Literatura académica sobre el tema "Security IoT"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Security IoT".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Security IoT"

1

Jogdand, Gopal, Shubham Kadam, Kiran Patil y Gaurav Mate. "Iot Transaction Security". Journal of Advances and Scholarly Researches in Allied Education 15, n.º 2 (1 de abril de 2018): 711–16. http://dx.doi.org/10.29070/15/57056.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Abosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan y Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications". Sensors 21, n.º 11 (24 de mayo de 2021): 3654. http://dx.doi.org/10.3390/s21113654.

Texto completo
Resumen
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising these opportunities, businesses engage in creating the Industrial Internet of Things (IIoT). IoT is vulnerable to hacks and, therefore, requires various techniques to achieve the level of security required. Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits. To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and highlights the existing security approaches for the most significant industrial applications. This paper mainly classifies the attacks and possible security solutions regarding IoT layers architecture. Consequently, each attack is connected to one or more layers of the architecture accompanied by a literature analysis on the various IoT security countermeasures. It further provides a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems. Additionally, there is a discussion of the emerging tools and simulations used for testing and evaluating security mechanisms in IoT applications. Last, this survey outlines several other relevant research issues and challenges for IoT/IIoT security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Toka, K. O., Y. Dikilitaş, T. Oktay y A. Sayar. "SECURING IOT WITH BLOCKCHAIN". International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (23 de diciembre de 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.

Texto completo
Resumen
Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc. Blockchain is a new approach used to securely record transactions and offers potential solutions to computer and internet security issues such as confidentiality, integrity, availability, authentication, authorization, and accountability. Blockchain, as a decentralized ledger consisting of interconnected blocks, can remedy most of the security deficiencies of heavily IoT based systems. The Hyperledger Fabric blockchain network used in this study provides confidentiality, data integrity, authentication, and data security for data obtained from IoT devices. Widely used IoT data transfer MQTT protocol is included in the proposed approach. The approach is demonstrated in a simple demo Hyperledger network with simulated IoT devices. The proposed approach is discussed in terms of network security dimensions. Based on the features of the Hyperledger Blockchain network, it is displayed that the IoT security deficiencies can largely be remedied with the proposed approach.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Raimundo, Ricardo Jorge y Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management". Applied Sciences 12, n.º 3 (2 de febrero de 2022): 1598. http://dx.doi.org/10.3390/app12031598.

Texto completo
Resumen
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited, as far as machine resources are concerned. In this way, traditional security does not fit in IoT systems. The issue of cybersecurity has become paramount to the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) in mitigating cybersecurity risk for organizations and end users. New cybersecurity technologies/applications present improvements for IoT security management. Nevertheless, there is a gap in the effectiveness of IoT cyber risk solutions. This review article discusses the literature trends around opportunities and threats in cybersecurity for IIoT, by reviewing 70 key articles discovered from a profound Scopus literature survey. It aims to present the current debate around the issue of IIoT rather than suggesting any particular technical solutions to solve network security problems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Saidkulovich, Sanjar Muminov, Husanboy Shoraimov Uktamboyevich y Umarbek Akramov Farkhodugli. "Internet-of-things security and vulnerabilities: Iot security, iot taxonomy". ACADEMICIA: An International Multidisciplinary Research Journal 11, n.º 3 (2021): 620–24. http://dx.doi.org/10.5958/2249-7137.2021.00676.5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Ma, Jinnan, Xuekui Shangguan y Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home". Wireless Communications and Mobile Computing 2022 (21 de agosto de 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.

Texto completo
Resumen
The Internet of Things (IoT) acts as a tremendous network that is constructed by fusing diverse sensors. IoT can achieve the interconnection of individuals, things, and machines at any place and time and improve the function performance of network applications. However, the security of IoT has always been a major problem that may limit the application perspective of IoT technologies. Nowadays, industrial IOT (IIoT), Internet of vehicles (IoV), and smart home have become the three primary emerging perspectives of the current IoT studies, and it is necessary to systematically highlight the security analysis of these three types of scenarios. Hence, in this paper, guided by the three major IoT application scenarios, i.e., IIoT, IoV, and smart home, we sum up the development status of IoT security technologies, analyzed corresponding technical difficulties, and discussed several future outlook of challenges and development trends for the IoT technology.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Al Reshan, Mana Saleh. "IoT-based Application of Information Security Triad". International Journal of Interactive Mobile Technologies (iJIM) 15, n.º 24 (21 de diciembre de 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.

Texto completo
Resumen
Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, and privacy are not addressed well. Most IoT devices having constraints in computational and operational capabilities are a threat to security and privacy, also prone to cyber-attacks. This study presents a CIA triad-based information security implementation for the four-layer architecture of the IoT devices. An overview of layer-wise threats to the IoT devices and finally suggest CIA triad-based security techniques for securing the IoT devices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Li, Yunfa, Yifei Tu, Jiawa Lu y Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things". Sensors 20, n.º 3 (9 de febrero de 2020): 916. http://dx.doi.org/10.3390/s20030916.

Texto completo
Resumen
With the rapid development of the Internet of Things (IoT), the number of IoT devices has increased exponentially. Therefore, we have put forward higher security requirements for the management, transmission, and storage of massive IoT data. However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. Once the server is maliciously attacked, the security of IoT data will be greatly threatened. In view of the above-mentioned security issues, a security transmission and storage solution is proposed about sensing image for blockchain in the IoT. Firstly, this solution intelligently senses user image information, and divides these sensed data into intelligent blocks. Secondly, different blocks of data are encrypted and transmitted securely through intelligent encryption algorithms. Finally, signature verification and storage are performed through an intelligent verification algorithm. Compared with the traditional IoT data transmission and centralized storage solution, our solution combines the IoT with the blockchain, making use of the advantages of blockchain decentralization, high reliability, and low cost to transfer and store users image information securely. Security analysis proves that the solution can resist theft attacks and ensure the security of user image information during transmission and storage.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Papoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis y Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns". Applied Sciences 11, n.º 4 (4 de febrero de 2021): 1396. http://dx.doi.org/10.3390/app11041396.

Texto completo
Resumen
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services. In this context, patterns, which are constructs encoding re-usable solutions to common problems and building blocks to architectures, can be an asset in alleviating said barrier. More specifically, patterns can be used to encode dependencies between SP properties of individual smart objects and corresponding properties of orchestrations (compositions) involving them, facilitating the design of IoT solutions that are secure and privacy-aware by design. Motivated by the above, this work presents a survey and taxonomy of SP patterns towards the creation of a usable pattern collection. The aim is to enable decomposition of higher-level properties to more specific ones, matching them to relevant patterns, while also creating a comprehensive overview of security- and privacy-related properties and sub-properties that are of interest in IoT/IIoT environments. To this end, the identified patterns are organized using a hierarchical taxonomy that allows their classification based on provided property, context, and generality, while also showing the relationships between them. The two high-level properties, Security and Privacy, are decomposed to a first layer of lower-level sub-properties such as confidentiality and anonymity. The lower layers of the taxonomy, then, include implementation-level enablers. The coverage that these patterns offer in terms of the considered properties, data states (data in transit, at rest, and in process), and platform connectivity cases (within the same IoT platform and across different IoT platforms) is also highlighted. Furthermore, pointers to extensions of the pattern collection to include additional patterns and properties, including Dependability and Interoperability, are given. Finally, to showcase the use of the presented pattern collection, a practical application is detailed, involving the pattern-driven composition of IoT/IIoT orchestrations with SP property guarantees.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Kant, Daniel, Andreas Johannsen y Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol". Electronic Imaging 2021, n.º 3 (18 de junio de 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Texto completo
Resumen
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment such as failure or impairment of production systems. We evaluate the prevalence of exposed IoT and IIoT devices related to the protocol MQTT by means of the search engine Shodan. The approach, design and results of our analysis are summarized in this paper.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Tesis sobre el tema "Security IoT"

1

Laaboudi, Younes. "Reactive security of IoT communications". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249633.

Texto completo
Resumen
IoT networks’ intrinsic vulnerabilities can be protected through intru- sion detection and response systems (IDRS). Anomaly-based intrusion detection offers multiple advantages: it can detect unknown attacks and it can adapt to multiple types of protocols. However, intrusion response is harder to carry out in combination with an anomaly-based detection system in part due to the possibility of false positive alerts. Through two implementations of IDRS in two distinct IoT networks, this thesis will highlight ways to improve anomaly-based detection and allow for appropriate response when possible. The results show that anomaly-based detection can be used in the case of a ZigBee IoT network to detect different types of attacks without previous knowl- edge of these attacks. Moreover, soft response methods that improve the quality of detection with a low impact on the IoT network behavior are achievable.
IoT-nätverks sårbarheter kan skyddas genom intrångsdetektering och svarsystem (IDRS). Anomalibaserad intrångsdetektering erbjuder flera fördelar: det kan upptäcka okända attacker och det kan anpassa sig till flera typer av protokoll. Inbrottssvaret är svårare att genomföra i kombination med ett anomalibaserat detekteringssystem, delvis på grund av möjligheten till falska positiva varningar. Det här exjobbet söker sätt att förbättra anomalibaserad detektering och svar genom två implementeringar av IDRS i två distinkta IoT-nätverk. Resultaten visar att anomalibaserad detektering kan användas vid ett ZigBee IoT- nätverk för att upptäcka olika typer av attacker utan tidigare kunskaper om den här attackerna. Dessutom kan mjuka svarmetoder användas för att förbättrar detekteringskvaliteten med låg inverkan på IoT- nätverksbeteendet.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Shakra, Mohamed y Ahmad Jabali. "Evaluating Security For An IoT Device". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289631.

Texto completo
Resumen
IoT systems usage is rapidly growing, and is involved in many industries causing more potential security flaws to a freshly new field. Even light bulbs, have a new generation called smart light bulbs have taken a step into the IoT world. In this project an affordable and available light bulb has it’s security evaluated by using a well known attacks to test the device security. It was concluded that the studied light bulb was found to be secured by the array of penetration tests carried in this project. However, the methods used for evaluating the device can be applicable to any other IoT for any future security evaluation.
IoT-systemanvändningen växer snabbt och är involverad i många branscher som orsakar fler potentiella säkerhetsbrister i ett nyligen nytt fält. Även glödlampor, har en ny generation som heter textit smarta glödlampor har tagit ett steg in i IoT- världen. I det här dokumentet utvärderas en prisvärd och tillgänglig glödlampa genom att använda en välkänd attack för att testa enhetens säkerhet. Det drogs slutsatsen att den studerade glödlampan befanns vara säkrad genom den mängd penetrationstester som utfördes i detta dokument. Metoderna som används för att utvärdera enheten kan dock tillämpas på vilken annan IoT som helst för framtida säkerhetsutvärdering.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Makkar, Ankush. "Enhancing IoT Security Using 5G Capabilities". Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.

Texto completo
Resumen
Internet of Things (IoT) is an ecosystem comprises CT (Communication Technology),IT (Information Technology) and sometime OT (Operational Technologies) wheredifferent machines and devices can interact with each other and exchange useful datawhich can be processed using different IoT applications to take decisions and performrequired actions. Number of IoT devices and IoT networks are growing exponentially.Security is of utmost importance and without proper security implementation, IoTNetworks with billions of devices will be hacked and used as botnets which can createdisaster. The new IoT use cases cannot be realized using the current communicationtechnologies due to the QoS (Quality of Service) and business requirements. 5Gnetwork are designed keeping IoT use cases in mind and with the development of 5Gnetwork, it will be easier to implement more secured IoT network and enable differentIoT use cases which are not feasible today.To build the future IoT networks with 5G, it’s important to study and understand 5Gsecurity features. Security is perceived as one of the most important considerationwhile building IoT solutions and to implement 5G network for IoT solutions require anoverall understanding of 5G security features. In the thesis, work have been done toidentify the gap in the current research with respect to 5G security features anddescribe 5G features that will enhance IoT security. After identifying key 5G securityfeatures, the implementation of the identified 5G security features will be describedwith the 5G based smart grid and smart factory use cases. The key finding is howdifferent 5G security capabilities secure IoT communication and another importantfinding is that not all security capabilities are applicable to all IoT use cases. Hence,security capabilities to be used based on the 5G use case requirement.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Söderquist, Mårten. "Tiny Security : Evaluating energy use for security in an IoT application". Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36860.

Texto completo
Resumen
IoT devices are   increasingly used in the process of gathering scientific data. In   environmental monitoring IoT devices can be used as remote sensing devices to   collect information about e.g. temperature. To keep data reliable, various   security aspects have to be considered. Constrained devices are limited by   memory size and battery life, a security solution has to be developed with   this in mind. In this study an IoT security solution was developed in collaboration   with a research group in environmental science at Umeå University. We   selected commonly used algorithms and compared them with the goal to provide   authentication and integrity for an IoT application, while minimizing energy   use running on an Atmega 1284P. The results showed that the encryption   algorithm AES-256-GCM is a good choice for a total security solution.   AES-256-GCM provides authenticated encryption with additional data while, in   relation to the other tested algorithms, using energy at a low level and   leaving a small program size footprint.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Tjäder, Hampus. "End-to-end Security Enhancement of an IoT Platform Using Object Security". Thesis, Linköpings universitet, Informationskodning, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138838.

Texto completo
Resumen
The Internet of Things (IoT) is seen as one of the next Internet revolutions. In a near future the majority of all connected devices to the Internet will be IoT devices. These devices will connect previously offline constrained systems, thus it is essential to ensure end-to-end security for such devices. Object Security is a concept where the actual packet or sensitive parts of the packet are encrypted instead of the radio channel. A compromised node in the network will with this mechanism still have the data encrypted ensuring full end-to-end security. This paper proposes an architecture for using the object security format COSE in a typical constrained short-range radio based IoT platform. The IoT platform utilizes Bluetooth Low Energy and the Constrained Application Protocol for data transmission via a capillary gateway. A proof-of-concept implementation based on the architecture validates that the security solution is implementable. An overhead comparison between current channel security guidelines and the proposed object security solution results in a similar size for each data packet. The thesis concludes that object security should be seen as an alternative for ensuring end-to-end security for the Internet of Things.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Shahidi, Hamed. "Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.

Texto completo
Resumen
This research studies the security challenges in IoT devices. At first, security challenges have been described and then specifically the security of communication protocols in the IoT has been addressed. Finally, among different communication protocols, ZigBee and Z-Wave protocols have been chosen for this study. The criterion for choosing these two protocols is the level of security they provide for IoT devices to protect them against unauthorized access and hacking. Security, frequency, power consumption and data rate are the characteristics that have been discussed in the review of these two protocols. In the end, a comparison of the various features of these two protocols clarified that the security of IoT devices in each of these protocols depends on the type of the IoT device, the required range and other requirements, however, in most cases the ZigBee protocol showed more security than Z-Wave.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Blázquez, Rodríguez Alberto. "Security and AAA Architectures in an IoT Marketplace". Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-234660.

Texto completo
Resumen
Nowadays, the concept of Internet of Things has revolutionized the industry, making possible the existence of billions of devices worldwide that constantly produce vast amounts of data. This valuable information may only be processed and filtered by complex applications that will eventually sell the information as products. As a consequence, protection of this data and secure, authorized access turn out to be key priorities in this field. A study about authentication protocols has been carried out, according to certain security factors, giving as outcome that OpenID Connect might be the best solution to the problem. Therefore, an authentication / authorisation module has been developed for an IoT platform to protect its data. Evaluations made for the module stated that the protocol and its implementation assure enough levels of security. Nonetheless, accounting features and a better user privacy management are still open issues that avoid full protection of data in an open technology as the Internet.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Beaulaton, Delphine. "Security Analysis of IoT Systems using Attack Trees". Thesis, Lorient, 2019. http://www.theses.fr/2019LORIS548.

Texto completo
Resumen
L’Internet des Objects (IoT) est un modèle qui évolue rapidement et qui permet à des utilisateursd’utiliser et contrôler une large variété d’objets connectés entre eux. Ces environnementsconnectés augmentent la surface d’attaque d’un système puisque les risques sont multipliés parle nombre d’appareils connectés. Ces appareils sont responsables de tâches plus ou moinscritiques, et peuvent donc être la cible d’utilisateurs malveillants. Dans ce travail de thèse nousprésentons une méthodologie pour évaluer la sécurité de systèmes IoT. Nous proposons unemanière de représenter les systèmes IoT, couplée avec des arbres d’attaques afin d’évaluer leschances de succès d’une attaque sur un système donné. La représentation des systèmes est faitevia un langage formel que nous avons développé : SOML (Security Oriented Modeling Language).Ce langage permet de définir le comportement des différents acteurs du système et d’ajouterdes probabilités sur leurs actions. L’abre d’attaque nous offre un moyen simple et formel dereprésenter de possibles attaques sur le système. L’analyse probabiliste est ensuite effectuée viaun outil de Statistical Model Checking : Plasma. Nous utilisons deux algorithmescomplémentaires pour effectuer cette analyse : Monte Carlo et importance splitting
LoT is a rapidly emerging paradigm that provides a way to the user to instrument and control a large variety of objects interacting between each other over the Internet. In IoT systems, the security risks are multiplied as they involve hetero- geneous devices that are connected to a shared network and that carry critical tasks, and hence, are targets for malicious users. In this thesis, we propose a security-based framework for modeling IoT systems where attack trees are defined alongside the model to detect and prevent security risks in the system. The language we implemented aims to model the IoT paradigm in a simple way. The IoT systems are composed of entities having some communication capabilities between each other. Two entities can communicate if (i) they are connected through a communication protocol and (ii) they satisfy some constraints imposed by the protocol. In order to identify and analyze attacks on the security of a system we use attack trees which are an intuitive and practical formal method to do so. A successful attack can be a rare event in the execution of a well-designed system. When rare, such attacks are hard to detect with usual model checking techniques. Hence, we use importance splitting as a statistical model checking technique for rare events
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Szreder, Mikael. "IoT Security in Practice : A Computer Security Analysis of the IKEA “TRÅDFRI” Platform". Thesis, Linköpings universitet, Informationskodning, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161042.

Texto completo
Resumen
In order to develop secure Internet of Things (IoT) devices, it is vital that security isconsidered throughout the development process. However, this is not enough as vulnerabledevices still making it to the open market. To try and solve this issue, this thesis presentsa structured methodology for performing security analysis of IoT platforms. The presented methodology is based on a black box perspective, meaning that theanalysis starts without any prior knowledge of the system. The aim of the presentedmethodology is to obtain information in such a way as to recreate the system design fromthe implementation. In turn, the recreated system design can be used to identify potentialvulnerabilities. Firstly the potential attack surfaces are identified, which the methodology calls inter-faces. These interfaces are the point of communication or interaction between two partsof a system. Secondly, since interfaces do not exist in isolation, the surrounding contextsin which these interfaces exist in are identified. Finally the information processed by theseinterfaces and their contexts are analyzed. Once the information processed by the iden-tified interfaces in their respective contexts are analysed, a risk assessment is performedbased on this information. The methodology is evaluated by performing an analysis of the IKEA “TRÅDFRI”smart lighting platform. By analysing the firmware update process of the IKEA “TRÅD-FRI” platform it can be concluded that the developers have used standardized protocolsand standardized cryptographic algorithms and use these to protect devices from ma-licious firmware. The analysis does however find some vulnerabilities, even though thedevelopers have actively taken steps to protect the system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Nazim, Umair. "Securing Internet of Things (IoT)". Thesis, The University of Sydney, 2018. http://hdl.handle.net/2123/20275.

Texto completo
Resumen
The Internet of Things (IoT) is our future and human life is now entering in to a generation where everyone will be using sensory information and artificial intelligence to make day to day life decisions in real-time. With implementation and enhancements around Internet protocol (IP) now it’s possible to connect and control these devices from anywhere around the globe they can be control by either human or even machines. Security is a critical element and building block for Internet of things (IoT) success. First, we have worked finding out possibility of detecting different types of attacks in Internet of things Wireless networks and identify them based on throughput, delay and energy consumed. Attack that we have work on include DOS attacks and DDOS attacks. Motivated by current use of Blockchain in resolving various problems we have evaluated its implementation to find solutions to secure Internet of Things. This become possible by utilising block chain network and smart contracts to validate any IoT communication . Using Blockchain network allowed IoT to detect securely authenticate without over utilizing device resource keeping in mind the limited hardware and bandwidth. IoT node or nodes communicates to a validator node within Blockchain network to get the most current binary of contracts status and in order to achieve this all the devices required to be in sync with Blockchain version of accounts stored by this validator node. We have worked out how this communication will work in order to ensure security and privacy while doing performance analysis of overheads. In conclusion IoT and Blockchain combine together is very promising solution to solve many current security issues in order to take it to mass scale deployment which allow implementation of Internet of things for a purposeful manner.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Security IoT"

1

Chaki, Rituparna y Debdutta Barman Roy. Security in IoT. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003149507.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Nayak, Padmalaya, Niranjan Ray y P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003124252.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Hancke, Gerhard P. y Konstantinos Markantonakis, eds. Radio Frequency Identification and IoT Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62024-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Mitton, Nathalie, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon y Patrick Capolsini, eds. Interoperability, Safety and Security in IoT. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52727-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Fortino, Giancarlo, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, Hakima Chaouchi y Alban Gabillon, eds. Interoperability, Safety and Security in IoT. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93797-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Dehghantanha, Ali y Kim-Kwang Raymond Choo, eds. Handbook of Big Data and IoT Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-10543-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Jeyanthi, N., Ajith Abraham y Hamid Mcheick, eds. Ubiquitous Computing and Computing Security of IoT. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-01566-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Jiang, Hongbo, Hongyi Wu y Fanzi Zeng, eds. Edge Computing and IoT: Systems, Management and Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73429-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Abdel-Basset, Mohamed, Nour Moustafa, Hossam Hawash y Weiping Ding. Deep Learning Techniques for IoT Security and Privacy. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-89025-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Kieras, Timothy, Junaid Farooq y Quanyan Zhu. IoT Supply Chain Security Risk Analysis and Mitigation. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08480-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Security IoT"

1

Monshizadeh, Mehrnoosh y Vikramajeet Khatri. "IoT Security". En A Comprehensive Guide to 5G Security, 245–66. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch11.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Jabraeil Jamali, Mohammad Ali, Bahareh Bahrami, Arash Heidari, Parisa Allahverdizadeh y Farhad Norouzi. "IoT Security". En Towards the Internet of Things, 33–83. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18468-1_3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Ledwaba, Lehlogonolo P. I. y Gerhard P. Hancke. "IoT Security". En Encyclopedia of Wireless Networks, 681–85. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_291.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Ledwaba, Lehlogonolo P. I. y Gerhard P. Hancke. "IoT Security". En Encyclopedia of Wireless Networks, 1–4. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_291-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Kalaga, Gunneswara Rao VSSS. "IoT Security". En Design of Internet of Things, 121–28. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003303206-15.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Chakravarthi, Veena S. "IoT Security". En Internet of Things and M2M Communication Technologies, 123–36. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79272-5_8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Sniatala, Pawel, S. S. Iyengar y Sanjeev Kaushik Ramani. "IoT Security". En Evolution of Smart Sensing Ecosystems with Tamper Evident Security, 17–24. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77764-7_3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Russell, Brian. "IoT Cyber Security". En Intelligent Internet of Things, 473–512. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-30367-9_10.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Golani, Neha y Rajkumar Rajasekaran. "IoT Challenges: Security". En Internet of Things (IoT), 211–34. Boca Raton : Taylor & Francis, CRC Press, 2018.: CRC Press, 2017. http://dx.doi.org/10.1201/9781315269849-11.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Mukhtar, Adnan, P. M. Tiwari y H. P. Singh. "IoT security algorithms". En Intelligent Circuits and Systems, 585–93. London: CRC Press, 2021. http://dx.doi.org/10.1201/9781003129103-87.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Security IoT"

1

Barrie, Glenn, Andrew Whyte y Joyce Bell. "IoT security". En ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3018896.3018933.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Kovatcheva, Eugenia, Milena Koleva, Jose Luis Del Val Roman y Jose Antonio Campos Granados. "IOT SECURITY NUGGETS". En 13th International Conference on Education and New Learning Technologies. IATED, 2021. http://dx.doi.org/10.21125/edulearn.2021.1969.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Gokalp, Erem y Muhammed Ali Aydin. "Security of IoT". En 2018 3rd International Conference on Computer Science and Engineering (UBMK). IEEE, 2018. http://dx.doi.org/10.1109/ubmk.2018.8566345.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Naik, Swapnil y Vikas Maral. "Cyber security — IoT". En 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2017. http://dx.doi.org/10.1109/rteict.2017.8256700.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Ramesh Kumar, M. y Pradeep Sudhakaran. "Comprehensive Survey on Detecting Security Attacks of IoT Intrusion Detection Systems". En International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-270t9z.

Texto completo
Resumen
With the growth of Internet of Things (IoT), which connects billions of small, smart devices to the Internet, cyber security has become more difficult to manage. These devices are vulnerable to cyberattacks because they lack defensive measures and hardware security support. In addition, IoT gateways provide the most fundamental security mechanisms like firewall, antivirus and access control mechanism for identifying such attacks. In IoT setting, it is critical to maintain security, and protecting the network is even more critical in an IoT network. Because it works directly at local gateways, the Network Intrusion Detection System (NIDS) is one of the most significant solutions for securing IoT devices in a network. This research includes various IoT threats as well as different intrusion detection systems (IDS) methodologies for providing security in an IoT environment, with the goal of evaluating the pros and drawbacks of each methodology in order to discover future IDS implementation paths.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

"T1C: IoT Security: - Threats, Security Challenges and IoT Security Research and Technology Trends". En 2018 31st IEEE International System-on-Chip Conference (SOCC). IEEE, 2018. http://dx.doi.org/10.1109/socc.2018.8618571.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Rizvi, Syed, Andrew Kurtz, Joseph Pfeffer y Mohammad Rizvi. "Securing the Internet of Things (IoT): A Security Taxonomy for IoT". En 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018. http://dx.doi.org/10.1109/trustcom/bigdatase.2018.00034.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Tyou, Iifan, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi y Masaki Tanikawa. "Decentralized IoT Security Gateway". En 2018 3rd Cloudification of the Internet of Things (CIoT). IEEE, 2018. http://dx.doi.org/10.1109/ciot.2018.8627128.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Kodali, Ravi Kishore, Sasweth C. Rajanarayanan, Anvesh Koganti y Lakshmi Boppana. "IoT based security system". En TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON). IEEE, 2019. http://dx.doi.org/10.1109/tencon.2019.8929420.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Parashar, Aditya y Sachin Rishishwar. "Security challanges In IoT". En 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB). IEEE, 2017. http://dx.doi.org/10.1109/aeeicb.2017.7972351.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Security IoT"

1

Wendzel, Steffen y Saffija Kasem-Madani. IoT Security: The Improvement-Decelerating 'Cycle of Blame'. Denmark: River Publishers, septiembre de 2016. http://dx.doi.org/10.13052/popcas010.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Howell, Gema. Security Analysis of IoT Management Solutions for First Responders. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2223.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Garcia-Morchon, O., S. Kumar y M. Sethi. Internet of Things (IoT) Security: State of the Art and Challenges. RFC Editor, abril de 2019. http://dx.doi.org/10.17487/rfc8576.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Swallow, Brent M. Tenure security: Why it matters. Washington, DC: International Food Policy Research Institute, 2021. http://dx.doi.org/10.2499/p15738coll2.134784.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Badger, Lee, Murugiah Souppaya, Mark Trapnell, Eric Trapnell, Dylan Yaga y Karen Scarfone. Guide to securing Apple OS X 10.10 systems for IT professionals: a NIST security configuration checklist. Gaithersburg, MD: National Institute of Standards and Technology, diciembre de 2016. http://dx.doi.org/10.6028/nist.sp.800-179.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Falco, J., K. Stouffer, A. Wavering y F. Proctor. IT security for industrial control systems. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.ir.6859.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Wilson, Elizabeth F. Homeland Security - Can It be Done? Fort Belvoir, VA: Defense Technical Information Center, abril de 2003. http://dx.doi.org/10.21236/ada415743.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Souppaya, Murugiah, John P. Wack y Karen Kent. Security configuration checklists program for IT products :. Gaithersburg, MD: National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-70.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Kotlikoff, Laurence. Privatization of Social Security: How It Works and Why It Matters. Cambridge, MA: National Bureau of Economic Research, octubre de 1995. http://dx.doi.org/10.3386/w5330.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Monev, Veselin. Enterprise IT security metrics: Classification, examples and characteristics. Institute of Information and Communication Technologies, marzo de 2014. http://dx.doi.org/10.11610/it4sec.0111.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía