IoT devices. Widely used IoT data transfer MQTT protocol is included in the proposed approach. The approach is demonstrated in a simple demo Hyperledger network with simulated IoT devices. The proposed approach is discussed in terms of network security dimensions. Based on the features of the Hyperledger Blockchain network, it is displayed that the IoT security deficiencies can largely be remedied with the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
4

Raimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (February 2, 2022): 1598. http://dx.doi.org/10.3390/app12031598.

Full text
Abstract:
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited, as far as machine resources are concerned. In this way, traditional security does not fit in IoT systems. The issue of cybersecurity has become paramount to the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) in mitigating cybersecurity risk for organizations and end users. New cybersecurity technologies/applications present improvements for IoT security management. Nevertheless, there is a gap in the effectiveness of IoT cyber risk solutions. This review article discusses the literature trends around opportunities and threats in cybersecurity for IIoT, by reviewing 70 key articles discovered from a profound Scopus literature survey. It aims to present the current debate around the issue of IIoT rather than suggesting any particular technical solutions to solve network security problems.
APA, Harvard, Vancouver, ISO, and other styles
5

Saidkulovich, Sanjar Muminov, Husanboy Shoraimov Uktamboyevich, and Umarbek Akramov Farkhodugli. "Internet-of-things security and vulnerabilities: Iot security, iot taxonomy." ACADEMICIA: An International Multidisciplinary Research Journal 11, no. 3 (2021): 620–24. http://dx.doi.org/10.5958/2249-7137.2021.00676.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ma, Jinnan, Xuekui Shangguan, and Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home." Wireless Communications and Mobile Computing 2022 (August 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.

Full text
Abstract:
The Internet of Things (IoT) acts as a tremendous network that is constructed by fusing diverse sensors. IoT can achieve the interconnection of individuals, things, and machines at any place and time and improve the function performance of network applications. However, the security of IoT has always been a major problem that may limit the application perspective of IoT technologies. Nowadays, industrial IOT (IIoT), Internet of vehicles (IoV), and smart home have become the three primary emerging perspectives of the current IoT studies, and it is necessary to systematically highlight the security analysis of these three types of scenarios. Hence, in this paper, guided by the three major IoT application scenarios, i.e., IIoT, IoV, and smart home, we sum up the development status of IoT security technologies, analyzed corresponding technical difficulties, and discussed several future outlook of challenges and development trends for the IoT technology.
APA, Harvard, Vancouver, ISO, and other styles
7

Al Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.

Full text
Abstract:
Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, and privacy are not addressed well. Most IoT devices having constraints in computational and operational capabilities are a threat to security and privacy, also prone to cyber-attacks. This study presents a CIA triad-based information security implementation for the four-layer architecture of the IoT devices. An overview of layer-wise threats to the IoT devices and finally suggest CIA triad-based security techniques for securing the IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (February 9, 2020): 916. http://dx.doi.org/10.3390/s20030916.

Full text
Abstract:
With the rapid development of the Internet of Things (IoT), the number of IoT devices has increased exponentially. Therefore, we have put forward higher security requirements for the management, transmission, and storage of massive IoT data. However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. Once the server is maliciously attacked, the security of IoT data will be greatly threatened. In view of the above-mentioned security issues, a security transmission and storage solution is proposed about sensing image for blockchain in the IoT. Firstly, this solution intelligently senses user image information, and divides these sensed data into intelligent blocks. Secondly, different blocks of data are encrypted and transmitted securely through intelligent encryption algorithms. Finally, signature verification and storage are performed through an intelligent verification algorithm. Compared with the traditional IoT data transmission and centralized storage solution, our solution combines the IoT with the blockchain, making use of the advantages of blockchain decentralization, high reliability, and low cost to transfer and store users image information securely. Security analysis proves that the solution can resist theft attacks and ensure the security of user image information during transmission and storage.
APA, Harvard, Vancouver, ISO, and other styles
9

Papoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (February 4, 2021): 1396. http://dx.doi.org/10.3390/app11041396.

Full text
Abstract:
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services. In this context, patterns, which are constructs encoding re-usable solutions to common problems and building blocks to architectures, can be an asset in alleviating said barrier. More specifically, patterns can be used to encode dependencies between SP properties of individual smart objects and corresponding properties of orchestrations (compositions) involving them, facilitating the design of IoT solutions that are secure and privacy-aware by design. Motivated by the above, this work presents a survey and taxonomy of SP patterns towards the creation of a usable pattern collection. The aim is to enable decomposition of higher-level properties to more specific ones, matching them to relevant patterns, while also creating a comprehensive overview of security- and privacy-related properties and sub-properties that are of interest in IoT/IIoT environments. To this end, the identified patterns are organized using a hierarchical taxonomy that allows their classification based on provided property, context, and generality, while also showing the relationships between them. The two high-level properties, Security and Privacy, are decomposed to a first layer of lower-level sub-properties such as confidentiality and anonymity. The lower layers of the taxonomy, then, include implementation-level enablers. The coverage that these patterns offer in terms of the considered properties, data states (data in transit, at rest, and in process), and platform connectivity cases (within the same IoT platform and across different IoT platforms) is also highlighted. Furthermore, pointers to extensions of the pattern collection to include additional patterns and properties, including Dependability and Interoperability, are given. Finally, to showcase the use of the presented pattern collection, a practical application is detailed, involving the pattern-driven composition of IoT/IIoT orchestrations with SP property guarantees.
APA, Harvard, Vancouver, ISO, and other styles
10

Kant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (June 18, 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Full text
Abstract:
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment such as failure or impairment of production systems. We evaluate the prevalence of exposed IoT and IIoT devices related to the protocol MQTT by means of the search engine Shodan. The approach, design and results of our analysis are summarized in this paper.
APA, Harvard, Vancouver, ISO, and other styles
11

Giaretta, Alberto, Nicola Dragoni, and Fabio Massacci. "IoT Security Configurability with Security-by-Contract." Sensors 19, no. 19 (September 23, 2019): 4121. http://dx.doi.org/10.3390/s19194121.

Full text
Abstract:
Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.
APA, Harvard, Vancouver, ISO, and other styles
12

Chen, Fei, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan, and Hong-Linh Truong. "IoT Cloud Security Review." ACM Computing Surveys 54, no. 4 (May 2021): 1–36. http://dx.doi.org/10.1145/3447625.

Full text
Abstract:
Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research efforts on existing, real, already deployed consumer-oriented IoT cloud applications in the past five years using typical case studies. Specifically, we first present a general model for the IoT cloud ecosystem. Then, using the model, we review and summarize recent, representative research works on emerging smart IoT cloud system security using 10 detailed case studies, with the aim that the case studies together provide insights into the insecurity of current emerging IoT cloud systems. We further present a systematic approach to conduct a security analysis for IoT cloud systems. Based on the proposed security analysis approach, we review and suggest potential security risk mitigation methods to protect IoT cloud systems. We also discuss future research challenges for the IoT cloud security area.
APA, Harvard, Vancouver, ISO, and other styles
13

Hussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia, and Eftim Zdravevski. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment." Sensors 21, no. 9 (April 26, 2021): 3025. http://dx.doi.org/10.3390/s21093025.

Full text
Abstract:
The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT technology has revolutionized human life by inaugurating the concept of smart devices, smart healthcare, smart industry, smart city, smart grid, among others. IoT devices’ security has become a serious concern nowadays, especially for the healthcare domain, where recent attacks exposed damaging IoT security vulnerabilities. Traditional network security solutions are well established. However, due to the resource constraint property of IoT devices and the distinct behavior of IoT protocols, the existing security mechanisms cannot be deployed directly for securing the IoT devices and network from the cyber-attacks. To enhance the level of security for IoT, researchers need IoT-specific tools, methods, and datasets. To address the mentioned problem, we provide a framework for developing IoT context-aware security solutions to detect malicious traffic in IoT use cases. The proposed framework consists of a newly created, open-source IoT data generator tool named IoT-Flock. The IoT-Flock tool allows researchers to develop an IoT use-case comprised of both normal and malicious IoT devices and generate traffic. Additionally, the proposed framework provides an open-source utility for converting the captured traffic generated by IoT-Flock into an IoT dataset. Using the proposed framework in this research, we first generated an IoT healthcare dataset which comprises both normal and IoT attack traffic. Afterwards, we applied different machine learning techniques to the generated dataset to detect the cyber-attacks and protect the healthcare system from cyber-attacks. The proposed framework will help in developing the context-aware IoT security solutions, especially for a sensitive use case like IoT healthcare environment.
APA, Harvard, Vancouver, ISO, and other styles
14

Balogh, Stefan, Ondrej Gallo, Roderik Ploszek, Peter Špaček, and Pavol Zajac. "IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques." Electronics 10, no. 21 (October 29, 2021): 2647. http://dx.doi.org/10.3390/electronics10212647.

Full text
Abstract:
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (September 14, 2021): 6163. http://dx.doi.org/10.3390/s21186163.

Full text
Abstract:
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
APA, Harvard, Vancouver, ISO, and other styles
16

Choi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (July 3, 2019): 752. http://dx.doi.org/10.3390/electronics8070752.

Full text
Abstract:
The Internet of things (IoT) technology, which is currently considered the new growth engine of the fourth industrial revolution, affects our daily life and has been applied to various industrial fields. Studies on overcoming the limitations of scalability and stability in a centralized IoT operating environment by employing distributed blockchain technology have been actively conducted. However, the nature of IoT that ensures connectivity with multiple objects at any time and any place increases security threats. Further, it extends the influence of the cyber world into the physical domain, resulting in serious damage to human life and property. Therefore, we aim to study a method to increase the security of IoT devices and effectively extend them simultaneously. To this end, we analyze the authentication methods and limitations of traditional IoT devices and examine cases for improving IoT environments by using blockchain technology. Accordingly, we propose a framework that allows IoT devices to be securely connected and extended to other devices by automatically evaluating security using blockchain technology and the whitelist. The method proposed in this paper restricts the extension of devices vulnerable to security risks by imposing penalties and allows only devices with high security to be securely and quickly authenticated and extended without user intervention. In this study, we applied the proposed method to IoT network simulation environments and observed that the number of devices vulnerable to security was reduced by 48.5% compared with traditional IoT environments.
APA, Harvard, Vancouver, ISO, and other styles
17

kumar, Abhinav. "IOT Security with Blockchain." YMER Digital 20, no. 11 (November 10, 2021): 7–19. http://dx.doi.org/10.37896/ymer20.11/2.

Full text
Abstract:
Internet of Things (IoT) plays a very vital role in almost every field of technology. Its key elements of security are very much crucial elements which are to be maintained as it is used universally. Traditional security and privacy methods be likely to be inapplicable for IoT, mainly due to its distributed network topology and the supply-constraints of most of its devices. For creating these concepts, a new technology called blockchain can be used. Blockchain that reinforce the crypto- currency Bitcoin have been just now used to provide security and privacy in peer-to-peer networks with similar topologies to IoT. In this paper, we present basic part of IoT enabled with blockchain, their distinctive features of both the technologies, their futuristic solutions for different real-world issues, different communicational standards etc. Both the technologies have several distinctive characteristics in every field, but certain limits too exist which gives futuristic path for research.
APA, Harvard, Vancouver, ISO, and other styles
18

Schiller, Eryk, Andy Aidoo, Jara Fuhrer, Jonathan Stahl, Michael Ziörjen, and Burkhard Stiller. "Landscape of IoT security." Computer Science Review 44 (May 2022): 100467. http://dx.doi.org/10.1016/j.cosrev.2022.100467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

ADASCALITEI, Ioan. "Smartphones and IoT Security." Informatica Economica 23, no. 2/2019 (June 30, 2019): 63–75. http://dx.doi.org/10.12948/issn14531305/23.2.2019.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Moos, James. "IoT, Malware and Security." ITNOW 59, no. 1 (2017): 28–29. http://dx.doi.org/10.1093/itnow/bwx013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Buenrostro, Erick, Daniel Cyrus, Tra Le, and Vahid Emamian. "Security of IoT Devices." Journal of Cyber Security Technology 2, no. 1 (January 2, 2018): 1–13. http://dx.doi.org/10.1080/23742917.2018.1474592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

WOOD, NICK. "RF AND IOT SECURITY." New Electronics 55, no. 3 (March 2022): 42–43. http://dx.doi.org/10.12968/s0047-9624(22)60121-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Bhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, Ateeq Ur Rehman, Yu-Chen Hu, Elsayed Tag Eldin, and Nivin A. Ghamry. "IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices." Sustainability 14, no. 21 (November 7, 2022): 14645. http://dx.doi.org/10.3390/su142114645.

Full text
Abstract:
The Internet of Things (IoT) has redefined several aspects of our daily lives, including automation and control of the living environment, innovative healthcare services, and much more. Digital IoT devices and sensors, when integrated with home appliances, industrial systems, and online services in the physical world, have brought intense, disruptive changes in our lives. The industry and home users have widely embraced these ‘things’ on the Internet or IoT. However, the innate, intrinsic repercussions regarding security and data privacy are not evaluated. Security applies to Industrial IoT (IIoT) is in its infancy stage. Techniques from security and privacy research promise to address broad security goals, but attacks continue to emerge in industrial devices. This research explores the vulnerabilities of IIoT ecosystems not just as individual nodes but as the integrated infrastructure of digital and physical systems interacting with the domains. The authors propose a unique threat model framework to analyze the attacks on IIoT application environments. The authors identified sensitive data flows inside the IIoT devices to determine privacy risks at the application level and explored the device exchanges at the physical level. Both these risks lead to insecure ecosystems. The authors also performed a security analysis of physical domains to digital domains.
APA, Harvard, Vancouver, ISO, and other styles
24

Rajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Adel R. Alharbi, and Amer Aljaedi. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation." Mathematical Problems in Engineering 2021 (October 8, 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.

Full text
Abstract:
In terms of growth, effect, and capability, the 5G-enabled Internet of Things (IoT) is incredible. The volume of data distributed and processed by IoT (Internet of Things) systems that trust connectivity and coverage raises some security problems. As IoT technology is directly used in our daily lives, the threats of present cyberspace may grow more prominent globally. Extended network life, coverage, and connectivity are all required for securing IoT-based 5G network devices. As a result of these failures, there are flaws that lead to security breaches. Because purposeful faults can quickly render the entire network dysfunctional, they are more difficult to identify than unexpected failures. Securing IoT-based 5G Network Device Connectivity and Coverage for expending Encryption and Authentication Scheme (EAS) framework is proposed in this study, which uses novel security flaws. In this research, we proposed a Boltzmann machine (BMKG)-based encryption algorithm for securing 5G-enabled IoT device network environment and compared various asymmetric algorithms for key exchange.
APA, Harvard, Vancouver, ISO, and other styles
25

Hang, Feilu, Linjiang Xie, Zhenhong Zhang, Wei Guo, and Hanruo Li. "Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities." International Journal of Information Security and Privacy 16, no. 2 (April 1, 2022): 1–19. http://dx.doi.org/10.4018/ijisp.308315.

Full text
Abstract:
In the internet of things (IoT) and big data, the global information society is entering a new phase where consumers, networks, and perception devices work together more intimately. Software-defined networks (SDN) offer lower latency and massive connectivity for intelligent devices (IoT) for the internet of things. Smart communities are one of the most important applications of the blockchain. SDN technology is used to provide residents with smart services. Situational awareness for information security offers a distinct, high-level security perspective based on security alarm occurrences. However, contemporary information security warning data has become too complicated and varied than a simple analysis is almost impossible. In addition to enhancing IoT security's monitoring, emergency response, and forecasting capabilities, this article presents an IoT-assisted information security situation awareness framework (IoT-ISSAF). SDN model has been validated through simulation as being able to accurately assess the current state of network security in blockchain.
APA, Harvard, Vancouver, ISO, and other styles
26

Mohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (January 20, 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.

Full text
Abstract:
The Internet of Things (IoT) has expanded access to information technology by combining both digital and physical fields as an emerging technology. IoT will increasingly overshadow human life as it becomes more pervasive. IoT will be applied to important areas of the national economy, such as health care and medical care, and smart transportation. Hence, data security in IoT must be met with highlights such as distinguishing proof, unwavering quality, integration, and verifiable, and so on. Security within the field of IoT is more vital in terms of openness and reliance. Security is an critical issue for IoT applications and proceeds to confront major challenges. This think about pointed to supply a convention to extend IoT-based security. The method proposed in this paper is to show modern conveyance engineering to extend IoT security. This unused design is based on a blockchain and can be actualized as a dispersed design in all layers of IoT. The findings of recreations and usage in genuine IoT scenarios appear that the execution of the proposed security conventions can be proficient and viable within the productivity and adequacy of distinctive levels of security and IoT accessibility.
APA, Harvard, Vancouver, ISO, and other styles
27

Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (June 28, 2020): 3625. http://dx.doi.org/10.3390/s20133625.

Full text
Abstract:
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond.
APA, Harvard, Vancouver, ISO, and other styles
28

Fatima, Haram, Habib Ullah Khan, and Shahzad Akbar. "Home Automation and RFID-Based Internet of Things Security: Challenges and Issues." Security and Communication Networks 2021 (November 28, 2021): 1–21. http://dx.doi.org/10.1155/2021/1723535.

Full text
Abstract:
Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers, sensors, actuators, or people on the World Wide Web (WWW). All these different devices have a unique identity in the IoT and must convey data across the network automatically. If computers are not adequately secured, allowing them to connect to the Internet exposes them to a range of serious vulnerabilities. Because the consequences of IoT failures are severe, it is necessary to observe and analyze security issues related to IoT. The prime goal of IoT security is to protect personal safety, while also guaranteeing and ensuring accessibility. In the context of IoT technology, the present study conducts a systematic literature review that analyzes the security problems associated with commercial and educational applications of home automation and details the technical possibilities of IoT with respect to the network layer. In this systematic review, we discuss how current contexts result in the inability of designers of IoT devices to enhance their cyber-security initiatives. Typically, application developers are responsible for training themselves to understand recent security advancements. As a result, active participation on the ridge scale with passive improvement can be achieved. A comparative analysis of the literature was conducted. The main objective of this research is to provide an overview of current IoT security research in home automation, particularly those using authentication methods in different devices, and related technologies in radio frequency identification (RFID) on network layers. IoT security issues are addressed, and various security problems in each layer are analyzed. We describe cross-layer heterogeneous integration as a domain of IoT and demonstrate how it can provide some promising solutions.
APA, Harvard, Vancouver, ISO, and other styles
29

Haddad, Nabeel Mahdy, Hayder Sabah Salih, Ban Salman Shukur, Sura Khalil Abd, Mohammed Hasan Ali, and Rami Qais Malik. "Managing security in IoT by applying the deep neural network-based security framework." Eastern-European Journal of Enterprise Technologies 6, no. 9 (120) (December 30, 2022): 38–50. http://dx.doi.org/10.15587/1729-4061.2022.269221.

Full text
Abstract:
Security issues and Internet of Things (IoT) risks in several areas are growing steadily with the increased usage of IoT. The systems have developed weaknesses in computer and memory constraints in most IoT operating systems. IoT devices typically cannot operate complicated defense measures because of their poor processing capabilities. A shortage of IoT ecosystems is the most critical impediment to developing a secured IoT device. In addition, security issues create several problems, such as data access control, attacks, vulnerabilities, and privacy protection issues. These security issues lead to affect the originality of the data that cause to affects the data analysis. This research proposes an AI-based security method for the IoT environment (AI-SM-IoT) system to overcome security problems in IoT. This design was based on the edge of the network of AI-enabled security components for IoT emergency preparedness. The modules presented detect, identify and continue to identify the phase of an assault life span based on the concept of the cyberspace killing chain. It outlines each long-term security in the proposed framework and proves its effectiveness in practical applications across diverse threats. In addition, each risk in the borders layer is dealt with by integrating artificial intelligence (AI) safety modules into a separate layer of AI-SM-IoT delivered by services. It contrasted the system framework with the previous designs. It described the architectural freedom from the base areas of the project and its relatively low latency, which provides safety as a service rather than an embedded network edge on the internet-of-things design. It assessed the proposed design based on the administration score of the IoT platform, throughput, security, and working time
APA, Harvard, Vancouver, ISO, and other styles
30

Malge, Sunilkumar, and Pallavi Singh. "Internet of Things IoT: Security Perspective." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 1041–43. http://dx.doi.org/10.31142/ijtsrd24010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Fedrik, Dr E. J. Thomson, A. Vinitha, and B. Vanitha. "Review on Vulnerabilities of IoT Security." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 1117–19. http://dx.doi.org/10.31142/ijtsrd24020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Choudhary, Yash, B. Umamaheswari, and Vijeta Kumawat. "A Study of Threats, Vulnerabilities and Countermeasures: An IoT Perspective." Shanlax International Journal of Arts, Science and Humanities 8, no. 4 (April 1, 2021): 39–45. http://dx.doi.org/10.34293/sijash.v8i4.3583.

Full text
Abstract:
IoT or the Internet of things refers to all the physical devices connected to the internet. IoT consists of computing devices that are web-enabled and have the capability of sensing, collecting, and sending data. IoT provides the ability to remote control appliances and has many more applications. Since IoT is becoming a big part of society, it is necessary to ensure that these devices provide adequate security measures. This paper discusses various security issues in IoT systems like threats, vulnerabilities and some countermeasures which can be used to provide some security. Developing a secure device is now more important than ever, as with the increase in digitization, much of a user’s data is available on these devices. Securing data is a primary concern in any system, as internet-enabled devices are easier to hack. The idea of this paper is to spread awareness and improve the security of IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
33

Shevtsov, Vadim, and Nikita Kasimovsky. "Threat and Vulnerability Analysis of IoT and IIoT Concepts." NBI Technologies, no. 3 (March 2021): 28–35. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.5.

Full text
Abstract:
IoT and IIoT are new information technologies. They are very efficient solutions for home, industry and infrastructure. A lot of complex processes can be implemented using this systems. The popularity of the industrial Internet of things is steadily growing along with the development of the Internet of things. Both of these approaches involve the exchange of data over the Internet, use of common hardware platforms and are managed by using specialized software, and this leads to an increase in the number of common vulnerabilities and possible attacks on industrial facilities. The Frost & Sullivan report shows that industrial and IT infrastructures are becoming more transparent. First of all, this is due to the development of the Industrial 4.0 standard and the refusal to isolate industrial facilities, which entails common vulnerabilities, the use of security services based on the SaaS model for industrial facilities, as well as the use of hardware devices that a potential attacker can access quite easily. But very actual problems of IoT and IIoT are information security. Many of this systems are critical and little error can stop the entire system. This is not hard for hackers because that complex system has sensitive components usually. For example simple router can have a lot of vulnerabilities. There an attacker takes a root easily in every system. To solve the problem successfully it is recommended to use complex security actions. These are secure configurations of network devices, using safe devices and protocols, regular audit, using backups, using actual politics of information security.
APA, Harvard, Vancouver, ISO, and other styles
34

Awad Saad Al-Qahtani, Mohammad Ayoub Khan, Awad Saad Al-Qahtani, Mohammad Ayoub Khan. "Predicting Internet of Things (IOT) Security and Privacy Risks – A Proposal Model: توقع مخاطر أمن وخصوصية إنترنت الأشياء (IOT) – نموذج مقترح بحثي." Journal of engineering sciences and information technology 5, no. 3 (September 30, 2021): 133–12. http://dx.doi.org/10.26389/ajsrp.q070621.

Full text
Abstract:
The Internet of things (IOT) users lack awareness of IOT security infrastructure to handle the risks including Threats, attack and penetration associated with its use. IOT devices are main targets for cyber-attacks due to variable personally identifiable information (PII) stored and transmit in the cyber centers. The security risks of the Internet of Things aimed to damage user's security and privacy. All information about users can be collected from their related objects which are stored in the system or transferred through mediums among diverse smart objects and may exposed to exposed dangerous of attacks and threats if it lack authentication so there are essential need to make IOT security requirements as important part of its efficient implementation. These requirements include; availability, accountability, authentication, authorization, privacy and confidentiality, Integrity and Non-repudiation. The study design is a survey research to investigate the visibility of the proposed model of security management for IOT uses, the security risks of IOT devices, and the changes IOT technology on the IT infrastructure of IOT users through answering of the research questionnaires. This work proposes a model of security management for IOT to predict IOT security and privacy threats, protect IOT users from any unforeseen dangers, and determine the right security mechanisms and protocols for IOT security layers, as well as give the most convenient security mechanisms. Moreover, for enhancing the performance of IOT networks by selecting suitable security mechanisms for IOT layers to increase IOT user's security satisfaction.
APA, Harvard, Vancouver, ISO, and other styles
35

H.J., Felcia Bel, and Sabeen S. "A Survey on IoT Security: Attacks, Challenges and Countermeasures." Webology 19, no. 1 (January 20, 2022): 3741–63. http://dx.doi.org/10.14704/web/v19i1/web19246.

Full text
Abstract:
IoT technology grows enormously now-a-days in various fields and it is a need to achieve high security requirements. IoT produces more amounts of data to communicate to each other which may undergo various issues like low processor speed, power, and memory. The IoT devices undergoing these barriers along with crucial information will get into different types of security attacks in IoT layers. An outline of IoT, it’s architecture, state-of-the-art technologies, security attacks in layers and analysis of security threats are studied and the countermeasures have been reported in this survey. The challenges and goals facing IoT security have also been discussed. The security threats on the IoT devices have been briefly introduced. The security challenges, giving research directions and finding security solution for each and every challenge have been also discussed.
APA, Harvard, Vancouver, ISO, and other styles
36

Wu, Qi Wu, and Ling Zhi Jiang. "A Flexible Security Architecture for the Internet of Things." Applied Mechanics and Materials 241-244 (December 2012): 3255–59. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.3255.

Full text
Abstract:
Security architecture is the key problem of each network construction, Internet of things (IoT) is no exception. Firstly, existing research results in relation to security architecture of IoT are summarized. Then, on the basis of the analysis of the IoT security problem, this paper discusses the network security service requirements of IoT. Finally, a novel hierarchical and flexible secure architecture for IoT is proposed, which includes the security perception layer, security network layer and security application layer. Meanwhile, it involves security services entity and security management entity. The security architecture can provide strong technical support for security construction of IoT.
APA, Harvard, Vancouver, ISO, and other styles
37

Embarak, Ossama H., Maryam J. Almesmari, and Fatima R. Aldarmaki. "Apply Neutrosophic AHP Analysis of the Internet of Things (IoT) and the Internet of Behavior (IoB) in Smart Education." International Journal of Neutrosophic Science 19, no. 1 (2022): 200–211. http://dx.doi.org/10.54216/ijns.190115.

Full text
Abstract:
The concept of the Internet of Things (IoT) has emerged in recent years to describe our increasingly interconnected physical world. Even if there are now goods on the market that are connected to the Internet of Things, there are still obstacles to be addressed, such as security concerns and a general lack of trust in and familiarity with the technology. The purpose of this research is to examine what goes into making a good Internet of Things (IoT) system for smart education that deals with IoT. In this research, we use neutrosophic theory and the Analytic Hierarchy Process (AHP) to create a decision-support system based on rules for assessing the impactful elements of the Internet of Things in smart education. According to the results of this investigation, security, value, and connectivity are more crucial than intangible qualities (Telepresence and Intelligence). This research suggests that the internet of behavior (IoB) and a sustainable Internet of Things (IoT) ecosystem requires strong IoT security measures to be implemented once smart education has established a reliable IoT connection. Likewise, smart education needs to think about the benefits of IoT security and IoT ethics for the goods they use and the comfort of their staff.
APA, Harvard, Vancouver, ISO, and other styles
38

Istiaque Ahmed, Kazi, Mohammad Tahir, Mohamed Hadi Habaebi, Sian Lun Lau, and Abdul Ahad. "Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction." Sensors 21, no. 15 (July 28, 2021): 5122. http://dx.doi.org/10.3390/s21155122.

Full text
Abstract:
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the electric power grid or water supply systems has emerged as a major national and global priority. To address the security issue of IoT, several studies are being carried out that involve the use of, but are not limited to, blockchain, artificial intelligence, and edge/fog computing. Authentication and authorization are crucial aspects of the CIA triad to protect the network from malicious parties. However, existing authorization and authentication schemes are not sufficient for handling security, due to the scale of the IoT networks and the resource-constrained nature of devices. In order to overcome challenges due to various constraints of IoT networks, there is a significant interest in using machine learning techniques to assist in the authentication and authorization process for IoT. In this paper, recent advances in authentication and authorization techniques for IoT networks are reviewed. Based on the review, we present a taxonomy of authentication and authorization schemes in IoT focusing on machine learning-based schemes. Using the presented taxonomy, a thorough analysis is provided of the authentication and authorization (AA) security threats and challenges for IoT. Furthermore, various criteria to achieve a high degree of AA resiliency in IoT implementations to enhance IoT security are evaluated. Lastly, a detailed discussion on open issues, challenges, and future research directions is presented for enabling secure communication among IoT nodes.
APA, Harvard, Vancouver, ISO, and other styles
39

Obaidat, Muath A., Suhaib Obeidat, Jennifer Holst, Abdullah Al Hayajneh, and Joseph Brown. "A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures." Computers 9, no. 2 (May 30, 2020): 44. http://dx.doi.org/10.3390/computers9020044.

Full text
Abstract:
The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used. They vary widely in size, computational power, capacity storage, and energy. The explosive growth and integration of IoT in different domains and areas of our daily lives has created an Internet of Vulnerabilities (IoV). In the rush to build and implement IoT devices, security and privacy have not been adequately addressed. IoT devices, many of which are highly constrained, are vulnerable to cyber attacks, which threaten the security and privacy of users and systems. This survey provides a comprehensive overview of IoT in regard to areas of application, security architecture frameworks, recent security and privacy issues in IoT, as well as a review of recent similar studies on IoT security and privacy. In addition, the paper presents a comprehensive taxonomy of attacks on IoT based on the three-layer architecture model; perception, network, and application layers, as well as a suggestion of the impact of these attacks on CIA objectives in representative devices, are presented. Moreover, the study proposes mitigations and countermeasures, taking a multi-faceted approach rather than a per layer approach. Open research areas are also covered to provide researchers with the most recent research urgent questions in regard to securing IoT ecosystem.
APA, Harvard, Vancouver, ISO, and other styles
40

Murthy, A. V. V. S., and Reddy P. Vasudeva. "Application of mathematics in design of group key management method." i-manager’s Journal on Mathematics 11, no. 1 (2022): 31. http://dx.doi.org/10.26634/jmat.11.1.18502.

Full text
Abstract:
Group theory and Combinatorics play important role in design security protocols, algorithms and techniques for various security applications. Secure group-oriented communication is crucial to a wide range of applications in Internet of Things (IoT). Key management is the mechanism which is used to work out the problem of creation, establishment, to distribute, periodic refresh and the maintenance of the cryptographic keys. It is not enough to care only about primitives that satisfy a stated security objective in the domain of the IoT. The design of group key establishment techniques for securing group communications between resource-constrained IoT devices is presented in this work. Furthermore, the paper assesses possible ways for tailoring current security protocols to the peculiarities of IoT devices and networks.
APA, Harvard, Vancouver, ISO, and other styles
41

Petrenko, Sergei. "Cyber Resilient Platform for Internet of Things (IIOT/IOT)ED Systems: Survey of Architecture Patterns." Voprosy kiberbezopasnosti, no. 2(42) (2021): 81–91. http://dx.doi.org/10.21681/2311-3456-2021-2-81-91.

Full text
Abstract:
Purpose of the article: development of tools for building the cyber resilient platform for Internet of things (IIoT/IoT). The urgency of development the cyber resilient platform for Internet of things (IIoT/IoT) is to provide the required security and resilience of critical information infrastructure of the Russian Federation in the face of rising security threats, and imperfection of the known models, methods and means for data collection and processing in IIoT/IoT networks, based on the wireless technology Sigfox, LoRaWaN, “Strij/”Vaviot” (XNB/Nb-Fi), NBIoT. Research methods: It uses the author’s models and methods of similarity and dimensions theory of the distributed computing, as well as the domestic technology of wireless communication Logic Inter Node Connection (LINC) (http:// aura360.ru/), as well as the domestic FenixOS operating system (https://fenix.link/kontakty/), designed for collecting and processing the telemetry data. Results: Developed tools for building the cyber resilient platform for Internet of things (IIoT/IoT). The article presents the main scientific and technical results of solving this problem. The research was carried out within the framework of the Federal project “Information security” of the national program “Digital economy of the Russian Federation”. It is important to note that the results allowed designing a prototype of the domestic Internet of things (IIoT/IoT) platform with self-healing data reception and transmission paths between smart devices
APA, Harvard, Vancouver, ISO, and other styles
42

Jin Ho Park, Jin Ho Park, Sushil Kumar Singh Jin Ho Park, Mikail Mohammed Salim Sushil Kumar Singh, Abir EL Azzaoui Mikail Mohammed Salim, and Jong Hyuk Park Abir EL Azzaoui. "Ransomware-based Cyber Attacks: A Comprehensive Survey." 網際網路技術學刊 23, no. 7 (December 2022): 1557–64. http://dx.doi.org/10.53106/160792642022122307010.

Full text
Abstract:
<p>Internet of Things (IoT) and sensor devices have been connected due to the development of the IoT and Information Communication Technology (ICT). It offers automatic environments in smart city and IoT scenarios and describes investments in advanced resources in futuristic human lives as sustainable growth of quality-wise life with intelligent infrastructure. Nowadays, IoT devices are continuously increasing and utilized in advanced IoT applications, including Smart Homes, Smart Farming, Smart Enterprises, and others. However, security and privacy are significant challenges with Ransomware-based Cyber-attack detection in IoT due to the lack of security design and heterogeneity of IoT devices. In the last few years, various advanced paradigms and technologies have been utilized to mitigate the security issues with Ransomware attack detection in IoT devices and data. This paper comprehensively surveys Ransomware-based Cyber Attacks and discusses solutions based on advanced technologies such as Artificial Intelligence (AI), Blockchain, and Software Defined Networks (SDN). Then, we design service scenarios for ransomware-based cyber-attack detection. Finally, we summarize the open research challenges and future directions for ransomware in IoT.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
43

Kavianpour, Sanaz, Bharanidharan Shanmugam, Sami Azam, Mazdak Zamani, Ganthan Narayana Samy, and Friso De Boer. "A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices." Journal of Computer Networks and Communications 2019 (August 29, 2019): 1–14. http://dx.doi.org/10.1155/2019/5747136.

Full text
Abstract:
Internet of Things (IoT) has become one of the most significant technologies in recent years because of possessing the diverse application domains. The variety of applications results in a large amount of users’ private information diffusion that will pose a paramount security concern. User authentication is a significant factor in the IoT environment as it allows the user to communicate with the device securely. Integration of authentication technologies with IoT ensures secure data retrieval and robust access control. This paper provides a comprehensive systematic literature review of various authentication mechanisms for IoT security proposed in the literature. With the comparison of existing authentication mechanisms that are developed for the IoT in terms of security via a multicriteria classification, the open issues that require further research are identified.
APA, Harvard, Vancouver, ISO, and other styles
44

Khelf, Roumaissa, Nacira Ghoualmi-Zine, and Marwa Ahmim. "TAKE-IoT." International Journal of Embedded and Real-Time Communication Systems 11, no. 3 (July 2020): 1–21. http://dx.doi.org/10.4018/ijertcs.2020070101.

Full text
Abstract:
The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements and withstands various types of known attacks. Moreover, TAKE-IoT aims to reduce computation costs using lightweight operations for the key generation. The proposed protocol is validated using the automated validation of internet security protocols and applications (AVISPA) tool. Hence, results show that TAKE-IoT can reach a proper level of security without sacrificing its efficiency in the context of IoT.
APA, Harvard, Vancouver, ISO, and other styles
45

Mohammed Saleem Kurda, Reben, Umran Abdullah Haje, Muhamad Hussein Abdulla, and Zhwan Mohammed Khalid. "A Review on Security and Privacy Issues in IoT Devices." Academic Journal of Nawroz University 10, no. 4 (January 11, 2022): 192–205. http://dx.doi.org/10.25007/ajnu.v10n4a1245.

Full text
Abstract:
In our everyday lives, the IoT is everywhere. They are used for the monitoring and documentation of environmental improvements, fire safety and even other useful roles in our homes, hospitals and the outdoors. IoT-enabled devices that are linked to the internet transmit and receive a large amount of essential data over the network. This provides an opportunity for attackers to infiltrate IoT networks and obtain sensitive data. However, the risk of a loss of privacy and security could outweigh any of these benefits. Many tests have been carried out in order to solve these concerns and find a safer way to minimize or remove the effect of IoT technologies on privacy and security practices in order to protect them. The issue with IoT devices is that they have small output modules, making it impossible to adapt current protection methods to them. This constraint necessitates the presentation of lightweight algorithms that enable IoT devices. In this article, investigated the context and identify different safety, protection, and approaches for securing components of IoT-based ecosystems and systems, as well as evolving security solutions. In addition, several proposed algorithms and authentication methods in IoT were discussed in order to avoid various types of attacks while keeping the limitations of the IoT framework in mind. Also discuss some hardware security in IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
46

Vijayakumaran, C., B. Muthusenthil, and B. Manickavasagam. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.

Full text
Abstract:
Architectural changes are happening in the modern industries due to the adaption and the deployment of ‘Internet of Things (IoT)’ for monitoring and controlling various devices remotely from the external world. The most predominant place where the IoT technology makes the most sense is the industrial automation processes in smart industries (Industry 4.0). In this paper, a reliable ‘Next Generation Cyber Security Architecture (NCSA)’ is presented for Industrial IoT (IIoT) environment that detects and thwarts cybersecurity threats and vulnerabilities. It helps to automate the processes of exchanging real-time critical information between devices without any human intervention. It proposes an analytical framework that can be used to protect entities and network traffics involved in the IIoT wireless communication. It incorporates an automated cyber-defense authentication mechanism that detects and prevents security attacks when a network session has been established. The defense mechanism accomplishes the required level of security protection in the network by generating an identity token which is cryptographically encrypted and verified by a virtual gateway system. The proposed NCSA improves security in the IIoT environment and reduces operational management cost.
APA, Harvard, Vancouver, ISO, and other styles
47

Ahmed, Musa Midila. "Hybrid Encryption for Messages’ Confidentiality in SOSE-Based IOT Service Systems." International Journal of Innovative Computing 11, no. 2 (October 31, 2021): 1–6. http://dx.doi.org/10.11113/ijic.v11n2.292.

Full text
Abstract:
Internet of Things (IOT) is an essential paradigm where devices are interconnected into network. The operations of these devices can be through service-oriented software engineering (SOSE) principles for efficient service provision. SOSE is an important software development method for flexible, agile, loose-coupled, heterogeneous and interoperable applications. Despite all these benefits, its adoption for IOT services is slow due to security challenges. The security challenge of integration of IOT with service-oriented architecture (SOA) is man-in-the-middle attack on the messages exchanged. The transport layer security (TLS) creates a secured socket channel between the client and server. This is efficient in securing messages exchanged at the transport layer only. SOSE-based IOT systems needs an end-to-end security to handle its vulnerabilities. This integration enables interoperability of heterogeneous devices, but renders the system vulnerable to passive attacks. The confidentiality problem is hereby addressed by message level hybrid encryption. This is by encrypting the messages by AES for efficiency. However, to enable end-to-end security, the key sharing problem of advanced encryption standard (AES) is handled by RSA public key encryption. The results shows that this solution addressed data contents security and credentials security privacy issues. Furthermore, the solution enables end-to- end security of interaction in SOSE-based IOT systems.
APA, Harvard, Vancouver, ISO, and other styles
48

Pal, Shantanu, Michael Hitchens, Tahiry Rabehaja, and Subhas Mukhopadhyay. "Security Requirements for the Internet of Things: A Systematic Approach." Sensors 20, no. 20 (October 19, 2020): 5897. http://dx.doi.org/10.3390/s20205897.

Full text
Abstract:
There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner.
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Shancang, Theo Tryfonas, and Honglei Li. "The Internet of Things: a security point of view." Internet Research 26, no. 2 (April 4, 2016): 337–59. http://dx.doi.org/10.1108/intr-07-2014-0173.

Full text
Abstract:
Purpose – The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications. Design/methodology/approach – Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management. Findings – IoT calls for new security infrastructure based on the new technical standards. As a consequence, new security design for IoT shall pay attention to these new standards. Security at both the physical devices and service-applications is critical to the operation of IoT, which is indispensable for the success of IoT. Open problems remain in a number of areas, such as security and privacy protection, network protocols, standardization, identity management, trusted architecture, etc. Practical implications – The implications to various applications including supervisory control and data acquisition, enterprise systems, social IoT are discussed. The paper will serve as a starting point for future IoT security design and management. The security strategies for IoT should be carefully designed by managing the tradeoffs among security, privacy, and utility to provide security in multi-layer architecture of IoT. Originality/value – The paper synthesizes the current security requirements for IoT and provides a clear framework of security infrastructure based on four layers. Accordingly, the security requirements and potential threats in the four-layer architecture are provided in terms of general devices security, communication security, network security, and application security.
APA, Harvard, Vancouver, ISO, and other styles
50

Yue, Yawei, Shancang Li, Phil Legg, and Fuzhong Li. "Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey." Security and Communication Networks 2021 (January 8, 2021): 1–13. http://dx.doi.org/10.1155/2021/8873195.

Full text
Abstract:
Internet of Things (IoT) applications have been used in a wide variety of domains ranging from smart home, healthcare, smart energy, and Industrial 4.0. While IoT brings a number of benefits including convenience and efficiency, it also introduces a number of emerging threats. The number of IoT devices that may be connected, along with the ad hoc nature of such systems, often exacerbates the situation. Security and privacy have emerged as significant challenges for managing IoT. Recent work has demonstrated that deep learning algorithms are very efficient for conducting security analysis of IoT systems and have many advantages compared with the other methods. This paper aims to provide a thorough survey related to deep learning applications in IoT for security and privacy concerns. Our primary focus is on deep learning enhanced IoT security. First, from the view of system architecture and the methodologies used, we investigate applications of deep learning in IoT security. Second, from the security perspective of IoT systems, we analyse the suitability of deep learning to improve security. Finally, we evaluate the performance of deep learning in IoT system security.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography